Secrecy throughput of MANETs with malicious nodes
- 1 June 2009
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- p. 1189-1193
- https://doi.org/10.1109/isit.2009.5205992
Abstract
The secrecy throughput of mobile ad-hoc networks (MANETs) with malicious nodes is investigated. The MANET consists of n legitimate mobile nodes and m malicious nodes. Transmissions between legitimate nodes are subject to a delay constraint D. An information theoretic approach for security is applied to achieve secure communication among legitimate nodes in MANETs with transmissions being kept perfectly secure from malicious nodes. A critical threshold on the number of malicious nodes (m) is identified such that when m = o(radicnD), i.e., limnrarrinfin m/radicnD = 0, the secrecy throughput equals the throughput of MANETs without malicious nodes, i.e., the impact of the presence of malicious nodes on the network throughput is negligible; and when m = Omega (radicnDpoly(n)), i.e., limnrarrinfin m/(radicnDpoly(n)) ges c for a positive constant c, the secrecy throughput is limited by the number of malicious nodes.Keywords
This publication has 14 references indexed in Scilit:
- Optimal Delay–Throughput Tradeoffs in Mobile Ad Hoc NetworksIEEE Transactions on Information Theory, 2008
- Applications of LDPC Codes to the Wiretap ChannelIEEE Transactions on Information Theory, 2007
- Throughput and Delay in Random Wireless Networks With Restricted MobilityIEEE Transactions on Information Theory, 2007
- Capacity and Delay Tradeoffs for Ad Hoc Mobile NetworksIEEE Transactions on Information Theory, 2005
- Even one-dimensional mobility increases ad hoc wireless capacityPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Mobility increases the capacity of ad-hoc wireless networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- The capacity of wireless networksIEEE Transactions on Information Theory, 2000
- Wire-Tap Channel IIAT&T Bell Laboratories Technical Journal, 1984
- Broadcast channels with confidential messagesIEEE Transactions on Information Theory, 1978
- The Wire-Tap ChannelBell System Technical Journal, 1975