Can Multipath TCP be Robust to Cyber Attacks With Incomplete Information?

Promoted by the advancements in the various wireless access technologies, modern mobile devices equipped with multiple network interfaces are rapidly becoming the norm, and this provides a driving force for the large-scale deployment of the Multipath Transmission Control Protocol (MPTCP) in the curr...

Full description

Saved in:
Bibliographic Details
Published inIEEE access Vol. 8; pp. 165872 - 165883
Main Authors Cao, Yuanlong, Chen, Jing, Liu, Qinghua, Lei, Gang, Wang, Hao, You, Ilsun
Format Journal Article
LanguageEnglish
Published Piscataway IEEE 2020
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Promoted by the advancements in the various wireless access technologies, modern mobile devices equipped with multiple network interfaces are rapidly becoming the norm, and this provides a driving force for the large-scale deployment of the Multipath Transmission Control Protocol (MPTCP) in the current and future Internet. However, the simultaneous use of multiple network paths for concurrent multipath data transmission can make MPTCP have a larger attack surface than the traditional single-path transport protocols, and this may be likely to pose a risk of MPTCP being much more susceptible to cyber attacks. In this paper, we present a measurement method to investigate the vulnerability and robustness of MPTCP under cyber attacks with incomplete network information, by considering the fact that most cyber attacks normally lack of real-time information with respect to various MPTCP attributes. We mathematically characterize cyber attacks with incomplete network information from the viewpoints of both the cyber attacker and the MPTCP communication system, and then we introduce a mixed attack strategy, by jointly considering the features of both the random attacks and the selective attacks, to evaluate the robustness of MPTCP.
AbstractList Promoted by the advancements in the various wireless access technologies, modern mobile devices equipped with multiple network interfaces are rapidly becoming the norm, and this provides a driving force for the large-scale deployment of the Multipath Transmission Control Protocol (MPTCP) in the current and future Internet. However, the simultaneous use of multiple network paths for concurrent multipath data transmission can make MPTCP have a larger attack surface than the traditional single-path transport protocols, and this may be likely to pose a risk of MPTCP being much more susceptible to cyber attacks. In this paper, we present a measurement method to investigate the vulnerability and robustness of MPTCP under cyber attacks with incomplete network information, by considering the fact that most cyber attacks normally lack of real-time information with respect to various MPTCP attributes. We mathematically characterize cyber attacks with incomplete network information from the viewpoints of both the cyber attacker and the MPTCP communication system, and then we introduce a mixed attack strategy, by jointly considering the features of both the random attacks and the selective attacks, to evaluate the robustness of MPTCP.
