Secrecy Throughput of MANETs Under Passive and Active Attacks
The secrecy throughput of mobile ad hoc networks (MANETs) with malicious nodes is investigated. The MANET consists of n legitimate mobile nodes and m malicious nodes. Transmissions between legitimate nodes are subject to a delay constraint D . A model under passive attack is first studied, in which...
Saved in:
Published in | IEEE transactions on information theory Vol. 57; no. 10; pp. 6692 - 6702 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
New York, NY
IEEE
01.10.2011
Institute of Electrical and Electronics Engineers The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | The secrecy throughput of mobile ad hoc networks (MANETs) with malicious nodes is investigated. The MANET consists of n legitimate mobile nodes and m malicious nodes. Transmissions between legitimate nodes are subject to a delay constraint D . A model under passive attack is first studied, in which the malicious nodes are assumed to be eavesdroppers that only listen to transmission without actively injecting signals. An information-theoretic approach for security is applied to achieve secure communication among legitimate nodes in MANETs with transmissions being kept perfectly secure from eavesdroppers. A critical threshold on the number of malicious nodes ( m ) is identified such that when m = o (√{ nD }), i.e., lim n→∞ m /√{ nD } = 0, the optimal secrecy throughput equals that of MANETs without malicious nodes, i.e., the impact of the presence of malicious nodes on the network throughput is negligible; and when m = Ω(√{ nD }poly( n )), i.e., lim n→∞ m /(√{ nD }poly( n )) ≥ c for a positive constant c, the optimal secrecy throughput is limited by the number of malicious nodes. A model under active attack is further studied, in which the malicious nodes actively attack the network by transmitting modified packets to the destination nodes. It is shown that to guarantee the same throughput as the model under passive attack, the model under active attack needs to satisfy more stringent condition on the number of malicious nodes. |
---|---|
AbstractList | The secrecy throughput of mobile ad hoc networks (MANETs) with malicious nodes is investigated. The MANET consists of $n$ legitimate mobile nodes and $m$ malicious nodes. Transmissions between legitimate nodes are subject to a delay constraint $D$. A model under passive attack is first studied, in which the malicious nodes are assumed to be eavesdroppers that only listen to transmission without actively injecting signals. An information-theoretic approach for security is applied to achieve secure communication among legitimate nodes in MANETs with transmissions being kept perfectly secure from eavesdroppers. A critical threshold on the number of malicious nodes $(m)$ is identified such that when $m=o(sqrt {nD})$, i.e., $lim _{nrightarrow infty } m/sqrt {nD}=0$, the optimal secrecy throughput equals that of MANETs without malicious nodes, i.e., the impact of the presence of malicious nodes on the network throughput is negligible; and when $m=Omega left (sqrt {nD}{rm poly}(n)right )$, i.e., $lim _{nrightarrow infty } m/left (sqrt {nD}{rm poly}(n)right ) geq c$ for a positive constant ${rm c}$, the optimal secrecy throughput is limited by the number of malicious nodes. A model under active attack is further studied, in which the malicious nodes actively attack the network by transmitting modified packets to the destination nodes. It is shown that to guarantee the - - same throughput as the model under passive attack, the model under active attack needs to satisfy more stringent condition on the number of malicious nodes. [PUBLICATION ABSTRACT] The secrecy throughput of mobile ad hoc networks (MANETs) with malicious nodes is investigated. The MANET consists of n legitimate mobile nodes and m malicious nodes. Transmissions between legitimate nodes are subject to a delay constraint