Secrecy Throughput of MANETs Under Passive and Active Attacks

The secrecy throughput of mobile ad hoc networks (MANETs) with malicious nodes is investigated. The MANET consists of n legitimate mobile nodes and m malicious nodes. Transmissions between legitimate nodes are subject to a delay constraint D . A model under passive attack is first studied, in which...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on information theory Vol. 57; no. 10; pp. 6692 - 6702
Main Authors Yingbin Liang, Poor, H. V., Lei Ying
Format Journal Article
LanguageEnglish
Published New York, NY IEEE 01.10.2011
Institute of Electrical and Electronics Engineers
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
Abstract The secrecy throughput of mobile ad hoc networks (MANETs) with malicious nodes is investigated. The MANET consists of n legitimate mobile nodes and m malicious nodes. Transmissions between legitimate nodes are subject to a delay constraint D . A model under passive attack is first studied, in which the malicious nodes are assumed to be eavesdroppers that only listen to transmission without actively injecting signals. An information-theoretic approach for security is applied to achieve secure communication among legitimate nodes in MANETs with transmissions being kept perfectly secure from eavesdroppers. A critical threshold on the number of malicious nodes ( m ) is identified such that when m = o (√{ nD }), i.e., lim n→∞ m /√{ nD } = 0, the optimal secrecy throughput equals that of MANETs without malicious nodes, i.e., the impact of the presence of malicious nodes on the network throughput is negligible; and when m = Ω(√{ nD }poly( n )), i.e., lim n→∞ m /(√{ nD }poly( n )) ≥ c for a positive constant c, the optimal secrecy throughput is limited by the number of malicious nodes. A model under active attack is further studied, in which the malicious nodes actively attack the network by transmitting modified packets to the destination nodes. It is shown that to guarantee the same throughput as the model under passive attack, the model under active attack needs to satisfy more stringent condition on the number of malicious nodes.
AbstractList The secrecy throughput of mobile ad hoc networks (MANETs) with malicious nodes is investigated. The MANET consists of $n$ legitimate mobile nodes and $m$ malicious nodes. Transmissions between legitimate nodes are subject to a delay constraint $D$. A model under passive attack is first studied, in which the malicious nodes are assumed to be eavesdroppers that only listen to transmission without actively injecting signals. An information-theoretic approach for security is applied to achieve secure communication among legitimate nodes in MANETs with transmissions being kept perfectly secure from eavesdroppers. A critical threshold on the number of malicious nodes $(m)$ is identified such that when $m=o(sqrt {nD})$, i.e., $lim _{nrightarrow infty } m/sqrt {nD}=0$, the optimal secrecy throughput equals that of MANETs without malicious nodes, i.e., the impact of the presence of malicious nodes on the network throughput is negligible; and when $m=Omega left (sqrt {nD}{rm poly}(n)right )$, i.e., $lim _{nrightarrow infty } m/left (sqrt {nD}{rm poly}(n)right ) geq c$ for a positive constant ${rm c}$, the optimal secrecy throughput is limited by the number of malicious nodes. A model under active attack is further studied, in which the malicious nodes actively attack the network by transmitting modified packets to the destination nodes. It is shown that to guarantee the - - same throughput as the model under passive attack, the model under active attack needs to satisfy more stringent condition on the number of malicious nodes. [PUBLICATION ABSTRACT]
The secrecy throughput of mobile ad hoc networks (MANETs) with malicious nodes is investigated. The MANET consists of n legitimate mobile nodes and m malicious nodes. Transmissions between legitimate nodes are subject to a delay constraint D . A model under passive attack is first studied, in which the malicious nodes are assumed to be eavesdroppers that only listen to transmission without actively injecting signals. An information-theoretic approach for security is applied to achieve secure communication among legitimate nodes in MANETs with transmissions being kept perfectly secure from eavesdroppers. A critical threshold on the number of malicious nodes ( m ) is identified such that when m = o (√{ nD }), i.e., lim n→∞ m /√{ nD } = 0, the optimal secrecy throughput equals that of MANETs without malicious nodes, i.e., the impact of the presence of malicious nodes on the network throughput is negligible; and when m = Ω(√{ nD }poly( n )), i.e., lim n→∞ m /(√{ nD }poly( n )) ≥ c for a positive constant c, the optimal secrecy throughput is limited by the number of malicious nodes. A model under active attack is further studied, in which the malicious nodes actively attack the network by transmitting modified packets to the destination nodes. It is shown that to guarantee the same throughput as the model under passive attack, the model under active attack needs to satisfy more stringent condition on the number of malicious nodes.
Author Lei Ying
Yingbin Liang
Poor, H. V.
