{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:33:33Z","timestamp":1750307613606,"version":"3.41.0"},"reference-count":31,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2008,12,31]],"date-time":"2008-12-31T00:00:00Z","timestamp":1230681600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGCOMM Comput. Commun. Rev."],"published-print":{"date-parts":[[2008,12,31]]},"abstract":"<jats:p>\n            Data confidentiality over mobile devices can be difficult to secure due to a lack of computing power and weak supporting encryption components. However, modern devices often have multiple wireless interfaces with diverse channel capacities and security capabilities. We show that the availability of diverse, heterogeneous links (physical or logical) between nodes in a network can be used to increase data confidentiality, on top of the availability or strength of underlying encryption techniques. We introduce a new security approach using multiple channels to transmit data securely, based on the idea of deliberate corruption, and information reduction, and analyze its security using the information theoretic concept of secrecy capacity, and the wiretap channel. Our work introduces the idea of channel\n            <jats:italic>design<\/jats:italic>\n            with security in mind.\n          <\/jats:p>","DOI":"10.1145\/1496091.1496096","type":"journal-article","created":{"date-parts":[[2009,1,20]],"date-time":"2009-01-20T14:41:13Z","timestamp":1232462473000},"page":"34-44","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Improving wireless security through network diversity"],"prefix":"10.1145","volume":"39","author":[{"given":"Tao","family":"Ye","sequence":"first","affiliation":[{"name":"Sprint, Burlingame, CA and University of Melbourne, Australia"}]},{"given":"Darryl","family":"Veitch","sequence":"additional","affiliation":[{"name":"ARC Special Research Center for Ultra Broadband Information Networks and University of Melbourne, Australia"}]},{"given":"Jean","family":"Bolot","sequence":"additional","affiliation":[{"name":"Sprint, Burlingame, CA"}]}],"member":"320","published-online":{"date-parts":[[2008,12,31]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"{Online}. Available: http:\/\/www.networkworld.com\/community\/node\/22410  {Online}. Available: http:\/\/www.networkworld.com\/community\/node\/22410"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1064413.1064425"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45146-4_35"},{"key":"e_1_2_1_4_1","unstructured":"C. Devine \"Aircrack-2.41 \" 2004. {Online}. Available: http:\/\/aircrack-ng.org\/  C. Devine \"Aircrack-2.41 \" 2004. {Online}. Available: http:\/\/aircrack-ng.org\/"},{"key":"e_1_2_1_5_1","volume-title":"April","author":"Dierks T.","year":"2006","unstructured":"T. Dierks and E. Rescorla , \" IETF RFC 4346: The Transport Layer Security (TLS) Protocol Version 1.1,\" IETF , April 2006 . T. Dierks and E. Rescorla, \"IETF RFC 4346: The Transport Layer Security (TLS) Protocol Version 1.1,\" IETF, April 2006."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/990064.990091"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2004.1356976"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.40"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.387094"},{"key":"e_1_2_1_10_1","volume-title":"SPREAD: Enhancing Data Confidentiality in Mobile Ad Hoc Networks,\" in IEEE Infocom","author":"Lou W.","year":"2004","unstructured":"W. Lou , W. Liu , and Y. Fang , \" SPREAD: Enhancing Data Confidentiality in Mobile Ad Hoc Networks,\" in IEEE Infocom , 2004 . W. Lou, W. Liu, and Y. Fang, \"SPREAD: Enhancing Data Confidentiality in Mobile Ad Hoc Networks,\" in IEEE Infocom, 2004."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/941311.941318"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/26.241748"},{"key":"e_1_2_1_14_1","volume-title":"Conf. Computers and Devices for Communication (CODEC)","author":"Vasudevan R.","year":"2004","unstructured":"R. Vasudevan and S. Sanyal , \" A Novel Multipath Approach to Security in Mobile Ad Hoc Networks,\" in Int . Conf. Computers and Devices for Communication (CODEC) , Kolkata, India , Jan 2004 . R. Vasudevan and S. Sanyal, \"A Novel Multipath Approach to Security in Mobile Ad Hoc Networks,\" in Int. Conf. Computers and Devices for Communication (CODEC), Kolkata, India, Jan 2004."},{"key":"e_1_2_1_15_1","doi-asserted-by":"crossref","unstructured":"R. L. Rivest \"All-or-nothing encryption and the package transform \" in the 1997 Fast Software Encryption Conference 1997.   R. L. Rivest \"All-or-nothing encryption and the package transform \" in the 1997 Fast Software Encryption Conference 1997.","DOI":"10.1007\/BFb0052348"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008304703074"},{"key":"e_1_2_1_17_1","volume-title":"Sp. Issue on Network Security","author":"Byers J.","year":"2004","unstructured":"J. Byers , M. C. Cheng , J. Considine , and G. Itkis , \" Securing Bulk Content Almost for Free,\" Computer Comms ., Sp. Issue on Network Security , 2004 . J. Byers, M. C. Cheng, J. Considine, and G. Itkis, \"Securing Bulk Content Almost for Free,\" Computer Comms., Sp. Issue on Network Security, 2004."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/62044.62050"},{"key":"e_1_2_1_20_1","volume-title":"Information Slicing: Anonymity Using Unreliable Overlays,\" in Usenix NSDI","author":"Katti S.","year":"2007","unstructured":"S. Katti , J. Cohen , and D. Katabi , \" Information Slicing: Anonymity Using Unreliable Overlays,\" in Usenix NSDI , 2007 . S. Katti, J. Cohen, and D. Katabi, \"Information Slicing: Anonymity Using Unreliable Overlays,\" in Usenix NSDI, 2007."},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"e_1_2_1_22_1","volume-title":"Wireless LAN Medum Access Contral and Physical Layer (PHY) Specifications","author":"IEEE","year":"1999","unstructured":"\"ANSI\/ IEEE Standard 802.11 : Wireless LAN Medum Access Contral and Physical Layer (PHY) Specifications ,\" 1999 . \"ANSI\/IEEE Standard 802.11: Wireless LAN Medum Access Contral and Physical Layer (PHY) Specifications,\" 1999."},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/646557.694759"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055892"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2007.901143"},{"key":"e_1_2_1_27_1","volume-title":"July","author":"Barros J.","year":"2006","unstructured":"J. Barros and M. R. Rodrigues , \" Secrecy capacity of wireless channels,\" ISIT , July 2006 . J. Barros and M. R. Rodrigues, \"Secrecy capacity of wireless channels,\" ISIT, July 2006."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.556128"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2005.864445"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.881844"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.881832"}],"container-title":["ACM SIGCOMM Computer Communication Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1496091.1496096","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1496091.1496096","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:45:43Z","timestamp":1750250743000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1496091.1496096"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,12,31]]},"references-count":31,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2008,12,31]]}},"alternative-id":["10.1145\/1496091.1496096"],"URL":"https:\/\/doi.org\/10.1145\/1496091.1496096","relation":{},"ISSN":["0146-4833"],"issn-type":[{"type":"print","value":"0146-4833"}],"subject":[],"published":{"date-parts":[[2008,12,31]]},"assertion":[{"value":"2008-12-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}