D . A model under passive attack is first studied, in which the malicious nodes are assumed to be eavesdroppers that only listen to transmission without actively injecting signals. An information-theoretic approach for security is applied to achieve secure communication among legitimate nodes in MANETs with transmissions being kept perfectly secure from eavesdroppers. A critical threshold on the number of malicious nodes ( m ) is identified such that when m = o (√{ nD }), i.e., lim n→∞ m /√{ nD } = 0, the optimal secrecy throughput equals that of MANETs without malicious nodes, i.e., the impact of the presence of malicious nodes on the network throughput is negligible; and when m = Ω(√{ nD }poly( n )), i.e., lim n→∞ m /(√{ nD }poly( n )) ≥ c for a positive constant c, the optimal secrecy throughput is limited by the number of malicious nodes. A model under active attack is further studied, in which the malicious nodes actively attack the network by transmitting modified packets to the destination nodes. It is shown that to guarantee the same throughput as the model under passive attack, the model under active attack needs to satisfy more stringent condition on the number of malicious nodes. |
Author | Lei Ying Yingbin Liang Poor, H. V. |
Author_xml | – sequence: 1 surname: Yingbin Liang fullname: Yingbin Liang email: yliang06@syr.edu organization: Dept. of Electr. Eng. & Comput. Sci., Syracuse Univ., Syracuse, NY, USA – sequence: 2 givenname: H. V. surname: Poor fullname: Poor, H. V. email: poor@princeton.edu organization: Dept. of Electr. Eng., Princeton Univ., Princeton, NJ, USA – sequence: 3 surname: Lei Ying fullname: Lei Ying email: leiying@iastate.edu organization: Dept. of Electr. & Comput. Eng., Iowa State Univ., Ames, IA, USA |
BackLink | http://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=24707096$$DView record in Pascal Francis |
BookMark | eNp9kEtLAzEUhYNUsK3uBTeD4HLqTSaPmYWLUqoW6gOcrkPMJHZqnalJRui_N6WlCxeu7oPv3McZoF7TNgahSwwjjKG4LWfliADGI4I5ywFOUB8zJtKCM9pDfQCcpwWl-RkaeL-KJWWY9NHdm9HO6G1SLl3bfSw3XUhamzyNn6elTxZNZVzyqryvf0yimioZ67BLxyEo_enP0alVa28uDnGIFvfTcvKYzl8eZpPxPNVZzkOqsBVMaaorwXKLmam4te-iAK40aB2bgnNglSA5aALU5plmlCjDq0oVFc2G6Ho_d-Pa7874IFdt55q4UhYA8V9KWIRuDpDyWq2tU42uvdy4-ku5rSRUgICCRw72nHat987YI4JB7ryU0Uu581IevIwS_kei66BC3TbBqXr9n_BqL6yNMcc9HDIq4sW_kyaA9w |
CODEN | IETTAW |
CitedBy_id | crossref_primary_10_1049_iet_com_2020_0570 crossref_primary_10_1109_TNET_2013_2244230 crossref_primary_10_1109_TSC_2015_2478453 crossref_primary_10_1007_s11277_020_07757_6 crossref_primary_10_1109_JSAC_2018_2825798 crossref_primary_10_1155_2014_460196 crossref_primary_10_1109_TNET_2015_2405793 crossref_primary_10_1186_s13638_018_1276_1 crossref_primary_10_1109_JSAC_2013_130920 crossref_primary_10_1016_j_adhoc_2018_01_012 crossref_primary_10_1016_j_adhoc_2014_05_014 crossref_primary_10_4018_IJBDCN_2019010103 crossref_primary_10_1007_s11277_017_4436_4 crossref_primary_10_1049_iet_net_2020_0051 crossref_primary_10_1109_TWC_2014_051414_130478 |
Cites_doi | 10.1109/TIT.2006.883548 10.1109/18.825799 10.1109/EW.2010.5483463 10.1109/INFCOM.2004.1354532 10.1109/TIT.2006.874379 10.1109/INFCOM.2010.5462257 10.1109/INFCOM.2001.916631 10.1109/TIT.1978.1055892 10.1109/TIT.2006.890720 10.1561/0100000036 10.1109/TIT.2007.901143 10.1109/JCN.2004.6596836 10.1109/TIT.2005.847717 10.1109/ITA.2010.5454119 10.1109/ISIT.2009.5206050 10.1002/j.1538-7305.1984.tb00072.x 10.1002/j.1538-7305.1975.tb02040.x 10.1109/TIT.2008.928247 10.1109/ISIT.2002.1023624 10.1109/INFOCOM.2006.144 10.1007/3-540-45539-6_24 |
ContentType | Journal Article |
Copyright | 2015 INIST-CNRS Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Oct 2011 |
Copyright_xml | – notice: 2015 INIST-CNRS – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Oct 2011 |
DBID | 97E RIA RIE AAYXX CITATION IQODW 7SC 7SP 8FD JQ2 L7M L~C L~D |
DOI | 10.1109/TIT.2011.2165800 |
