Wireless Information-Theoretic Security in MANETs

被引:0
|
作者
Chrysikos, Theofilos [1 ]
Dagiuklas, Tasos [1 ,2 ]
Kotsopoulos, Stavros [1 ]
Dagiuklas, Tasos [1 ,2 ]
机构
[1] Univ Patras, Dept Elect & Comp Engn, Patras, Greece
[2] Hellen Open Univ, Sch Sci & Technol, Patras, Greece
关键词
wireless information-theoretic security; ad-hoc networks; shadowing; interference; path loss; SECRET-KEY AGREEMENT; CHANNELS;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this work, the relation between the key parameters of Wireless Information-Theoretic Security, namely the probability of non-zero secrecy capacity, the outage probability, and the shadowing deviation is investigated. The purpose is to provide a framework to identify the boundaries of secure communication from a physical layer standpoint in MANETs. This framework is heavily influenced by the intrinsic channel characteristics and propagation irregularities that deviate from simplistic path loss assumptions such as the free space model or any similar deterministic approach that underestimates the fluctuations of the received signal power. This paper provides, for the first time, a realistically confirmed method for evaluating the reliability of the Wireless Information-Theoretic Solution in an obstacle-dense topology where no central infrastructure exists, as a consequence of a natural or man-made disaster, where severe losses in signal transmission and noise meddle with secure and reliable communications. Thus, a robust tool to the cause of Public Safety is provided.
引用
收藏
页码:692 / 696
页数:5
相关论文
共 50 条
  • [31] An Information-Theoretic Security Evaluation of a Class of Randomized Encryption Schemes
    Oggier, Frederique
    Mihaljevic, Miodrag J.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (02) : 158 - 168
  • [32] Publicly verifiable secret sharing scheme with information-theoretic security
    Tang, Chun-Ming
    Pei, Ding-Yi
    Zhao, Yan-Meng
    Shi, Gui-Hua
    Shenzhen Daxue Xuebao (Ligong Ban)/Journal of Shenzhen University Science and Engineering, 2009, 26 (02): : 121 - 126
  • [33] On the Information-Theoretic Security of Combinatorial All-or-Nothing Transforms
    Gu, Yujie
    Akao, Sonata
    Esfahani, Navid Nasr
    Miao, Ying
    Sakurai, Kouichi
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2022, 68 (10) : 6904 - 6914
  • [34] An overview of information-theoretic security and privacy: Metrics, limits and applications
    Bloch M.
    Günlü O.
    Yener A.
    Oggier F.
    Poor H.V.
    Sankar L.
    Schaefer R.F.
    IEEE Journal on Selected Areas in Information Theory, 2021, 2 (01): : 5 - 22
  • [35] Bit Security Estimation Using Various Information-Theoretic Measures
    Lee, Dong-Hoon
    Kim, Young-Sik
    No, Jong-Seon
    IEEE ACCESS, 2021, 9 : 140103 - 140115
  • [36] Efficient Threshold Function Secret Sharing With Information-Theoretic Security
    Luo, Jinglong
    Zhang, Liang Feng
    Lin, Fuchun
    Lin, Changlu
    IEEE ACCESS, 2020, 8 (08): : 6523 - 6532
  • [37] The Degrees of Freedom of Wireless Networks: Information-theoretic and Physical Limits
    Franceschetti, Massimo
    Migliore, Marco D.
    Minero, Paolo
    2008 46TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, VOLS 1-3, 2008, : 1578 - +
  • [38] Information-Theoretic Caching
    Wang, Chien-Yi
    Lim, Sung Hoon
    Gastpar, Michael
    2015 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2015, : 1776 - 1780
  • [39] INFORMATION-THEORETIC INCOMPLETENESS
    CHAITIN, GJ
    APPLIED MATHEMATICS AND COMPUTATION, 1992, 52 (01) : 83 - 101
  • [40] The information-theoretic turn
    Blevins, James P.
    PSIHOLOGIJA, 2013, 46 (04) : 355 - 375