{"title":"基于多径路由和发射天线方向性控制的安全无线链路创建研究","authors":"M. Yamanaka, N. Morinaga, S. Miyamoto, S. Sampei","doi":"10.1109/INCoS.2011.39","DOIUrl":null,"url":null,"abstract":"This paper proposes a secure wireless link creation scheme based on a multi-path routing in a single-hop wireless transmission environment, where multiple paths are created by directive transmission using the multipath component of wireless link which the link possesses naturally on its own. Moreover a secret sharing method is employed to divide the transmitted information into pieces of shared information and sending each pieces of information separately through the multiple paths. Computer simulation clarifies that with the proposed scheme, information recovery of the transmitted information can be confined to a limited area in the wireless space, i.e., the transmitted information is less exposed to the adversary around the legitimate terminals.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A Study on a Secure Wireless Link Creation Based on Multi-path Routing Combined with Transmit Antenna Directivity Control\",\"authors\":\"M. Yamanaka, N. Morinaga, S. Miyamoto, S. Sampei\",\"doi\":\"10.1109/INCoS.2011.39\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper proposes a secure wireless link creation scheme based on a multi-path routing in a single-hop wireless transmission environment, where multiple paths are created by directive transmission using the multipath component of wireless link which the link possesses naturally on its own. Moreover a secret sharing method is employed to divide the transmitted information into pieces of shared information and sending each pieces of information separately through the multiple paths. Computer simulation clarifies that with the proposed scheme, information recovery of the transmitted information can be confined to a limited area in the wireless space, i.e., the transmitted information is less exposed to the adversary around the legitimate terminals.\",\"PeriodicalId\":235301,\"journal\":{\"name\":\"2011 Third International Conference on Intelligent Networking and Collaborative Systems\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-11-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 Third International Conference on Intelligent Networking and Collaborative Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/INCoS.2011.39\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INCoS.2011.39","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Study on a Secure Wireless Link Creation Based on Multi-path Routing Combined with Transmit Antenna Directivity Control
This paper proposes a secure wireless link creation scheme based on a multi-path routing in a single-hop wireless transmission environment, where multiple paths are created by directive transmission using the multipath component of wireless link which the link possesses naturally on its own. Moreover a secret sharing method is employed to divide the transmitted information into pieces of shared information and sending each pieces of information separately through the multiple paths. Computer simulation clarifies that with the proposed scheme, information recovery of the transmitted information can be confined to a limited area in the wireless space, i.e., the transmitted information is less exposed to the adversary around the legitimate terminals.