DatabaseName | IEEE Xplore (IEEE) IEEE All-Society Periodicals Package (ASPP) 1998-Present IEEE Electronic Library (IEL) CrossRef Pascal-Francis Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Technology Research Database |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Computer Science Applied Sciences |
EISSN | 1557-9654 |
EndPage | 6702 |
ExternalDocumentID | 2495941071 24707096 10_1109_TIT_2011_2165800 6034725 |
Genre | orig-research Feature |
GroupedDBID | -~X .DC 0R~ 29I 3EH 4.4 5GY 5VS 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABFSI ABQJQ ABVLG ACGFO ACGFS ACGOD ACIWK AENEX AETEA AETIX AGQYO AGSQL AHBIQ AI. AIBXA AKJIK AKQYR ALLEH ALMA_UNASSIGNED_HOLDINGS ASUFR ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 E.L EBS EJD F5P HZ~ H~9 IAAWW IBMZZ ICLAB IDIHD IFIPE IFJZH IPLJI JAVBF LAI M43 MS~ O9- OCL P2P PQQKQ RIA RIE RNS RXW TAE TN5 VH1 VJK AAYOK AAYXX CITATION RIG IQODW 7SC 7SP 8FD JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c386t-a1f75ac4cd758f15ed6ffb7906ac0cc75876605d7280c204f83c542ae6dda9d43 |
IEDL.DBID | RIE |
ISSN | 0018-9448 |
IngestDate | Sun Jun 29 12:53:59 EDT 2025 Mon Jul 21 09:15:28 EDT 2025 Thu Apr 24 23:07:31 EDT 2025 Tue Jul 01 02:34:30 EDT 2025 Tue Aug 26 17:17:02 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 10 |
Keywords | Mobile radiocommunication Mobile ad hoc network Wireless telecommunication Information rate Erasure channel Information transmission mobile ad hoc network (MANET) Eavesdropping throughput scaling mobility model Delay time wiretap channel Secrecy Telecommunication security Information theory |
Language | English |
License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html CC BY 4.0 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c386t-a1f75ac4cd758f15ed6ffb7906ac0cc75876605d7280c204f83c542ae6dda9d43 |
Notes | SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 14 |
PQID | 900658425 |
PQPubID | 36024 |
PageCount | 11 |
ParticipantIDs | crossref_primary_10_1109_TIT_2011_2165800 proquest_journals_900658425 pascalfrancis_primary_24707096 crossref_citationtrail_10_1109_TIT_2011_2165800 ieee_primary_6034725 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2011-10-01 |
PublicationDateYYYYMMDD | 2011-10-01 |
PublicationDate_xml | – month: 10 year: 2011 text: 2011-10-01 day: 01 |
PublicationDecade | 2010 |
PublicationPlace | New York, NY |
PublicationPlace_xml | – name: New York, NY – name: New York |
PublicationTitle | IEEE transactions on information theory |
PublicationTitleAbbrev | TIT |
PublicationYear | 2011 |
Publisher | IEEE Institute of Electrical and Electronics Engineers The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: Institute of Electrical and Electronics Engineers – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref13 ref12 ref14 maurer (ref23) 2000 ref20 ref11 ref22 ref10 liang (ref4) 2008; 5 ref2 ref1 ref17 ref16 lin (ref15) 2006; 52 ref19 ref18 ref8 ref7 ref9 ref3 ref6 pinto (ref21) 2010 ref5 |
References_xml | – ident: ref13 doi: 10.1109/TIT.2006.883548 – ident: ref22 doi: 10.1109/18.825799 – ident: ref19 doi: 10.1109/EW.2010.5483463 – ident: ref10 doi: 10.1109/INFCOM.2004.1354532 – ident: ref12 doi: 10.1109/TIT.2006.874379 – ident: ref17 doi: 10.1109/INFCOM.2010.5462257 – ident: ref7 doi: 10.1109/INFCOM.2001.916631 – ident: ref3 doi: 10.1109/TIT.1978.1055892 – ident: ref16 doi: 10.1109/TIT.2006.890720 – volume: 5 start-page: 355 year: 2008 ident: ref4 article-title: Information theoretic security publication-title: Found Trends Commun Inf Theory doi: 10.1561/0100000036 – ident: ref6 doi: 10.1109/TIT.2007.901143 – ident: ref11 doi: 10.1109/JCN.2004.6596836 – ident: ref9 doi: 10.1109/TIT.2005.847717 – ident: ref18 doi: 10.1109/ITA.2010.5454119 – volume: 52 start-page: 2777 year: 2006 ident: ref15 article-title: Degenerate delay-capacity trade-offs in ad hoc networks with Brownian mobility publication-title: IEEE Trans Inf Theory/IEEE/ACM Trans Netw Joint Special Issue on Networking and Information Theory – ident: ref20 doi: 10.1109/ISIT.2009.5206050 – ident: ref5 doi: 10.1002/j.1538-7305.1984.tb00072.x – ident: ref2 doi: 10.1002/j.1538-7305.1975.tb02040.x – ident: ref1 doi: 10.1109/TIT.2008.928247 – ident: ref8 doi: 10.1109/ISIT.2002.1023624 – ident: ref14 doi: 10.1109/INFOCOM.2006.144 – start-page: 351 year: 2000 ident: ref23 publication-title: Advances in Cryptology ? EUROCRYPT 2000 doi: 10.1007/3-540-45539-6_24 – year: 2010 ident: ref21 publication-title: Secure communication in stochastic wireless networks |