Author Liu, Qinghua
Lei, Gang
Cao, Yuanlong
You, Ilsun
Chen, Jing
Wang, Hao
Author_xml – sequence: 1
  givenname: Yuanlong
  orcidid: 0000-0002-6557-6559
  surname: Cao
  fullname: Cao, Yuanlong
  organization: School of Software, Jiangxi Normal University, Nanchang, China
– sequence: 2
  givenname: Jing
  orcidid: 0000-0002-6350-9416
  surname: Chen
  fullname: Chen, Jing
  organization: School of Software, Jiangxi Normal University, Nanchang, China
– sequence: 3
  givenname: Qinghua
  orcidid: 0000-0002-2462-0971
  surname: Liu
  fullname: Liu, Qinghua
  organization: School of Software, Jiangxi Normal University, Nanchang, China
– sequence: 4
  givenname: Gang
  orcidid: 0000-0001-5472-7211
  surname: Lei
  fullname: Lei, Gang
  organization: School of Software, Jiangxi Normal University, Nanchang, China
– sequence: 5
  givenname: Hao
  orcidid: 0000-0003-3884-8771
  surname: Wang
  fullname: Wang, Hao
  organization: School of Software, Jiangxi Normal University, Nanchang, China
– sequence: 6
  givenname: Ilsun
  orcidid: 0000-0002-0604-3445
  surname: You
  fullname: You, Ilsun
  email: ilsunu@gmail.com
  organization: Department of Information Security Engineering, Soonchunhyang University, Asan, South Korea
BookMark eNp9kU9r3DAQxUVJock2nyAXQ867Hf21dCqLSdOFlJYmpUchyeNWG6-1kbWHfPt646SUHqKLhuH9Hm94Z-RkSAMSckFhRSmYD-umubq9XTFgsOLAqKjlG3LKqDJLLrk6-Wd-R87HcQvT09NK1qdk07ih-nLoS9y78ru6a75VHqvvyR_GUpVUNY8ec7UuxYX7sfoZJ81mCGm377HgNHYp71yJafj4nrztXD_i-fO_ID8-Xd01n5c3X683zfpmGQTosvTBOVd77FCiojR0EkE441WrVas8RQi1MAggWgmdEu2UU0vTeQbSeNPyBdnMvm1yW7vPcefyo00u2qdFyr-syyWGHq3uOHAmhGwFEzXlGnzrjZMQHCJVevK6nL32OT0ccCx2mw55mOJbJqRQtaHsqDKzKuQ0jhk7G2J5OrpkF3tLwR6LsHMR9liEfS5iYvl_7Evi16mLmYqI-JcwVCsqNf8DZt2UgQ
CODEN IAECCG
CitedBy_id crossref_primary_10_3390_electronics11152384
crossref_primary_10_1016_j_cose_2021_102180
crossref_primary_10_3390_s20226573
crossref_primary_10_1007_s10922_022_09677_1
crossref_primary_10_1155_2021_9968550
crossref_primary_10_1587_transinf_2021NGP0009
Cites_doi 10.1109/LCN.2017.69
10.23919/CNSM.2017.8255970
10.3390/app10010380
10.1109/GLOCOM.2012.6503599
10.1109/TSMC.2019.2959630
10.1109/TMC.2018.2889059
10.1109/ACCESS.2017.2785849
10.1109/TNET.2017.2701153
10.1109/TNET.2020.2970032
10.1109/ACCESS.2019.2962247
10.1109/LCN44214.2019.8990831
10.1109/ACCESS.2019.2957434
10.1109/INFOCOM.2016.7524599
10.1109/TNET.2019.2961759
10.1109/ACCESS.2018.2888582
10.1109/TVT.2017.2753398
10.1007/s11036-017-0901-2
10.1109/TBC.2016.2590819
10.1109/INFOCOM.2017.8057011
10.1109/INFOCOM.2017.8057182
10.1109/ICNP.2017.8117547
10.1016/j.jnca.2017.11.004
10.1109/TNET.2014.2300140
10.1109/TMC.2012.189
10.1109/COMPSAC.2018.10230
10.1109/TVT.2016.2543842
10.1109/ACCESS.2019.2958986
10.1109/TNET.2016.2527759
10.1109/TMM.2018.2879748
10.17487/rfc6824
10.1109/JIOT.2019.2958097
10.1109/MNET.2018.1800017
10.1109/INFOCOM.2014.6848120
10.1109/LCOMM.2017.2740918
10.1109/MNET.2018.1800187
10.1109/IWCMC.2018.8450509
10.1109/CC.2017.7868178
10.3390/s18061926
10.1209/epl/i2004-10286-2
10.1109/ICC.2015.7249436
10.1109/WAINA.2012.283
