2014 IEEE Military Communications Conference 2014
DOI: 10.1109/milcom.2014.22
|View full text |Cite
|
Sign up to set email alerts
|

Dynamically Differentiated Multipath Security in Fixed Bandwidth Networks

Abstract: Networks can be secured using a secure quality of service approach in which a sender disperses data along multiple secure paths. In this secure multipath approach, a portion of the data from the sender is transmitted over each path on fixed bandwidth networks, and the receiver assembles the data fragments that arrive. The research presented explores the effects of cloud infrastructure attack scenarios, and gauges the threat levels along each path. Optimal sampling and compression via compressed sensing is empl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2016
2016
2017
2017

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 7 publications
0
1
0
Order By: Relevance
“…Increasingly, more and more tools and algorithms exist to summarize and characterize the content of both the people associated with the nodes of the graph and well as the communication flowing on the edges of the graph. Two examples in the mobile networking space are given in Truong et al and Wei et al In Obert et al, techniques to determine the probability of attack between node pairs using machine learning are discussed. However, there is a critical need to add ways to actuate high assurance systems with authorities and concepts to allow for the “soft” information from these other sources to flow into the “hard” operations of the network.…”
Section: Topology Manipulationmentioning
confidence: 99%
“…Increasingly, more and more tools and algorithms exist to summarize and characterize the content of both the people associated with the nodes of the graph and well as the communication flowing on the edges of the graph. Two examples in the mobile networking space are given in Truong et al and Wei et al In Obert et al, techniques to determine the probability of attack between node pairs using machine learning are discussed. However, there is a critical need to add ways to actuate high assurance systems with authorities and concepts to allow for the “soft” information from these other sources to flow into the “hard” operations of the network.…”
Section: Topology Manipulationmentioning
confidence: 99%