Author_xml – sequence: 1
  surname: Yingbin Liang
  fullname: Yingbin Liang
  email: yliang06@syr.edu
  organization: Dept. of Electr. Eng. & Comput. Sci., Syracuse Univ., Syracuse, NY, USA
– sequence: 2
  givenname: H. V.
  surname: Poor
  fullname: Poor, H. V.
  email: poor@princeton.edu
  organization: Dept. of Electr. Eng., Princeton Univ., Princeton, NJ, USA
– sequence: 3
  surname: Lei Ying
  fullname: Lei Ying
  email: leiying@iastate.edu
  organization: Dept. of Electr. & Comput. Eng., Iowa State Univ., Ames, IA, USA
BackLink http://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=24707096$$DView record in Pascal Francis
BookMark eNp9kEtLAzEUhYNUsK3uBTeD4HLqTSaPmYWLUqoW6gOcrkPMJHZqnalJRui_N6WlCxeu7oPv3McZoF7TNgahSwwjjKG4LWfliADGI4I5ywFOUB8zJtKCM9pDfQCcpwWl-RkaeL-KJWWY9NHdm9HO6G1SLl3bfSw3XUhamzyNn6elTxZNZVzyqryvf0yimioZ67BLxyEo_enP0alVa28uDnGIFvfTcvKYzl8eZpPxPNVZzkOqsBVMaaorwXKLmam4te-iAK40aB2bgnNglSA5aALU5plmlCjDq0oVFc2G6Ho_d-Pa7874IFdt55q4UhYA8V9KWIRuDpDyWq2tU42uvdy4-ku5rSRUgICCRw72nHat987YI4JB7ryU0Uu581IevIwS_kei66BC3TbBqXr9n_BqL6yNMcc9HDIq4sW_kyaA9w
CODEN IETTAW
CitedBy_id crossref_primary_10_1049_iet_com_2020_0570
crossref_primary_10_1109_TNET_2013_2244230
crossref_primary_10_1109_TSC_2015_2478453
crossref_primary_10_1007_s11277_020_07757_6
crossref_primary_10_1109_JSAC_2018_2825798
crossref_primary_10_1155_2014_460196
crossref_primary_10_1109_TNET_2015_2405793
crossref_primary_10_1186_s13638_018_1276_1
crossref_primary_10_1109_JSAC_2013_130920
crossref_primary_10_1016_j_adhoc_2018_01_012
crossref_primary_10_1016_j_adhoc_2014_05_014
crossref_primary_10_4018_IJBDCN_2019010103
crossref_primary_10_1007_s11277_017_4436_4
crossref_primary_10_1049_iet_net_2020_0051
crossref_primary_10_1109_TWC_2014_051414_130478
Cites_doi 10.1109/TIT.2006.883548
10.1109/18.825799
10.1109/EW.2010.5483463
10.1109/INFCOM.2004.1354532
10.1109/TIT.2006.874379
10.1109/INFCOM.2010.5462257
10.1109/INFCOM.2001.916631
10.1109/TIT.1978.1055892
10.1109/TIT.2006.890720
10.1561/0100000036
10.1109/TIT.2007.901143
10.1109/JCN.2004.6596836
10.1109/TIT.2005.847717
10.1109/ITA.2010.5454119
10.1109/ISIT.2009.5206050
10.1002/j.1538-7305.1984.tb00072.x
10.1002/j.1538-7305.1975.tb02040.x
10.1109/TIT.2008.928247
10.1109/ISIT.2002.1023624
10.1109/INFOCOM.2006.144
10.1007/3-540-45539-6_24
ContentType Journal Article
Copyright 2015 INIST-CNRS
Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Oct 2011
Copyright_xml – notice: 2015 INIST-CNRS
– notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Oct 2011
DBID 97E
RIA
RIE
AAYXX
CITATION
IQODW
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
DOI 10.1109/TIT.2011.2165800
DatabaseName IEEE Xplore (IEEE)
IEEE All-Society Periodicals Package (ASPP) 1998-Present
IEEE Electronic Library (IEL)
CrossRef
Pascal-Francis
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList Technology Research Database

Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
Applied Sciences
EISSN 1557-9654
EndPage 6702
ExternalDocumentID 2495941071
24707096
10_1109_TIT_2011_2165800
6034725
Genre orig-research
Feature
GroupedDBID -~X
.DC
0R~
29I
3EH
4.4
5GY
5VS
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABFSI
ABQJQ
ABVLG
ACGFO
ACGFS
ACGOD
ACIWK
AENEX
AETEA
AETIX
AGQYO
AGSQL
AHBIQ
AI.