10.1109/ACCESS.2017.2731899
10.1109/ACCESS.2019.2921603
10.1109/TII.2019.2950109
10.1109/ICPADS47876.2019.00117
10.1109/LCN.2015.7366348
10.1038/srep22916
10.1145/381677.381704
10.1109/TNET.2019.2950908
10.1109/TNET.2019.2923955
10.1016/j.ins.2018.06.002
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020
DBID 97E
ESBDL
RIA
RIE
AAYXX
CITATION
7SC
7SP
7SR
8BQ
8FD
JG9
JQ2
L7M
L~C
L~D
DOA
DOI 10.1109/ACCESS.2020.3021475
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE Xplore Open Access Journals
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Engineered Materials Abstracts
METADEX
Technology Research Database
Materials Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
Materials Research Database
Engineered Materials Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
METADEX
Computer and Information Systems Abstracts Professional
DatabaseTitleList

Materials Research Database
Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 2169-3536
EndPage 165883
ExternalDocumentID oai_doaj_org_article_8f3032445d42471380bdb9a50caee168
10_1109_ACCESS_2020_3021475
9186158
Genre orig-research
GrantInformation_xml – fundername: Soonchunhyang University Research Fund
  funderid: 10.13039/501100002560
– fundername: National Natural Science Foundation of China (NSFC)
  grantid: 61962026
  funderid: 10.13039/501100001809
GroupedDBID 0R~
4.4
5VS
6IK
97E
AAJGR
ABAZT
ABVLG
ACGFS
ADBBV
AGSQL
ALMA_UNASSIGNED_HOLDINGS
BCNDV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
EBS
EJD
ESBDL
GROUPED_DOAJ
IPLJI
JAVBF
KQ8
M43
M~E
O9-
OCL
OK1
RIA
RIE
RNS
AAYXX
CITATION
RIG
7SC
7SP
7SR
8BQ
8FD
JG9
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c408t-bcaaa7befe5e611cf5e04a9b6d86d6b1e0c749e004d50f64d695859fb2059b9d3
IEDL.DBID DOA
ISSN 2169-3536
IngestDate Wed Aug 27 01:28:24 EDT 2025
Mon Jun 30 04:28:21 EDT 2025
Tue Jul 01 02:55:47 EDT 2025
Thu Apr 24 23:12:30 EDT 2025
Wed Aug 27 02:32:26 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Language English
License https://creativecommons.org/licenses/by/4.0/legalcode
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c408t-bcaaa7befe5e611cf5e04a9b6d86d6b1e0c749e004d50f64d695859fb2059b9d3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-6350-9416
0000-0002-0604-3445
0000-0003-3884-8771
0000-0002-2462-0971
0000-0001-5472-7211
0000-0002-6557-6559
OpenAccessLink https://doaj.org/article/8f3032445d42471380bdb9a50caee168
PQID 2454679128
PQPubID 4845423
PageCount 12
ParticipantIDs crossref_primary_10_1109_ACCESS_2020_3021475
crossref_citationtrail_10_1109_ACCESS_2020_3021475
ieee_primary_9186158
proquest_journals_2454679128
doaj_primary_oai_doaj_org_article_8f3032445d42471380bdb9a50caee168
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 20200000
2020-00-00
20200101
2020-01-01
PublicationDateYYYYMMDD 2020-01-01
PublicationDate_xml – year: 2020
  text: 20200000
PublicationDecade 2020
PublicationPlace Piscataway
PublicationPlace_xml – name: Piscataway
PublicationTitle IEEE access
PublicationTitleAbbrev Access
PublicationYear 2020
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref13
ref14
ref55
ref11
ref54
ref10
(ref56) 2020
ref17
ref16
