Research Article
Optimized Scheme to Secure IoT Systems Based on Sharing Secret in Multipath Protocol
(i) | Step 1: source node S marks n paths to the destination D. Let be the set of paths between S and D. | ā | The value of n varies from one node to another according to the neighborhood of each node. | (ii) | Step 2: S divides the message M using Shamir secret sharing scheme to n fragments | (iii) | Step 3: the source then chooses one threshold k of the Shamir method , | ā | k also varies according to n and the number of the node-disjoint paths | (iv) | Step 4: S encapsulates each fragment in a packet and then sends it in a path from . | (v) | Step 5: the destination D receives r packets . Let be the set of paths where D received r packets. | (vi) | Step 6: S receives r acknowledgments; let us suppose that a path is bidirectionally trusted/untrusted. |
|