2015 IEEE 13th International Scientific Conference on Informatics 2015
DOI: 10.1109/informatics.2015.7377802
|View full text |Cite
|
Sign up to set email alerts
|

Multi Path Transmission Control Protocols as a security solution

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 14 publications
(2 citation statements)
references
References 5 publications
0
2
0
Order By: Relevance
“…Encryption algorithms can be used as a supplement to multipath routing algorithms, the combination of the two ways can greatly improve the security of data. At present, the related researches in multipath routing algorithms are as follows: Reference 11 proposed the idea of multi‐path TCP, this algorithm improve the security, but it needs a lot of additional control information and ACK packets in transmission, which is not very friendly to resource consumption and delay. Reference 12 proposes a dynamic routing algorithm, which can randomize the path of data transmission, so that the nodes are selected by the two packets are completely different and unpredictable.…”
Section: Related Workmentioning
confidence: 99%
“…Encryption algorithms can be used as a supplement to multipath routing algorithms, the combination of the two ways can greatly improve the security of data. At present, the related researches in multipath routing algorithms are as follows: Reference 11 proposed the idea of multi‐path TCP, this algorithm improve the security, but it needs a lot of additional control information and ACK packets in transmission, which is not very friendly to resource consumption and delay. Reference 12 proposes a dynamic routing algorithm, which can randomize the path of data transmission, so that the nodes are selected by the two packets are completely different and unpredictable.…”
Section: Related Workmentioning
confidence: 99%
“…The transmitted data are treated as raw binary data, which can be divided into blocks and passed to the transmission layer. With regard to protecting the data from being sniffed by a hacker, the author proposes an extended algorithm [22], which consists of the following steps:…”
Section: Multipath Tcpmentioning
confidence: 99%