Relay Secrecy in wireless networks with eavesdroppers

Parvathinathan Venkitasubramaniam, Ting He, Lang Tong

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Scopus citations

Abstract

Anonymous monitoring of transmissions in a wireless network by eavesdroppers can provide critical information about the data flows in the network. It is, therefore, necessary to design network protocols that maintain secrecy of routes from eavesdroppers. In this work, we present a mathematical formulation of route secrecy when eavesdroppers observe transmission epochs of nodes. We propose scheduling techniques to provide complete secrecy of routes, and characterize achievable rate regions for a multiplex relay under transmitter directed spread spectrum signaling. Further, we extend the results to the case when an additional constraint on packet loss is imposed.

Original languageEnglish (US)
Title of host publication44th Annual Allerton Conference on Communication, Control, and Computing 2006
PublisherUniversity of Illinois at Urbana-Champaign, Coordinated Science Laboratory and Department of Computer and Electrical Engineering
Pages824-830
Number of pages7
ISBN (Electronic)9781604237924
StatePublished - Jan 1 2006
Event44th Annual Allerton Conference on Communication, Control, and Computing 2006 - Monticello, United States
Duration: Sep 27 2006Sep 29 2006

Publication series

Name44th Annual Allerton Conference on Communication, Control, and Computing 2006
Volume2

Other

Other44th Annual Allerton Conference on Communication, Control, and Computing 2006
CountryUnited States
CityMonticello
Period9/27/069/29/06

All Science Journal Classification (ASJC) codes

  • Computer Science Applications
  • Computer Networks and Communications

Fingerprint Dive into the research topics of 'Relay Secrecy in wireless networks with eavesdroppers'. Together they form a unique fingerprint.

Cite this