Wireless Information-Theoretic Security in MANETs

被引:0
|
作者
Chrysikos, Theofilos [1 ]
Dagiuklas, Tasos [1 ,2 ]
Kotsopoulos, Stavros [1 ]
Dagiuklas, Tasos [1 ,2 ]
机构
[1] Univ Patras, Dept Elect & Comp Engn, Patras, Greece
[2] Hellen Open Univ, Sch Sci & Technol, Patras, Greece
关键词
wireless information-theoretic security; ad-hoc networks; shadowing; interference; path loss; SECRET-KEY AGREEMENT; CHANNELS;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this work, the relation between the key parameters of Wireless Information-Theoretic Security, namely the probability of non-zero secrecy capacity, the outage probability, and the shadowing deviation is investigated. The purpose is to provide a framework to identify the boundaries of secure communication from a physical layer standpoint in MANETs. This framework is heavily influenced by the intrinsic channel characteristics and propagation irregularities that deviate from simplistic path loss assumptions such as the free space model or any similar deterministic approach that underestimates the fluctuations of the received signal power. This paper provides, for the first time, a realistically confirmed method for evaluating the reliability of the Wireless Information-Theoretic Solution in an obstacle-dense topology where no central infrastructure exists, as a consequence of a natural or man-made disaster, where severe losses in signal transmission and noise meddle with secure and reliable communications. Thus, a robust tool to the cause of Public Safety is provided.
引用
收藏
页码:692 / 696
页数:5
相关论文
共 50 条
  • [1] Wireless information-theoretic security
    Bloch, Matthieu
    Barros, Joao
    Rodrigues, Miguel R. D.
    McLaughlin, Steven W.
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) : 2515 - 2534
  • [2] An Information-theoretic Security Metric for Future Wireless Communication Systems
    Cao, Zhen
    Deng, Hui
    Lu, Lu
    Duan, Xiaodong
    2014 XXXITH URSI GENERAL ASSEMBLY AND SCIENTIFIC SYMPOSIUM (URSI GASS), 2014,
  • [3] Information-Theoretic Security with Asymmetries
    Beyne, Tim
    Chen, Yu Long
    ADVANCES IN CRYPTOLOGY - CRYPTO 2024, PT IV, 2024, 14923 : 463 - 494
  • [4] Universal Hashing for Information-Theoretic Security
    Tyagi, Himanshu
    Vardy, Alexander
    PROCEEDINGS OF THE IEEE, 2015, 103 (10) : 1781 - 1795
  • [5] Information-Spectrum Methods for Information-Theoretic Security
    Bloch, Matthieu
    Laneman, J. Nicholas
    2009 INFORMATION THEORY AND APPLICATIONS WORKSHOP, 2009, : 20 - 25
  • [6] Dynamic Information-Theoretic Measures for Security Informatics
    Colbaugh, Richard
    Glass, Kristin
    Bauer, Travis
    2013 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS: BIG DATA, EMERGENT THREATS, AND DECISION-MAKING IN SECURITY INFORMATICS, 2013, : 45 - 49
  • [7] Mosaics of combinatorial designs for information-theoretic security
    Wiese, Moritz
    Boche, Holger
    DESIGNS CODES AND CRYPTOGRAPHY, 2022, 90 (03) : 593 - 632
  • [8] Mosaics of combinatorial designs for information-theoretic security
    Moritz Wiese
    Holger Boche
    Designs, Codes and Cryptography, 2022, 90 : 593 - 632
  • [9] Optimal Information-Theoretic Wireless Location Verification
    Yan, Shihao
    Malaney, Robert
    Nevat, Ido
    Peters, Gareth W.
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2014, 63 (07) : 3410 - 3422
  • [10] Information-theoretic security without an honest majority
    Broadbent, Anne
    Tapp, Alain
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2007, 2007, 4833 : 410 - 426