DocumentCode :
2991150
Title :
Secrecy throughput of MANETs with malicious nodes
Author :
Liang, Yingbin ; Poor, H. Vincent ; Ying, Lei
Author_Institution :
Dept. of Electr. Eng., Univ. of Hawaii at Manoa, Honolulu, HI, USA
fYear :
2009
fDate :
June 28 2009-July 3 2009
Firstpage :
1189
Lastpage :
1193
Abstract :
The secrecy throughput of mobile ad-hoc networks (MANETs) with malicious nodes is investigated. The MANET consists of n legitimate mobile nodes and m malicious nodes. Transmissions between legitimate nodes are subject to a delay constraint D. An information theoretic approach for security is applied to achieve secure communication among legitimate nodes in MANETs with transmissions being kept perfectly secure from malicious nodes. A critical threshold on the number of malicious nodes (m) is identified such that when m = o(radicnD), i.e., limnrarrinfin m/radicnD = 0, the secrecy throughput equals the throughput of MANETs without malicious nodes, i.e., the impact of the presence of malicious nodes on the network throughput is negligible; and when m = Omega (radicnDpoly(n)), i.e., limnrarrinfin m/(radicnDpoly(n)) ges c for a positive constant c, the secrecy throughput is limited by the number of malicious nodes.
Keywords :
ad hoc networks; computational complexity; information theory; mobile computing; MANET; information theory; malicious nodes; mobile ad hoc networks; secrecy throughput; Ad hoc networks; Constraint theory; Delay; Information security; Interference constraints; Mobile ad hoc networks; Mobile computing; Personal area networks; Throughput; Upper bound;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Theory, 2009. ISIT 2009. IEEE International Symposium on
Conference_Location :
Seoul
Print_ISBN :
978-1-4244-4312-3
Electronic_ISBN :
978-1-4244-4313-0
Type :
conf
DOI :
10.1109/ISIT.2009.5205992
Filename :
5205992
Link To Document :
بازگشت