Traffic Decorrelation Techniques for Countering Colluding Eavesdroppers in WSNs

نویسندگان

  • Alejandro Proaño
  • Loukas Lazos
  • Marwan Krunz
چکیده

Proof: Consider a source v with a hop-count η = |p(v, u)| to the destination u. Nodes in p(v, u) randomly select their transmission times within an interval T . Let the randomly selected transmission times be denoted by t1, t2, . . . , tη. We compute the average number of hops (H) traversed over T by a packet m originating at v1, using a combinatorial approach. The value of H depends on the arrangement order of t1, t2, . . . , tη. All possible arrangements nη! occur with equal probability, as the transmission times of each sensor are randomly and independently selected within T.. A packet traverses η hops during T , only if t1 < t2 < . . . < tη . This events occurs with probability,

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On the Effect of Colluding Eavesdroppers on Secrecy Scaling

In a powerful secrecy attack, eavesdroppers can collude, i.e., they can share their observations. Securing information in such a scenario will be an even more challenging task compared to non-colluding case. We here analyze the effect of eavesdropper collusion on the achievable performance in both the path loss and ergodic multi-path fading models. We provide two results: 1) If the legitimate n...

متن کامل

Constrained Colluding Eavesdroppers: An Information-Theoretic Model

We study the secrecy capacity in the vicinity of colluding eavesdroppers. Contrary to the perfect collusion assumption in previous works, our new information-theoretic model considers constraints in collusion. We derive the achievable secure rates (lower bounds on the perfect secrecy capacity), both for the discrete memoryless and Gaussian channels. We also compare the proposed rates to the non...

متن کامل

Preserving Source-Location Privacy in Wireless Sensor Networks against a Global Eavesdropper

While many works to date in wireless sensor networks (WSNs) security have focused on providing confidentiality for message contents, contextual information usually remains exposed. Thus the adversary especially the global eavesdropper can easily obtain the sensitive information such as the location of a target object in a monitoring application, which is critical to the mission of the sensor ne...

متن کامل

Safeguarding Millimeter Wave Communications Against Randomly Located Eavesdroppers

Millimeter wave offers a sensible solution to the capacity crunch faced by 5G wireless communications. This paper comprehensively studies physical layer security in a multi-input single-output (MISO) millimeter wave system where multiple single-antenna eavesdroppers are randomly located. Concerning the specific propagation characteristics of millimeter wave, we investigate two secure transmissi...

متن کامل

Secure Communication in Stochastic Wireless Networks

Information-theoretic security – widely accepted as the strictest notion of security – relies on channel coding techniques that exploit the inherent randomness of the propagation channels to significantly strengthen the security of digital communications systems. Motivated by recent developments in the field, this paper aims at a characterization of the fundamental secrecy limits of wireless ne...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016