Traffic Decorrelation Techniques for Countering Colluding Eavesdroppers in WSNs
نویسندگان
چکیده
Proof: Consider a source v with a hop-count η = |p(v, u)| to the destination u. Nodes in p(v, u) randomly select their transmission times within an interval T . Let the randomly selected transmission times be denoted by t1, t2, . . . , tη. We compute the average number of hops (H) traversed over T by a packet m originating at v1, using a combinatorial approach. The value of H depends on the arrangement order of t1, t2, . . . , tη. All possible arrangements nη! occur with equal probability, as the transmission times of each sensor are randomly and independently selected within T.. A packet traverses η hops during T , only if t1 < t2 < . . . < tη . This events occurs with probability,
منابع مشابه
On the Effect of Colluding Eavesdroppers on Secrecy Scaling
In a powerful secrecy attack, eavesdroppers can collude, i.e., they can share their observations. Securing information in such a scenario will be an even more challenging task compared to non-colluding case. We here analyze the effect of eavesdropper collusion on the achievable performance in both the path loss and ergodic multi-path fading models. We provide two results: 1) If the legitimate n...
متن کاملConstrained Colluding Eavesdroppers: An Information-Theoretic Model
We study the secrecy capacity in the vicinity of colluding eavesdroppers. Contrary to the perfect collusion assumption in previous works, our new information-theoretic model considers constraints in collusion. We derive the achievable secure rates (lower bounds on the perfect secrecy capacity), both for the discrete memoryless and Gaussian channels. We also compare the proposed rates to the non...
متن کاملPreserving Source-Location Privacy in Wireless Sensor Networks against a Global Eavesdropper
While many works to date in wireless sensor networks (WSNs) security have focused on providing confidentiality for message contents, contextual information usually remains exposed. Thus the adversary especially the global eavesdropper can easily obtain the sensitive information such as the location of a target object in a monitoring application, which is critical to the mission of the sensor ne...
متن کاملSafeguarding Millimeter Wave Communications Against Randomly Located Eavesdroppers
Millimeter wave offers a sensible solution to the capacity crunch faced by 5G wireless communications. This paper comprehensively studies physical layer security in a multi-input single-output (MISO) millimeter wave system where multiple single-antenna eavesdroppers are randomly located. Concerning the specific propagation characteristics of millimeter wave, we investigate two secure transmissi...
متن کاملSecure Communication in Stochastic Wireless Networks
Information-theoretic security – widely accepted as the strictest notion of security – relies on channel coding techniques that exploit the inherent randomness of the propagation channels to significantly strengthen the security of digital communications systems. Motivated by recent developments in the field, this paper aims at a characterization of the fundamental secrecy limits of wireless ne...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016