AIBXA
AKJIK
AKQYR
ALLEH
ALMA_UNASSIGNED_HOLDINGS
ASUFR
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
E.L
EBS
EJD
F5P
HZ~
H~9
IAAWW
IBMZZ
ICLAB
IDIHD
IFIPE
IFJZH
IPLJI
JAVBF
LAI
M43
MS~
O9-
OCL
P2P
PQQKQ
RIA
RIE
RNS
RXW
TAE
TN5
VH1
VJK
AAYOK
AAYXX
CITATION
RIG
IQODW
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c386t-a1f75ac4cd758f15ed6ffb7906ac0cc75876605d7280c204f83c542ae6dda9d43
IEDL.DBID RIE
ISSN 0018-9448
IngestDate Sun Jun 29 12:53:59 EDT 2025
Mon Jul 21 09:15:28 EDT 2025
Thu Apr 24 23:07:31 EDT 2025
Tue Jul 01 02:34:30 EDT 2025
Tue Aug 26 17:17:02 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 10
Keywords Mobile radiocommunication
Mobile ad hoc network
Wireless telecommunication
Information rate
Erasure channel
Information transmission
mobile ad hoc network (MANET)
Eavesdropping
throughput scaling
mobility model
Delay time
wiretap channel
Secrecy
Telecommunication security
Information theory
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
CC BY 4.0
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c386t-a1f75ac4cd758f15ed6ffb7906ac0cc75876605d7280c204f83c542ae6dda9d43
Notes SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 14
PQID 900658425
PQPubID 36024
PageCount 11
ParticipantIDs crossref_primary_10_1109_TIT_2011_2165800
proquest_journals_900658425
pascalfrancis_primary_24707096
crossref_citationtrail_10_1109_TIT_2011_2165800
ieee_primary_6034725
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2011-10-01
PublicationDateYYYYMMDD 2011-10-01
PublicationDate_xml – month: 10
  year: 2011
  text: 2011-10-01
  day: 01
PublicationDecade 2010
PublicationPlace New York, NY
PublicationPlace_xml – name: New York, NY
– name: New York
PublicationTitle IEEE transactions on information theory
PublicationTitleAbbrev TIT
PublicationYear 2011
Publisher IEEE
Institute of Electrical and Electronics Engineers
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: Institute of Electrical and Electronics Engineers
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref13
ref12
ref14
maurer (ref23) 2000
ref20
ref11
ref22
ref10
liang (ref4) 2008; 5
ref2
ref1
ref17
ref16
lin (ref15) 2006; 52
ref19
ref18
ref8
ref7
ref9
ref3
ref6
pinto (ref21) 2010
ref5
References_xml – ident: ref13
  doi: 10.1109/TIT.2006.883548
– ident: ref22
  doi: 10.1109/18.825799
– ident: ref19
  doi: 10.1109/EW.2010.5483463
– ident: ref10
  doi: 10.1109/INFCOM.2004.1354532
– ident: ref12
  doi: 10.1109/TIT.2006.874379
– ident: ref17
  doi: 10.1109/INFCOM.2010.5462257
– ident: ref7
  doi: 10.1109/INFCOM.2001.916631
– ident: ref3
  doi: 10.1109/TIT.1978.1055892
– ident: ref16
  doi: 10.1109/TIT.2006.890720
– volume: 5
  start-page: 355
  year: 2008
  ident: ref4
  article-title: Information theoretic security
  publication-title: Found Trends Commun Inf Theory
  doi: 10.1561/0100000036
– ident: ref6
  doi: 10.1109/TIT.2007.901143
– ident: ref11
  doi: 10.1109/JCN.2004.6596836
– ident: ref9
  doi: 10.1109/TIT.2005.847717
– ident: ref18
  doi: 10.1109/ITA.2010.5454119
– volume: 52
  start-page: 2777
  year: 2006
  ident: ref15
  article-title: Degenerate delay-capacity trade-offs in ad hoc networks with Brownian mobility
  publication-title: IEEE Trans Inf Theory/IEEE/ACM Trans Netw Joint Special Issue on Networking and Information Theory
– ident: ref20
  doi: 10.1109/ISIT.2009.5206050
– ident: ref5
  doi: 10.1002/j.1538-7305.1984.tb00072.x
– ident: ref2
  doi: 10.1002/j.1538-7305.1975.tb02040.x
– ident: ref1
  doi: 10.1109/TIT.2008.928247
– ident: ref8
  doi: 10.1109/ISIT.2002.1023624
– ident: ref14
  doi: 10.1109/INFOCOM.2006.144
– start-page: 351
  year: 2000
  ident: ref23
  publication-title: Advances in Cryptology ? EUROCRYPT 2000
  doi: 10.1007/3-540-45539-6_24
– year: 2010
  ident: ref21
  publication-title: Secure communication in stochastic wireless networks
SSID ssj0014512
Score 2.1919074
Snippet The secrecy throughput of mobile ad hoc networks (MANETs) with malicious nodes is investigated. The MANET consists of n legitimate mobile nodes and m malicious...
