DocumentCode :
1340120
Title :
Secrecy Throughput of MANETs Under Passive and Active Attacks
Author :
Liang, Yingbin ; Poor, H. Vincent ; Ying, Lei
Author_Institution :
Dept. of Electr. Eng. & Comput. Sci., Syracuse Univ., Syracuse, NY, USA
Volume :
57
Issue :
10
fYear :
2011
Firstpage :
6692
Lastpage :
6702
Abstract :
The secrecy throughput of mobile ad hoc networks (MANETs) with malicious nodes is investigated. The MANET consists of n legitimate mobile nodes and m malicious nodes. Transmissions between legitimate nodes are subject to a delay constraint D. A model under passive attack is first studied, in which the malicious nodes are assumed to be eavesdroppers that only listen to transmission without actively injecting signals. An information-theoretic approach for security is applied to achieve secure communication among legitimate nodes in MANETs with transmissions being kept perfectly secure from eavesdroppers. A critical threshold on the number of malicious nodes (m) is identified such that when m = o(√{nD}), i.e., limn→∞m/√{nD} = 0, the optimal secrecy throughput equals that of MANETs without malicious nodes, i.e., the impact of the presence of malicious nodes on the network throughput is negligible; and when m = Ω(√{nD}poly(n)), i.e., limn→∞m/(√{nD}poly(n)) ≥ c for a positive constant c, the optimal secrecy throughput is limited by the number of malicious nodes. A model under active attack is further studied, in which the malicious nodes actively attack the network by transmitting modified packets to the destination nodes. It is shown that to guarantee the same throughput as the model under passive attack, the model under active attack needs to satisfy more stringent condition on the number of malicious nodes.
Keywords :
delays; information theory; mobile ad hoc networks; telecommunication security; MANET; active attack; delay constraint; information-theoretic approach; legitimate mobile node; malicious node; mobile ad hoc network; optimal secrecy throughput; passive attack; secure communication; Ad hoc networks; Delay; Encoding; Mobile computing; Receivers; Security; Throughput; Erasure channel; mobile ad hoc network (MANET); mobility model; secrecy; throughput scaling; wiretap channel;
fLanguage :
English
Journal_Title :
Information Theory, IEEE Transactions on
Publisher :
ieee
ISSN :
0018-9448
Type :
jour
DOI :
10.1109/TIT.2011.2165800
Filename :
6034725
Link To Document :
بازگشت