Paper Title :EFFICIENT USAGE OF UN TRUSTED RELAYS TO END-TO-END COMMUNICATION FOR WSNs
Author :DIVYA RAVI, KAVITHA.
Article Citation :DIVYA RAVI ,KAVITHA. ,
(2014 ) " EFFICIENT USAGE OF UN TRUSTED RELAYS TO END-TO-END COMMUNICATION FOR WSNs " ,
International Journal of Advance Computational Engineering and Networking (IJACEN) ,
pp. 40-44,
Volume-2,Issue-3
Abstract : A wireless network differs fundamentally from a network of noiseless bit pipes. The broadcast nature of the
medium results in signals transmitted by a node to be overheard by all, making it easier to eavesdrop. Further, an
interference result from multiple transmissions overheard by all nodes and fundamentally alters the methods with which
information theoretic secrecy can be provided. n this paper, we consider confidential message transfer for wireless networks
of arbitrary size within an information theoretic secrecy framework. In order to address this problem with the simplest model
which retains the characteristics of a wireless communication medium, namely, broadcast and interference, we consider a
line network. The source and the destination in this network are connected by a chain of nodes, any or all of which, despite
being a part of the network, and willing to carry out relaying functions, are not to be trusted with the information sent from
the source to the destination. To this end, all of these nodes need to be treated as potential eavesdroppers. The achievable
rate obtained indicates that imposing secrecy constraints penalizes the capacity by at most 1bit per channel use. Therefore, it
is concluded that information theoretic secrecy can be guaranteed for this model irrespective of eavesdropping relays and a
fixed modest cost for the end-to-end rate using simulations in the network simulator.
Type : Research paper
Published : Volume-2,Issue-3
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-520
View Here
Copyright: © Institute of Research and Journals
|
|
| |
|
PDF |
| |
Viewed - 42 |
| |
Published on 2014-03-21 |
|