SSID | ssj0014512 |
Score | 2.1919074 |
Snippet | The secrecy throughput of mobile ad hoc networks (MANETs) with malicious nodes is investigated. The MANET consists of n legitimate mobile nodes and m malicious... The secrecy throughput of mobile ad hoc networks (MANETs) with malicious nodes is investigated. The MANET consists of $n$ legitimate mobile nodes and $m$... |
SourceID | proquest pascalfrancis crossref ieee |
SourceType | Aggregation Database Index Database Enrichment Source Publisher |
StartPage | 6692 |
SubjectTerms | Ad hoc networks Applied sciences Data transmission Delay Encoding Equipments and installations Erasure channel Exact sciences and technology Information theory Information, signal and communications theory Mathematical models mobile ad hoc network (MANET) Mobile communications networks Mobile computing Mobile radiocommunication systems mobility model Network security Radiocommunications Receivers secrecy Secret Security Systems, networks and services of telecommunications Telecommunications Telecommunications and information theory Throughput throughput scaling Transmission and modulation (techniques and equipments) wiretap channel |
Title | Secrecy Throughput of MANETs Under Passive and Active Attacks |
URI | https://ieeexplore.ieee.org/document/6034725 https://www.proquest.com/docview/900658425 |
Volume | 57 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwED5RJhh4FBDlJQ8sSKSNU9tpBoYKtSpIRUgEqVvk-LGAWkTTAX495ziJeAmxRcklSnz2-bvc4wM4Z4hRucgde5kJA8aVCSQzNhhoLXKhXEd0V408vROTR3Y747M1uGxqYYwxZfKZ6brDMpavF2rlfpX1RNhnccRb0ELHzddqNREDxqnvDE5xAaPPUYckw6SX3qS-V2dEcb91tWyftqCSU8VlRMolDor1bBY_DHO524y3YVq_p08yeequiryr3r-1cPzvh-zAVgU7ydDPk11YM_M2bNeUDqRa4W3Y_NSfcA-uHhyoVG8k9Ww-KEwWlkyHd6N0SUrKJHKP6BstJpFzTYal8STDonCV-_vwOB6l15Og4lsIVH8gikBSG3OpmNLoRFjKjRbW5nESCqlCpfBkLND70Y7RSkUhs4O-4iySRmgtE836B7A-X8zNIRAa61xxri2iMZaHMqHSBWQFQ_eQmpx1oFerIFNVM3LHifGclU5JmGSotMwpLauU1oGL5o4X34jjD9k9N-aNXDXcHTj7ouXmesRitHyJ6MBxrfasWsrLLPEoLeJHvz_1GDaiOi-QnsB68boypwhUivysnKEfgVXiSA |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT9tAEB5BOAAH0kIr3FC6h16Q6sTr7K7jA4cIEQWaRJVqJG7Weh8XqgQR59D--s56bYuXEDfLXlv2zu7MN57HB_CdIUblonDsZSYKGVcmlMzYcKS1KIRyHdFdNfJ8IaY37PqW327Bj7YWxhhTJZ-ZvjusYvl6pTbuV9lAREOWxHwbdtDuc-qrtdqYAePU9wanuIXR62iCklE6yK4y360zpmhxXTXbIyNUsaq4nEi5xmmxns_ihWqu7M2kC_PmTX2ayV1_UxZ99e9ZE8f3fsoHOKiBJxn7lfIRtszyELoNqQOp9_gh7D_qUHgE578drFR_Seb5fHAwWVkyHy8uszWpSJPIL8TfqDOJXGoyrtQnGZelq93_BDeTy-xiGtaMC6EajkQZSmoTLhVTGt0IS7nRwtoiSSMhVaQUnkwE-j_acVqpOGJ2NFScxdIIrWWq2fAzdJarpTkGQhNdKM61RTzGikimVLqQrGDoIFJTsAAGjQhyVbcjd6wYf_LKLYnSHIWWO6HltdACOGvvuPetON4Ye-TmvB1XT3cAp0-k3F6PWYK6LxUB9Bqx5_VmXuepx2kx__L6U7_B7jSbz_LZ1eJnD_biJkuQnkCnfNiYrwhbyuK0Wq3_AXlX5ZE |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Secrecy+Throughput+of+MANETs+Under+Passive+and+Active+Attacks&rft.jtitle=IEEE+transactions+on+information+theory&rft.au=YINGBIN+LIANG&rft.au=POOR%2C+H.+Vincent&rft.au=LEI+YING&rft.date=2011-10-01&rft.pub=Institute+of+Electrical+and+Electronics+Engineers&rft.issn=0018-9448&rft.volume=57&rft.issue=10&rft.spage=6692&rft.epage=6702&rft_id=info:doi/10.1109%2FTIT.2011.2165800&rft.externalDBID=n%2Fa&rft.externalDocID=24707096 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0018-9448&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0018-9448&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0018-9448&client=summon |