DocumentCode :
3406882
Title :
Networking with Secrecy Constraints
Author :
Venkitasubramaniam, Parvathinathan ; He, Ting ; Tong, Lang
Author_Institution :
Sch. of Electr. & Comput.Eng., Cornell Univ., Ithaca, NY
fYear :
2006
fDate :
23-25 Oct. 2006
Firstpage :
1
Lastpage :
7
Abstract :
Wireless networks are susceptible to anonymous monitoring of transmissions by adversaries who can infer valuable information about data flows in the network. It is therefore necessary to design network protocols that maintain secrecy of routes from eavesdroppers. In this work, we present a mathematical formulation of route secrecy when eavesdroppers observe transmission epochs of nodes. We consider networks where the nodes use receiver directed signaling schemes and each node has a strict delay constraint for relaying packets. We propose a scheduling technique to provide complete secrecy of routes, and based on that, characterize achievable rate regions for two-hop data routes under the given constraints. Furthermore, we extend the results when an additional constraint on packet loss is imposed
Keywords :
radio networks; routing protocols; scheduling; signalling protocols; telecommunication security; anonymous monitoring; network protocol; receiver directed signaling scheme; routes secrecy; scheduling technique; transmission epoch; wireless network; Computerized monitoring; Data security; Delay; Government; Information security; Protocols; Relays; Scheduling; Telecommunication traffic; Wireless networks; Network Security; Packet Loss; Scheduling; Traffic Mix;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Military Communications Conference, 2006. MILCOM 2006. IEEE
Conference_Location :
Washington, DC
Print_ISBN :
1-4244-0617-X
Electronic_ISBN :
1-4244-0618-8
Type :
conf
DOI :
10.1109/MILCOM.2006.302351
Filename :
4086613
Link To Document :
بازگشت