The secrecy throughput of mobile ad hoc networks (MANETs) with malicious nodes is investigated. The MANET consists of $n$ legitimate mobile nodes and $m$...
SourceID proquest
pascalfrancis
crossref
ieee
SourceType Aggregation Database
Index Database
Enrichment Source
Publisher
StartPage 6692
SubjectTerms Ad hoc networks
Applied sciences
Data transmission
Delay
Encoding
Equipments and installations
Erasure channel
Exact sciences and technology
Information theory
Information, signal and communications theory
Mathematical models
mobile ad hoc network (MANET)
Mobile communications networks
Mobile computing
Mobile radiocommunication systems
mobility model
Network security
Radiocommunications
Receivers
secrecy
Secret
Security
Systems, networks and services of telecommunications
Telecommunications
Telecommunications and information theory
Throughput
throughput scaling
Transmission and modulation (techniques and equipments)
wiretap channel
Title Secrecy Throughput of MANETs Under Passive and Active Attacks
URI https://ieeexplore.ieee.org/document/6034725
https://www.proquest.com/docview/900658425
Volume 57
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwED5RJhh4FBDlJQ8sSKSNU9tpBoYKtSpIRUgEqVvk-LGAWkTTAX495ziJeAmxRcklSnz2-bvc4wM4Z4hRucgde5kJA8aVCSQzNhhoLXKhXEd0V408vROTR3Y747M1uGxqYYwxZfKZ6brDMpavF2rlfpX1RNhnccRb0ELHzddqNREDxqnvDE5xAaPPUYckw6SX3qS-V2dEcb91tWyftqCSU8VlRMolDor1bBY_DHO524y3YVq_p08yeequiryr3r-1cPzvh-zAVgU7ydDPk11YM_M2bNeUDqRa4W3Y_NSfcA-uHhyoVG8k9Ww-KEwWlkyHd6N0SUrKJHKP6BstJpFzTYal8STDonCV-_vwOB6l15Og4lsIVH8gikBSG3OpmNLoRFjKjRbW5nESCqlCpfBkLND70Y7RSkUhs4O-4iySRmgtE836B7A-X8zNIRAa61xxri2iMZaHMqHSBWQFQ_eQmpx1oFerIFNVM3LHifGclU5JmGSotMwpLauU1oGL5o4X34jjD9k9N-aNXDXcHTj7ouXmesRitHyJ6MBxrfasWsrLLPEoLeJHvz_1GDaiOi-QnsB68boypwhUivysnKEfgVXiSA
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT9tAEB5BOAAH0kIr3FC6h16Q6sTr7K7jA4cIEQWaRJVqJG7Weh8XqgQR59D--s56bYuXEDfLXlv2zu7MN57HB_CdIUblonDsZSYKGVcmlMzYcKS1KIRyHdFdNfJ8IaY37PqW327Bj7YWxhhTJZ-ZvjusYvl6pTbuV9lAREOWxHwbdtDuc-qrtdqYAePU9wanuIXR62iCklE6yK4y360zpmhxXTXbIyNUsaq4nEi5xmmxns_ihWqu7M2kC_PmTX2ayV1_UxZ99e9ZE8f3fsoHOKiBJxn7lfIRtszyELoNqQOp9_gh7D_qUHgE578drFR_Seb5fHAwWVkyHy8uszWpSJPIL8TfqDOJXGoyrtQnGZelq93_BDeTy-xiGtaMC6EajkQZSmoTLhVTGt0IS7nRwtoiSSMhVaQUnkwE-j_acVqpOGJ2NFScxdIIrWWq2fAzdJarpTkGQhNdKM61RTzGikimVLqQrGDoIFJTsAAGjQhyVbcjd6wYf_LKLYnSHIWWO6HltdACOGvvuPetON4Ye-TmvB1XT3cAp0-k3F6PWYK6LxUB9Bqx5_VmXuepx2kx__L6U7_B7jSbz_LZ1eJnD_biJkuQnkCnfNiYrwhbyuK0Wq3_AXlX5ZE
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Secrecy+Throughput+of+MANETs+Under+Passive+and+Active+Attacks&rft.jtitle=IEEE+transactions+on+information+theory&rft.au=YINGBIN+LIANG&rft.au=POOR%2C+H.+Vincent&rft.au=LEI+YING&rft.date=2011-10-01&rft.pub=Institute+of+Electrical+and+Electronics+Engineers&rft.issn=0018-9448&rft.volume=57&rft.issue=10&rft.spage=6692&rft.epage=6702&rft_id=info:doi/10.1109%2FTIT.2011.2165800&rft.externalDBID=n%2Fa&rft.externalDocID=24707096
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0018-9448&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0018-9448&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0018-9448&client=summon