(ref51) 0
ref19
ref18
zhang (ref47) 2015; 37
paasch (ref12) 2012
ref50
xu (ref37) 2017
ref46
ref45
ref48
ref42
ref41
ref44
kim (ref59) 2020; 10
ref43
ref49
ref7
ref9
ref4
ref3
ref6
ref5
(ref53) 2020
ref40
kimura (ref15) 2020
ref35
kim park lee you (ref57) 2012; 2
ref34
ref36
ref31
ref30
ref33
ref32
ref2
ref1
ref39
ref38
abhishta (ref58) 2020; 11
ref24
ref23
ref26
ref25
ref20
ref63
(ref52) 2020
saha (ref8) 2019
ref22
ref21
ref28
ref27
ref29
ref60
ref62
ref61
References_xml – ident: ref18
  doi: 10.1109/LCN.2017.69
– year: 0
  ident: ref51
  publication-title: LBL USC/ISI and Xerox Parc NS-2 Documentation and Software Version 2 35
– ident: ref42
  doi: 10.23919/CNSM.2017.8255970
– ident: ref14
  doi: 10.3390/app10010380
– ident: ref44
  doi: 10.1109/GLOCOM.2012.6503599
– ident: ref6
  doi: 10.1109/TSMC.2019.2959630
– ident: ref1
  doi: 10.1109/TMC.2018.2889059
– year: 2020
  ident: ref56
  publication-title: Cyberattack
– ident: ref28
  doi: 10.1109/ACCESS.2017.2785849
– ident: ref27
  doi: 10.1109/TNET.2017.2701153
– ident: ref20
  doi: 10.1109/TNET.2020.2970032
– ident: ref62
  doi: 10.1109/ACCESS.2019.2962247
– ident: ref21
  doi: 10.1109/LCN44214.2019.8990831
– volume: 10
  start-page: 1
  year: 2020
  ident: ref59
  article-title: 5G core network security issues and attack classification from network protocol perspective
  publication-title: J Internet Services Inf Secur
– ident: ref40
  doi: 10.1109/ACCESS.2019.2957434
– ident: ref22
  doi: 10.1109/INFOCOM.2016.7524599
– ident: ref23
  doi: 10.1109/TNET.2019.2961759
– ident: ref48
  doi: 10.1109/ACCESS.2018.2888582
– ident: ref16
  doi: 10.1109/TVT.2017.2753398
– ident: ref19
  doi: 10.1007/s11036-017-0901-2
– ident: ref31
  doi: 10.1109/TBC.2016.2590819
– ident: ref41
  doi: 10.1109/INFOCOM.2017.8057011
– ident: ref26
  doi: 10.1109/INFOCOM.2017.8057182
– ident: ref43
  doi: 10.1109/ICNP.2017.8117547
– ident: ref60
  doi: 10.1016/j.jnca.2017.11.004
– ident: ref32
  doi: 10.1109/TNET.2014.2300140
– ident: ref55
  doi: 10.1109/TMC.2012.189
– ident: ref35
  doi: 10.1109/COMPSAC.2018.10230
– year: 2017
  ident: ref37
  publication-title: Multipath Transmission Control Protocol (MPTCP) Partial Reliability Extension
– ident: ref33
  doi: 10.1109/TVT.2016.2543842
– ident: ref4
  doi: 10.1109/ACCESS.2019.2958986
– ident: ref13
  doi: 10.1109/TNET.2016.2527759
– ident: ref3
  doi: 10.1109/TMM.2018.2879748
– year: 2020
  ident: ref52
  publication-title: Multipath-TCP Implement Multipath TCP on NS-2
– ident: ref5
  doi: 10.17487/rfc6824
– ident: ref61
  doi: 10.1109/JIOT.2019.2958097
– start-page: 1
  year: 2019
  ident: ref8
  article-title: AMuSe: An agile multipath-TCP scheduler for dual-band 802.11ad/ac wireless LANs
  publication-title: Proc ACM MobiCom
– ident: ref7
  doi: 10.1109/MNET.2018.1800017
– ident: ref34
  doi: 10.1109/INFOCOM.2014.6848120
– ident: ref17
  doi: 10.1109/LCOMM.2017.2740918
– ident: ref63
  doi: 10.1109/MNET.2018.1800187
– ident: ref38
  doi: 10.1109/IWCMC.2018.8450509
– ident: ref30
  doi: 10.1109/CC.2017.7868178
– ident: ref54
  doi: 10.3390/s18061926
– volume: 11
  start-page: 3
  year: 2020
  ident: ref58
