Please use this identifier to cite or link to this item: http://localhost/handle/Hannan/660834
Title: Optimal Secrecy Capacity-Delay Tradeoff in Large-Scale Mobile Ad Hoc Networks
Authors: Xuanyu Cao;Jinbei Zhang;Luoyi Fu;Weijie Wu;Xinbing Wang
subject: secrecy constraint;mobile ad hoc networks (MANETs);Capacity–delay tradeoff
Year: 2016
Publisher: IEEE
Abstract: In this paper, we investigate the impact of information-theoretic secrecy constraint on the capacity and delay of mobile ad hoc networks (MANETs) with mobile legitimate nodes and static eavesdroppers whose location and channel state information (CSI) are both unknown. We assume n legitimate nodes move according to the fast i.i.d. mobility pattern and each desires to communicate with one randomly selected destination node. There are also nν static eavesdroppers located uniformly in the network and we assume the number of eavesdroppers is much larger than that of legitimate nodes, i.e., ν > 1. We propose a novel simple secure communication model, i.e., the secure protocol model, and prove its equivalence to the widely accepted secure physical model under a few technical assumptions. Based on the proposed model, a framework of analyzing the secrecy capacity and delay in MANETs is established. Given a delay constraint D, we find that the optimal secrecy throughput capacity is ~Θ(W((D/n))(2/3) ), where W is the data rate of each link. We observe that: 1) the capacity-delay tradeoff is independent of the number of eavesdroppers, which indicates that adding more eavesdroppers will not degenerate the performance of the legitimate network as long as ν > 1; 2) the capacity-delay tradeoff of our paper outperforms the previous result Θ((1/nψe)) in , where ψe=nν-1 =ω(1) is the density of the eavesdroppers. Throughout this paper, for functions f and g, we denote f=o(g) if limn→∞(f/g)=0; f=ω(g) if g=o(f); f=O(g) if there is a positive constant c such that f ≤ cg for sufficiently large n; f=Ω(g) if g=O(f); f=Θ(g) if both f=O(g) and f=Ω(g) hold. Besides, the order notation ~Θ omits the polylogarithmic factors for better readability.
URI: http://localhost/handle/Hannan/154683
http://localhost/handle/Hannan/660834
ISSN: 1063-6692
1558-2566
volume: 24
issue: 2
Appears in Collections:2016

Files in This Item:
File Description SizeFormat 
7076660.pdf2.57 MBAdobe PDFThumbnail
Preview File
Title: Optimal Secrecy Capacity-Delay Tradeoff in Large-Scale Mobile Ad Hoc Networks
Authors: Xuanyu Cao;Jinbei Zhang;Luoyi Fu;Weijie Wu;Xinbing Wang
subject: secrecy constraint;mobile ad hoc networks (MANETs);Capacity–delay tradeoff
Year: 2016
Publisher: IEEE
Abstract: In this paper, we investigate the impact of information-theoretic secrecy constraint on the capacity and delay of mobile ad hoc networks (MANETs) with mobile legitimate nodes and static eavesdroppers whose location and channel state information (CSI) are both unknown. We assume n legitimate nodes move according to the fast i.i.d. mobility pattern and each desires to communicate with one randomly selected destination node. There are also nν static eavesdroppers located uniformly in the network and we assume the number of eavesdroppers is much larger than that of legitimate nodes, i.e., ν > 1. We propose a novel simple secure communication model, i.e., the secure protocol model, and prove its equivalence to the widely accepted secure physical model under a few technical assumptions. Based on the proposed model, a framework of analyzing the secrecy capacity and delay in MANETs is established. Given a delay constraint D, we find that the optimal secrecy throughput capacity is ~Θ(W((D/n))(2/3) ), where W is the data rate of each link. We observe that: 1) the capacity-delay tradeoff is independent of the number of eavesdroppers, which indicates that adding more eavesdroppers will not degenerate the performance of the legitimate network as long as ν > 1; 2) the capacity-delay tradeoff of our paper outperforms the previous result Θ((1/nψe)) in , where ψe=nν-1 =ω(1) is the density of the eavesdroppers. Throughout this paper, for functions f and g, we denote f=o(g) if limn→∞(f/g)=0; f=ω(g) if g=o(f); f=O(g) if there is a positive constant c such that f ≤ cg for sufficiently large n; f=Ω(g) if g=O(f); f=Θ(g) if both f=O(g) and f=Ω(g) hold. Besides, the order notation ~Θ omits the polylogarithmic factors for better readability.
URI: http://localhost/handle/Hannan/154683
http://localhost/handle/Hannan/660834
ISSN: 1063-6692
1558-2566
volume: 24
issue: 2
Appears in Collections:2016

Files in This Item:
File Description SizeFormat 
7076660.pdf2.57 MBAdobe PDFThumbnail
Preview File
Title: Optimal Secrecy Capacity-Delay Tradeoff in Large-Scale Mobile Ad Hoc Networks
Authors: Xuanyu Cao;Jinbei Zhang;Luoyi Fu;Weijie Wu;Xinbing Wang
subject: secrecy constraint;mobile ad hoc networks (MANETs);Capacity–delay tradeoff
Year: 2016
Publisher: IEEE
Abstract: In this paper, we investigate the impact of information-theoretic secrecy constraint on the capacity and delay of mobile ad hoc networks (MANETs) with mobile legitimate nodes and static eavesdroppers whose location and channel state information (CSI) are both unknown. We assume n legitimate nodes move according to the fast i.i.d. mobility pattern and each desires to communicate with one randomly selected destination node. There are also nν static eavesdroppers located uniformly in the network and we assume the number of eavesdroppers is much larger than that of legitimate nodes, i.e., ν > 1. We propose a novel simple secure communication model, i.e., the secure protocol model, and prove its equivalence to the widely accepted secure physical model under a few technical assumptions. Based on the proposed model, a framework of analyzing the secrecy capacity and delay in MANETs is established. Given a delay constraint D, we find that the optimal secrecy throughput capacity is ~Θ(W((D/n))(2/3) ), where W is the data rate of each link. We observe that: 1) the capacity-delay tradeoff is independent of the number of eavesdroppers, which indicates that adding more eavesdroppers will not degenerate the performance of the legitimate network as long as ν > 1; 2) the capacity-delay tradeoff of our paper outperforms the previous result Θ((1/nψe)) in , where ψe=nν-1 =ω(1) is the density of the eavesdroppers. Throughout this paper, for functions f and g, we denote f=o(g) if limn→∞(f/g)=0; f=ω(g) if g=o(f); f=O(g) if there is a positive constant c such that f ≤ cg for sufficiently large n; f=Ω(g) if g=O(f); f=Θ(g) if both f=O(g) and f=Ω(g) hold. Besides, the order notation ~Θ omits the polylogarithmic factors for better readability.
URI: http://localhost/handle/Hannan/154683
http://localhost/handle/Hannan/660834
ISSN: 1063-6692
1558-2566
volume: 24
issue: 2
Appears in Collections:2016

Files in This Item:
File Description SizeFormat 
7076660.pdf2.57 MBAdobe PDFThumbnail
Preview File