4.5 Article

Optimal Secrecy Capacity-Delay Tradeoff in Large-Scale Mobile Ad Hoc Networks

期刊

IEEE-ACM TRANSACTIONS ON NETWORKING
卷 24, 期 2, 页码 1139-1152

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TNET.2015.2405793

关键词

Capacity-delay tradeoff; mobile ad hoc networks (MANETs); secrecy constraint

资金

  1. NSF China [61325012, 61271219, 61221001, 61428205]
  2. China Ministry of Education Doctor Program [20130073110025]
  3. Shanghai Basic Research Key Project [11JC1405100, 13510711300, 12JC1405200]
  4. Shanghai International Cooperation Project [13510711300]

向作者/读者索取更多资源

In this paper, we investigate the impact of information-theoretic secrecy constraint on the capacity and delay of mobile ad hoc networks (MANETs) with mobile legitimate nodes and static eavesdroppers whose location and channel state information (CSI) are both unknown. We assume legitimate nodes move according to the fast i.i.d. mobility pattern and each desires to communicate with one randomly selected destination node. There are also static eavesdroppers located uniformly in the network and we assume the number of eavesdroppers is much larger than that of legitimate nodes, i.e., nu > 1 We propose a novel simple secure communication model, i.e., the secure protocol model, and prove its equivalence to the widely accepted secure physical model under a few technical assumptions. Based on the proposed model, a framework of analyzing the secrecy capacity and delay in MANETs is established. Given a delay constraint D, we find that the optimal secrecy throughput capacity is (Theta) over tilde (W((D/n))((2/3))), where W is the data rate of each link. We observe that: 1) the capacity-delay tradeoff is independent of the number of eavesdroppers, which indicates that adding more eavesdroppers will not degenerate the performance of the legitimate network as long as nu > 1; 2) the capacity-delay tradeoff of our paper outperforms the previous result Theta((1/n Psi(e))) in [11], where Psi(e) = n(nu-1) = omega(1) is the density of the eavesdroppers. Throughout this paper, for functions f(n) and g(n), we denote f(n) = o(g(n) if lim(n ->infinity)(f(n)/g(n)) = 0; f(n) = omega(g(n)) if g(n) = o(f(n)); f(n) = O(g(n)) if there is a positive constant c such that f(n) <= cg(n) for sufficiently large n; f(n) = Omega(g(n)) if g(n) =(O) over bar (f(n)); f(n) = Theta(g(n)) if both f(n) = O(g(n)) and f(n) = Omega(g(n)) hold. Besides, the order notation (Theta) over tilde omits the polylogarithmic factors for better readability.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据