4.5 Article

Optimal Secrecy Capacity-Delay Tradeoff in Large-Scale Mobile Ad Hoc Networks

Journal

IEEE-ACM TRANSACTIONS ON NETWORKING
Volume 24, Issue 2, Pages 1139-1152

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TNET.2015.2405793

Keywords

Capacity-delay tradeoff; mobile ad hoc networks (MANETs); secrecy constraint

Funding

  1. NSF China [61325012, 61271219, 61221001, 61428205]
  2. China Ministry of Education Doctor Program [20130073110025]
  3. Shanghai Basic Research Key Project [11JC1405100, 13510711300, 12JC1405200]
  4. Shanghai International Cooperation Project [13510711300]

Ask authors/readers for more resources

In this paper, we investigate the impact of information-theoretic secrecy constraint on the capacity and delay of mobile ad hoc networks (MANETs) with mobile legitimate nodes and static eavesdroppers whose location and channel state information (CSI) are both unknown. We assume legitimate nodes move according to the fast i.i.d. mobility pattern and each desires to communicate with one randomly selected destination node. There are also static eavesdroppers located uniformly in the network and we assume the number of eavesdroppers is much larger than that of legitimate nodes, i.e., nu > 1 We propose a novel simple secure communication model, i.e., the secure protocol model, and prove its equivalence to the widely accepted secure physical model under a few technical assumptions. Based on the proposed model, a framework of analyzing the secrecy capacity and delay in MANETs is established. Given a delay constraint D, we find that the optimal secrecy throughput capacity is (Theta) over tilde (W((D/n))((2/3))), where W is the data rate of each link. We observe that: 1) the capacity-delay tradeoff is independent of the number of eavesdroppers, which indicates that adding more eavesdroppers will not degenerate the performance of the legitimate network as long as nu > 1; 2) the capacity-delay tradeoff of our paper outperforms the previous result Theta((1/n Psi(e))) in [11], where Psi(e) = n(nu-1) = omega(1) is the density of the eavesdroppers. Throughout this paper, for functions f(n) and g(n), we denote f(n) = o(g(n) if lim(n ->infinity)(f(n)/g(n)) = 0; f(n) = omega(g(n)) if g(n) = o(f(n)); f(n) = O(g(n)) if there is a positive constant c such that f(n) <= cg(n) for sufficiently large n; f(n) = Omega(g(n)) if g(n) =(O) over bar (f(n)); f(n) = Theta(g(n)) if both f(n) = O(g(n)) and f(n) = Omega(g(n)) hold. Besides, the order notation (Theta) over tilde omits the polylogarithmic factors for better readability.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available