Secrecy Throughput of MANETs Under Passive and Active Attacks

The secrecy throughput of mobile ad hoc networks (MANETs) with malicious nodes is investigated. The MANET consists of n legitimate mobile nodes and m malicious nodes. Transmissions between legitimate nodes are subject to a delay constraint D . A model under passive attack is first studied, in which...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on information theory Vol. 57; no. 10; pp. 6692 - 6702
Main Authors Yingbin Liang, Poor, H. V., Lei Ying
Format Journal Article
LanguageEnglish
Published New York, NY IEEE 01.10.2011
Institute of Electrical and Electronics Engineers
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…