  article-title: Why would we get attacked? An analysis of attacker's aims behind DDoS attacks
  publication-title: J Wireless Mobile Netw Ubiquitous Comput Dependable Appl
– ident: ref49
  doi: 10.1209/epl/i2004-10286-2
– ident: ref24
  doi: 10.1109/ICC.2015.7249436
– ident: ref39
  doi: 10.1109/WAINA.2012.283
– ident: ref10
  doi: 10.1109/ACCESS.2017.2731899
– ident: ref45
  doi: 10.1109/ACCESS.2019.2921603
– ident: ref2
  doi: 10.1109/TII.2019.2950109
– ident: ref36
  doi: 10.1109/ICPADS47876.2019.00117
– ident: ref29
  doi: 10.1109/LCN.2015.7366348
– year: 2020
  ident: ref15
  article-title: Packet scheduling in multipath TCP: Fundamentals, lessons, and opportunities
  publication-title: IEEE Syst J
– ident: ref46
  doi: 10.1038/srep22916
– ident: ref50
  doi: 10.1145/381677.381704
– year: 2012
  ident: ref12
  publication-title: Securing the MultiPath TCP handshake with external keys
– ident: ref25
  doi: 10.1109/TNET.2019.2950908
– ident: ref9
  doi: 10.1109/TNET.2019.2923955
– volume: 2
  start-page: 134
  year: 2012
  ident: ref57
  article-title: A brief survey on rootkit techniques in malicious codes
  publication-title: J Internet Services Inf Secur
– year: 2020
  ident: ref53
  publication-title: Cyber Attack Trends Analysis Report
– ident: ref11
  doi: 10.1016/j.ins.2018.06.002
– volume: 37
  start-page: 180
  year: 2015
  ident: ref47
  article-title: Method to analyse the robustness of aviation communication network based on complex networks
  publication-title: Syst Eng Electron
SSID ssj0000816957
Score 2.2100077
Snippet Promoted by the advancements in the various wireless access technologies, modern mobile devices equipped with multiple network interfaces are rapidly becoming...
SourceID doaj
proquest
crossref
ieee
SourceType Open Website
Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 165872
SubjectTerms Communications systems
cyber attacks
Cyberattack
Cybersecurity
Data communication
Data transmission
Electronic devices
graph-theoretic model
incomplete information
Internet
Measurement methods
Mobile handsets
Multipath TCP
Multipath transmission
Protocol (computers)
Robustness
Robustness (mathematics)
robustness analysis
TCP (protocol)
Wireless communication
Wireless fidelity
SummonAdditionalLinks – databaseName: IEEE Electronic Library (IEL)
  dbid: RIE
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3fSxwxEB7UJ32wVi1eqyUPfXTP7F6SS57kXBRbUEQUfQv5MQul5a7o3kP713eym1vEltK3sCQhmy_JzCQz3wB8CmbKHU5kgUHJQjTcFaZyWKjGx4l0Ogif4p2vrtXlvfjyKB_X4HiIhUHEzvkMx6nYveXHRVimq7ITU2oSwHod1slw62O1hvuUlEDCyGkmFiq5OZnVNf0DmYAVWaaJGiz5Er4QPh1Hf06q8sdJ3ImXizdwtRpY71Xybbxs_Tj8esXZ-L8j34HtrGeyWb8w3sIazndh6wX74B58rt2cdQG4KS0xu6tvmEd2u_DL55a1C1b_9PjEZm2bwvDZw1eqQ6dJckEnRZvlOKaE6-k-3F-c39WXRc6sUATBdVv44JybemxQoirL0EjkwhmvolZR-RJ5mAqDtIGi5I0SkaZWS9P4irQxb-LkHWzMF3M8ABZ05Ukn1FUsUYQmUC_UL5XJ9HEY-Aiq1ZTbkGnHU_aL77YzP7ixPU424WQzTiM4Hhr96Fk3_l39LGE5VE2U2d0HwsDmHWh1Q9KalBkZRUUSeaK5j944yYNDLJUewV7CbegkQzaCw9XKsHl7P9tKSBIwhmT7-7-3-gCbaYD9Xc0hbLRPSzwi7aX1H7tl-xtuEeva
  priority: 102
  providerName: IEEE
Title Can Multipath TCP be Robust to Cyber Attacks With Incomplete Information?
