Relay Secrecy in Wireless Networks with Eavesdropper
نویسندگان
چکیده
Anonymous monitoring of transmissions in a wireless network by eavesdroppers can provide critical information about the data flows in the network. It is, therefore, necessary to design network protocols that maintain secrecy of routes from eavesdroppers. In this work, we present a mathematical formulation of route secrecy when eavesdroppers observe transmission epochs of nodes. We propose a scheduling technique to provide complete secrecy of routes, and based on that, characterize achievable rate regions for two hop source destination pairs with a common relay under two PHY models : transmitter directed and receiver directed spread spectrum signaling. The results are also extended to the case when an additional constraint on packet loss is imposed. Index Terms Network Security, Secrecy, Multiple Access, Packet Loss.
منابع مشابه
Distributed beamforming designs to improve physical layer security in wireless relay networks
This paper investigates security-oriented beamforming designs in a relay network composed of a source-destination pair, multiple relays, and a passive eavesdropper. Unlike most of the earlier works, we assume that only statistical information of the relay-eavesdropper channels is known to the relays. We propose beamforming solutions for amplify-and-forward (AF) and decode-and-forward (DF) relay...
متن کاملOpportunistic relay selection for cooperative networks with secrecy constraints
This study deals with opportunistic relay selection in cooperative networks with secrecy constraints, where an eavesdropper node tries to overhead the source message. Previously reported relay selection techniques are optimised for non-eavesdropper environments and cannot ensure security. Two new opportunistic relay selection techniques, which incorporate the quality of the relay-eavesdropper l...
متن کاملInformation-Theoretic Secrecy for Wireless Networks
The aim of information-theoretic secrecy is to ensure that an eavesdropper who listens to the wireless transmission of a message can only collect an arbitrarily small number of information bits about this message. In contrast to cryptography, there are no assumptions on the computational power of the eavesdropper. Information-theoretically secret communication has been studied for many particul...
متن کاملSecure Ad-hoc Routing Scheme
This paper investigates on the problem of combining routing scheme and physical layer security in multihop wireless networks with cooperative diversity. We propose an ad-hoc natured hop-by-hop best secure relay selection in a multihop network with several relays and an eavesdropper at each hop which provides a safe routing scheme to transmit confidential message from transmitter to legitimate r...
متن کاملSecure Analog Network Coding in Layered Networks
We consider a class of Gaussian layered networks where a source communicates with a destination through L intermediate relay layers with N nodes in each layer in the presence of a single eavesdropper which can overhear the transmissions of the nodes in any one layer. The problem of maximum secrecy rate achievable with analog network coding for a unicast communication over such layered wireless ...
متن کاملPerformance Analysis of Cooperation Schemes in Eavesdropper Assisted Relay Channel
The prominence of the wireless communication has been urging the monotonically increasing demand of security and privacy. In wireless systems, the notion of perfect secrecy of information with respect to illegitimate nodes can be ensured via physical layer security (PLS) techniques. Unfortunately, they can be made less effective if sourceeavesdropper wiretap channel is better than the main sour...
متن کامل