DOIONLINE

DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-520

Publish In
International Journal of Advance Computational Engineering and Networking (IJACEN)-IJACEN
Journal Home
Volume Issue
Issue
Volume-2,Issue-3  ( Mar, 2014 )
Paper Title
EFFICIENT USAGE OF UN TRUSTED RELAYS TO END-TO-END COMMUNICATION FOR WSNs
Author Name
DIVYA RAVI, KAVITHA.
Affilition
Department of Information Technology, Jerusalem College of Engineering, Chennai
Pages
40-44
Abstract
A wireless network differs fundamentally from a network of noiseless bit pipes. The broadcast nature of the medium results in signals transmitted by a node to be overheard by all, making it easier to eavesdrop. Further, an interference result from multiple transmissions overheard by all nodes and fundamentally alters the methods with which information theoretic secrecy can be provided. n this paper, we consider confidential message transfer for wireless networks of arbitrary size within an information theoretic secrecy framework. In order to address this problem with the simplest model which retains the characteristics of a wireless communication medium, namely, broadcast and interference, we consider a line network. The source and the destination in this network are connected by a chain of nodes, any or all of which, despite being a part of the network, and willing to carry out relaying functions, are not to be trusted with the information sent from the source to the destination. To this end, all of these nodes need to be treated as potential eavesdroppers. The achievable rate obtained indicates that imposing secrecy constraints penalizes the capacity by at most 1bit per channel use. Therefore, it is concluded that information theoretic secrecy can be guaranteed for this model irrespective of eavesdropping relays and a fixed modest cost for the end-to-end rate using simulations in the network simulator.
  View Paper