URI https://ieeexplore.ieee.org/document/9186158
https://www.proquest.com/docview/2454679128
https://doaj.org/article/8f3032445d42471380bdb9a50caee168
Volume 8
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LS8QwEA6yJz2IT1xf5ODRYtpNsslJ1uKigiKyoreQxxQE2RWtB_-9kzS7LAh68VZCmjZfpvMoM98QcuL1kFkYiAK8FAVvmC10ZaGQjQsDYZXnLtY7397Jq0d-8yyel1p9xZywjh64A-5MNahk0QaJwCtUpAPFXHDaCuYtQClTmS_avKVgKulgVUothplmqGT6bFTXuCMMCCuMUyNRWMwsXDJFibE_t1j5oZeTsRlvkPXsJdJR93abZAWmW2RtiTtwm1zXdkpT-WxsKkwn9T11QB9m7vOjpe2M1l8O3umobWMRPX16wTmoC2ICObrJNFchxVM53yGP48tJfVXkvgiF50y1hfPW2qGDBgTIsvSNAMatdjIoGaQrgfkh14DiHwRrJA8IhRK6cRX6Uk6HwS7pTWdT2CPUq8qhR6eqUAL3jcdVcF28xsDFgmd9Us0hMj6ThsfeFa8mBQ9Mmw5XE3E1Gdc-OV3c9NZxZvw-_SJiv5gaCa_TAIqByWJg_hKDPtmOJ7dYRJcKfTUcPpyfpMkf54epuEDzoNEy7__How_IatxO91_mkPTa9084Qk-ldcdJKI9TUeE3aTTijg
linkProvider Directory of Open Access Journals
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Nb9QwEB2VcoAe-CqIhQI-cGy2Ttb22ie0RFRb6FYIbUVvlj8mUgXardrsAX4948QbVYAQtyiyLcfP9hs7M28A3gYz5Q4nssCgZCEa7gpTOSxU4-NEOh2ET_HOizM1PxcfL-TFDhwOsTCI2Dmf4Tg9dv_y4zps0lXZkSk1EbC-A3eJ92XVR2sNNyophYSR0ywtVHJzNKtr-go6BFZ0Nk3iYMmb8Bb9dCr9Oa3KH3txRzDHD2Gx7VrvV_JtvGn9OPz8TbXxf_v-CB5kS5PN-qnxGHZw9QT2bukP7sNJ7VasC8FNiYnZsv7MPLIva7-5aVm7ZvUPj9ds1rYpEJ99vaQytJ8kJ3QytVmOZErIvnsK58cflvW8yLkViiC4bgsfnHNTjw1KVGUZGolcOONV1CoqXyIPU2GQllCUvFEi0tBqaRpfkT3mTZw8g93VeoXPgQVdebIKdRVLFKEJ1Aq1S890-HEY-Aiq7ZDbkIXHU_6L77Y7gHBje5xswslmnEZwOFS66nU3_l38fcJyKJpEs7sXhIHNa9DqhviazBkZRUWcPNHcR2-c5MEhlkqPYD_hNjSSIRvBwXZm2LzAb2wlJFGMIXZ_8fdab-DefLk4tacnZ59ewv3U2f7m5gB22-sNviJbpvWvuyn8C-T07yQ
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Can+Multipath+TCP+be+Robust+to+Cyber+Attacks+With+Incomplete+Information%3F&rft.jtitle=IEEE+access&rft.au=Cao%2C+Yuanlong&rft.au=Chen%2C+Jing&rft.au=Liu%2C+Qinghua&rft.au=Lei%2C+Gang&rft.date=2020&rft.issn=2169-3536&rft.eissn=2169-3536&rft.volume=8&rft.spage=165872&rft.epage=165883&rft_id=info:doi/10.1109%2FACCESS.2020.3021475&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_ACCESS_2020_3021475
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2169-3536&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2169-3536&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2169-3536&client=summon