Eavesdropping Security in Wireless Ad Hoc Networks with Directional Antennas

被引:0
|
作者
Wang, Qiu [1 ]
Dai, Hong-Ning [1 ]
Zhao, Qinglin [1 ]
机构
[1] Macau Univ Sci & Technol, Fac Informat Technol, Macao, Peoples R China
关键词
CONNECTIVITY;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The eavesdropping security of wireless ad hoc networks has attracted considerable attention recently. However, most of current studies only consider OMN networks, where each node is mounted with a single omni-directional antenna, which radiates radio signals in all directions and consequently leads to the high eavesdropping possibility. Compared with an omni-directional antenna, a directional antenna can concentrate the radio signals on some desired directions so that it can potentially reduce the eavesdropping possibility. This paper investigates the eavesdropping security of wireless ad hoc networks equipped with directional antennas. In particular, we study the eavesdropping possibility of OMN networks, SDA networks in which each node is equipped with a simplistic directional antenna and RDA networks in which each node is equipped with a realistic directional antenna. More specifically, we identify the eavesdropping activity in wireless networks and propose an eavesdropping model to measure the eavesdropping possibility. We conduct extensive simulations to evaluate the eavesdropping possibility of OMN networks, SDA networks and RDA networks with considering various environment factors, such as path loss attenuation and shadowing effects. Our simulation results show that using a simplistic directional antenna or a realistic antenna in wireless networks can reduce the eavesdropping possibility.
引用
收藏
页码:687 / 692
页数:6
相关论文
共 50 条
  • [21] Addressing deafness problems in wireless ad-hoc networks with directional antennas
    Chen, Kai
    Jiang, Fail
    2007 4TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2007, : 171 - 176
  • [22] A BIBD based MAC protocol for wireless ad hoc networks with directional antennas
    Boggia, G.
    Camarda, P.
    Cormio, C.
    Grieco, L. A.
    CSNDSP 08: PROCEEDINGS OF THE SIXTH INTERNATIONAL SYMPOSIUM ON COMMUNICATION SYSTEMS, NETWORKS AND DIGITAL SIGNAL PROCESSING, 2008, : 25 - 29
  • [23] A Power Efficient MAC Protocol for Wireless Ad hoc Networks that uses Directional Antennas
    Sarkar, Mahasweta
    Poduri, Chandrasekhar
    WCECS 2009: WORLD CONGRESS ON ENGINEERING AND COMPUTER SCIENCE, VOLS I AND II, 2009, : 339 - 344
  • [24] Interference and Power Constrained Broadcasting and Multicasting in Wireless Ad Hoc Networks with Directional Antennas
    Li, Zheng
    Li, Deying
    Liu, Ming
    2009 IEEE 6TH INTERNATIONAL CONFERENCE ON MOBILE ADHOC AND SENSOR SYSTEMS (MASS 2009), 2009, : 717 - 726
  • [25] Deafness-aware MAC protocol for directional antennas in wireless ad hoc networks
    Na, Woongsoo
    Park, Laihyuk
    Cho, Sungrae
    AD HOC NETWORKS, 2015, 24 : 121 - 134
  • [26] On Wireless Ad Hoc Networks with Directional Antennas: Efficient Collision and Deafness Avoidance Mechanisms
    Yihu Li
    Ahmed Safwat
    EURASIP Journal on Wireless Communications and Networking, 2008
  • [27] Energy-efficient broadcasting in wireless ad hoc networks using directional antennas
    Acharya, Tamaghna
    Roy, Rajarshi
    Chattopadhyay, Samiran
    2008 IEEE 67TH VEHICULAR TECHNOLOGY CONFERENCE-SPRING, VOLS 1-7, 2008, : 36 - +
  • [28] Design of a routing protocol that exploits the availability of directional antennas in wireless ad hoc networks
    Swaminathan, Arvind
    Noneaker, Daniel L.
    Russell, Harlan B.
    MILCOM 2006, VOLS 1-7, 2006, : 512 - +
  • [29] Multi-channel MAC protocol with Directional Antennas in Wireless Ad hoc Networks
    Duc Ngoc Minh Dang
    Le, Huong Tra
    Kang, Hyo Sung
    Hong, Choong Seon
    Choe, Jongwon
    2015 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2015, : 81 - 86
  • [30] INCREASING PERFORMANCE THROUGH SDMAC USING DIRECTIONAL ANTENNAS IN WIRELESS AD HOC NETWORKS
    Kiran, P. Sai
    Reddy, L. S. S.
    FIFTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER THEORY AND ENGINEERING (ICACTE 2012), 2012, : 799 - 808