Please use this identifier to cite or link to this item:

`http://localhost/handle/Hannan/660834`

Title: | Optimal Secrecy Capacity-Delay Tradeoff in Large-Scale Mobile Ad Hoc Networks |

Authors: | Xuanyu Cao;Jinbei Zhang;Luoyi Fu;Weijie Wu;Xinbing Wang |

subject: | secrecy constraint;mobile ad hoc networks (MANETs);Capacity–delay tradeoff |

Year: | 2016 |

Publisher: | IEEE |

Abstract: | In this paper, we investigate the impact of information-theoretic secrecy constraint on the capacity and delay of mobile ad hoc networks (MANETs) with mobile legitimate nodes and static eavesdroppers whose location and channel state information (CSI) are both unknown. We assume n legitimate nodes move according to the fast i.i.d. mobility pattern and each desires to communicate with one randomly selected destination node. There are also nν static eavesdroppers located uniformly in the network and we assume the number of eavesdroppers is much larger than that of legitimate nodes, i.e., ν > 1. We propose a novel simple secure communication model, i.e., the secure protocol model, and prove its equivalence to the widely accepted secure physical model under a few technical assumptions. Based on the proposed model, a framework of analyzing the secrecy capacity and delay in MANETs is established. Given a delay constraint D, we find that the optimal secrecy throughput capacity is ~Θ(W((D/n))(2/3) ), where W is the data rate of each link. We observe that: 1) the capacity-delay tradeoff is independent of the number of eavesdroppers, which indicates that adding more eavesdroppers will not degenerate the performance of the legitimate network as long as ν > 1; 2) the capacity-delay tradeoff of our paper outperforms the previous result Θ((1/nψe)) in , where ψe=nν-1 =ω(1) is the density of the eavesdroppers. Throughout this paper, for functions f and g, we denote f=o(g) if limn→∞(f/g)=0; f=ω(g) if g=o(f); f=O(g) if there is a positive constant c such that f ≤ cg for sufficiently large n; f=Ω(g) if g=O(f); f=Θ(g) if both f=O(g) and f=Ω(g) hold. Besides, the order notation ~Θ omits the polylogarithmic factors for better readability. |

URI: | http://localhost/handle/Hannan/154683 http://localhost/handle/Hannan/660834 |

ISSN: | 1063-6692 1558-2566 |

volume: | 24 |

issue: | 2 |

Appears in Collections: | 2016 |

Files in This Item:

File | Description | Size | Format | |
---|---|---|---|---|

7076660.pdf | 2.57 MB | Adobe PDF | Preview File |

Title: | Optimal Secrecy Capacity-Delay Tradeoff in Large-Scale Mobile Ad Hoc Networks |

Authors: | Xuanyu Cao;Jinbei Zhang;Luoyi Fu;Weijie Wu;Xinbing Wang |

subject: | secrecy constraint;mobile ad hoc networks (MANETs);Capacity–delay tradeoff |

Year: | 2016 |

Publisher: | IEEE |

Abstract: | In this paper, we investigate the impact of information-theoretic secrecy constraint on the capacity and delay of mobile ad hoc networks (MANETs) with mobile legitimate nodes and static eavesdroppers whose location and channel state information (CSI) are both unknown. We assume n legitimate nodes move according to the fast i.i.d. mobility pattern and each desires to communicate with one randomly selected destination node. There are also nν static eavesdroppers located uniformly in the network and we assume the number of eavesdroppers is much larger than that of legitimate nodes, i.e., ν > 1. We propose a novel simple secure communication model, i.e., the secure protocol model, and prove its equivalence to the widely accepted secure physical model under a few technical assumptions. Based on the proposed model, a framework of analyzing the secrecy capacity and delay in MANETs is established. Given a delay constraint D, we find that the optimal secrecy throughput capacity is ~Θ(W((D/n))(2/3) ), where W is the data rate of each link. We observe that: 1) the capacity-delay tradeoff is independent of the number of eavesdroppers, which indicates that adding more eavesdroppers will not degenerate the performance of the legitimate network as long as ν > 1; 2) the capacity-delay tradeoff of our paper outperforms the previous result Θ((1/nψe)) in , where ψe=nν-1 =ω(1) is the density of the eavesdroppers. Throughout this paper, for functions f and g, we denote f=o(g) if limn→∞(f/g)=0; f=ω(g) if g=o(f); f=O(g) if there is a positive constant c such that f ≤ cg for sufficiently large n; f=Ω(g) if g=O(f); f=Θ(g) if both f=O(g) and f=Ω(g) hold. Besides, the order notation ~Θ omits the polylogarithmic factors for better readability. |

URI: | http://localhost/handle/Hannan/154683 http://localhost/handle/Hannan/660834 |

ISSN: | 1063-6692 1558-2566 |

volume: | 24 |

issue: | 2 |

Appears in Collections: | 2016 |

Files in This Item:

File | Description | Size | Format | |
---|---|---|---|---|

7076660.pdf | 2.57 MB | Adobe PDF | Preview File |

Title: | Optimal Secrecy Capacity-Delay Tradeoff in Large-Scale Mobile Ad Hoc Networks |

Authors: | Xuanyu Cao;Jinbei Zhang;Luoyi Fu;Weijie Wu;Xinbing Wang |

subject: | secrecy constraint;mobile ad hoc networks (MANETs);Capacity–delay tradeoff |

Year: | 2016 |

Publisher: | IEEE |

Abstract: | In this paper, we investigate the impact of information-theoretic secrecy constraint on the capacity and delay of mobile ad hoc networks (MANETs) with mobile legitimate nodes and static eavesdroppers whose location and channel state information (CSI) are both unknown. We assume n legitimate nodes move according to the fast i.i.d. mobility pattern and each desires to communicate with one randomly selected destination node. There are also nν static eavesdroppers located uniformly in the network and we assume the number of eavesdroppers is much larger than that of legitimate nodes, i.e., ν > 1. We propose a novel simple secure communication model, i.e., the secure protocol model, and prove its equivalence to the widely accepted secure physical model under a few technical assumptions. Based on the proposed model, a framework of analyzing the secrecy capacity and delay in MANETs is established. Given a delay constraint D, we find that the optimal secrecy throughput capacity is ~Θ(W((D/n))(2/3) ), where W is the data rate of each link. We observe that: 1) the capacity-delay tradeoff is independent of the number of eavesdroppers, which indicates that adding more eavesdroppers will not degenerate the performance of the legitimate network as long as ν > 1; 2) the capacity-delay tradeoff of our paper outperforms the previous result Θ((1/nψe)) in , where ψe=nν-1 =ω(1) is the density of the eavesdroppers. Throughout this paper, for functions f and g, we denote f=o(g) if limn→∞(f/g)=0; f=ω(g) if g=o(f); f=O(g) if there is a positive constant c such that f ≤ cg for sufficiently large n; f=Ω(g) if g=O(f); f=Θ(g) if both f=O(g) and f=Ω(g) hold. Besides, the order notation ~Θ omits the polylogarithmic factors for better readability. |

URI: | http://localhost/handle/Hannan/154683 http://localhost/handle/Hannan/660834 |

ISSN: | 1063-6692 1558-2566 |

volume: | 24 |

issue: | 2 |

Appears in Collections: | 2016 |

Files in This Item:

File | Description | Size | Format | |
---|---|---|---|---|

7076660.pdf | 2.57 MB | Adobe PDF | Preview File |