Optimal Secrecy Capacity-Delay Tradeoff in Large-Scale Mobile Ad Hoc Networks

被引:8
|
作者
Cao, Xuanyu [1 ]
Zhang, Jinbei [1 ]
Fu, Luoyi [1 ]
Wu, Weijie [2 ]
Wang, Xinbing [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Elect Engn, Shanghai 200240, Shanghai, Peoples R China
[2] Shanghai Jiao Tong Univ, Dept Elect Elect & Informat Engn, Shanghai 200240, Shanghai, Peoples R China
关键词
Capacity-delay tradeoff; mobile ad hoc networks (MANETs); secrecy constraint; WIRELESS NETWORKS; MULTICAST CAPACITY; THROUGHPUT;
D O I
10.1109/TNET.2015.2405793
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we investigate the impact of information-theoretic secrecy constraint on the capacity and delay of mobile ad hoc networks (MANETs) with mobile legitimate nodes and static eavesdroppers whose location and channel state information (CSI) are both unknown. We assume legitimate nodes move according to the fast i.i.d. mobility pattern and each desires to communicate with one randomly selected destination node. There are also static eavesdroppers located uniformly in the network and we assume the number of eavesdroppers is much larger than that of legitimate nodes, i.e., nu > 1 We propose a novel simple secure communication model, i.e., the secure protocol model, and prove its equivalence to the widely accepted secure physical model under a few technical assumptions. Based on the proposed model, a framework of analyzing the secrecy capacity and delay in MANETs is established. Given a delay constraint D, we find that the optimal secrecy throughput capacity is (Theta) over tilde (W((D/n))((2/3))), where W is the data rate of each link. We observe that: 1) the capacity-delay tradeoff is independent of the number of eavesdroppers, which indicates that adding more eavesdroppers will not degenerate the performance of the legitimate network as long as nu > 1; 2) the capacity-delay tradeoff of our paper outperforms the previous result Theta((1/n Psi(e))) in [11], where Psi(e) = n(nu-1) = omega(1) is the density of the eavesdroppers. Throughout this paper, for functions f(n) and g(n), we denote f(n) = o(g(n) if lim(n ->infinity)(f(n)/g(n)) = 0; f(n) = omega(g(n)) if g(n) = o(f(n)); f(n) = O(g(n)) if there is a positive constant c such that f(n) <= cg(n) for sufficiently large n; f(n) = Omega(g(n)) if g(n) =(O) over bar (f(n)); f(n) = Theta(g(n)) if both f(n) = O(g(n)) and f(n) = Omega(g(n)) hold. Besides, the order notation (Theta) over tilde omits the polylogarithmic factors for better readability.
引用
收藏
页码:1139 / 1152
页数:14
相关论文
共 50 条
  • [21] Effect of Multiple Antennas on the Transport Capacity in Large-Scale Ad Hoc Networks
    Shin, Won-Yong
    Ishibashi, Koji
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2012, E95B (10) : 3113 - 3119
  • [22] Impact of Secrecy on Capacity in Large-Scale Wireless Networks
    Zhang, Jinbei
    Pu, Luoyi
    Wang, Xinbing
    [J]. 2012 PROCEEDINGS IEEE INFOCOM, 2012, : 3051 - 3055
  • [23] Secrecy Capacity Scaling of Large-Scale Cognitive Networks
    Chen, Yitao
    Zhang, Jinbei
    Wang, Xinbing
    Tian, Xiaohua
    Wu, Weijie
    Wu, Fan
    Tan, Chee Wei
    [J]. MOBIHOC'14: PROCEEDINGS OF THE 15TH ACM INTERNATIONAL SYMPOSIUM ON MOBILE AD HOC NETWORKING AND COMPUTING, 2014, : 125 - 134
  • [24] Capacity-Delay Trade-Off in Collaborative Hybrid Ad-Hoc Networks with Coverage Sensing
    Chen, Lingyu
    Luo, Wenbin
    Liu, Chen
    Hong, Xuemin
    Shi, Jianghong
    [J]. SENSORS, 2017, 17 (02)
  • [25] Capacity and Delay Analysis for Large Social-Aware Mobile Ad Hoc Wireless Networks
    Zhou, Yang
    Shi, Yan
    Chen, Shanzhi
    [J]. APPLIED SCIENCES-BASEL, 2020, 10 (05):
  • [26] Quality-Delay Tradeoff for Video Streaming over Mobile Ad Hoc Networks
    Zhou, Liang
    Zhang, Yan
    Rodrigues, Joel
    Geller, Benoit
    Cui, Jingwu
    Zheng, Baoyu
    [J]. 2012 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2012,
  • [27] Routing in large-scale buses ad hoc networks
    Sede, Michel
    Li, Xu
    Li, Da
    Wu, Min-You
    Li, Minglu
    Shu, Wei
    [J]. WCNC 2008: IEEE WIRELESS COMMUNICATIONS & NETWORKING CONFERENCE, VOLS 1-7, 2008, : 2711 - +
  • [28] A Survey on DHT-Based Routing for Large-Scale Mobile Ad Hoc Networks
    Abid, Shahbaz Akhtar
    Othman, Mazliza
    Shah, Nadir
    [J]. ACM COMPUTING SURVEYS, 2015, 47 (02)
  • [29] Performance of routing protocols in very large-scale mobile wireless ad hoc networks
    Zhang, X
    Riley, GF
    [J]. MASCOTS 2005:13TH IEEE INTERNATIONAL SYMPOSIUM ON MODELING, ANALYSIS, AND SIMULATION OF COMPUTER AND TELECOMMUNICATION SYSTEMS, 2005, : 115 - 122
  • [30] Multipath Routing with Reliable Nodes in Large-Scale Mobile Ad-Hoc Networks
    Ge, Yun
    Wang, Guojun
    Zhang, Qing
    Guo, Minyi
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2009, E92D (09): : 1675 - 1682