Distributed Network Secrecy
- 26 August 2013
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Journal on Selected Areas in Communications
- Vol. 31 (9), 1889-1900
- https://doi.org/10.1109/jsac.2013.130920
Abstract
Secrecy is essential for a variety of emerging wireless applications where distributed confidential information is communicated in a multilevel network from sources to destinations. Network secrecy can be accomplished by exploiting the intrinsic properties of multilevel wireless networks (MWN). This paper introduces the concept of distributed network secrecy (DNS) and develops a framework for the design and analysis of secure, reliable, and efficient MWNs. Our framework accounts for node spatial distribution, multilevel cluster formation, propagation medium, communication protocol, and energy consumption. This research provides a foundation for DNS and offers a new perspective on the relationship between DNS and network lifetime.Keywords
This publication has 56 references indexed in Scilit:
- Collaborative signal and information processing: An information-directed approachProceedings of the IEEE, 2003
- Probability distributions for the number of radio transceivers which can communicate with one anotherIEEE Transactions on Communications, 2003
- Sensor networks: an overviewIEEE Potentials, 2003
- Co-channel interference modeling and analysis in a poisson field of interferers in wireless communicationsIEEE Transactions on Signal Processing, 2003
- Performance of FH SS radio networks with interference modeled as a mixture of Gaussian and alpha-stable noiseIEEE Transactions on Communications, 1998
- Common randomness in information theory and cryptography. I. Secret sharingIEEE Transactions on Information Theory, 1993
- Performance of a spread spectrum packet radio network link in a Poisson field of interferersIEEE Transactions on Information Theory, 1992
- The Gaussian wire-tap channelIEEE Transactions on Information Theory, 1978
- Broadcast channels with confidential messagesIEEE Transactions on Information Theory, 1978
- Note on the Inversion TheoremBiometrika, 1951