Relay Secrecy in wireless networks with eavesdroppers

Parvathinathan Venkitasubramaniam, Ting He, Lang Tong

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)

Abstract

Anonymous monitoring of transmissions in a wireless network by eavesdroppers can provide critical information about the data flows in the network. It is, therefore, necessary to design network protocols that maintain secrecy of routes from eavesdroppers. In this work, we present a mathematical formulation of route secrecy when eavesdroppers observe transmission epochs of nodes. We propose scheduling techniques to provide complete secrecy of routes, and characterize achievable rate regions for a multiplex relay under transmitter directed spread spectrum signaling. Further, we extend the results to the case when an additional constraint on packet loss is imposed.

Original languageEnglish (US)
Title of host publication44th Annual Allerton Conference on Communication, Control, and Computing 2006
PublisherUniversity of Illinois at Urbana-Champaign, Coordinated Science Laboratory and Department of Computer and Electrical Engineering
Pages824-830
Number of pages7
ISBN (Electronic)9781604237924
StatePublished - Jan 1 2006
Event44th Annual Allerton Conference on Communication, Control, and Computing 2006 - Monticello, United States
Duration: Sep 27 2006Sep 29 2006

Publication series

Name44th Annual Allerton Conference on Communication, Control, and Computing 2006
Volume2

Other

Other44th Annual Allerton Conference on Communication, Control, and Computing 2006
CountryUnited States
CityMonticello
Period9/27/069/29/06

Fingerprint

Wireless networks
Telecommunication repeaters
Packet loss
Transmitters
Scheduling
Network protocols
Monitoring

All Science Journal Classification (ASJC) codes

  • Computer Science Applications
  • Computer Networks and Communications

Cite this

Venkitasubramaniam, P., He, T., & Tong, L. (2006). Relay Secrecy in wireless networks with eavesdroppers. In 44th Annual Allerton Conference on Communication, Control, and Computing 2006 (pp. 824-830). (44th Annual Allerton Conference on Communication, Control, and Computing 2006; Vol. 2). University of Illinois at Urbana-Champaign, Coordinated Science Laboratory and Department of Computer and Electrical Engineering.
Venkitasubramaniam, Parvathinathan ; He, Ting ; Tong, Lang. / Relay Secrecy in wireless networks with eavesdroppers. 44th Annual Allerton Conference on Communication, Control, and Computing 2006. University of Illinois at Urbana-Champaign, Coordinated Science Laboratory and Department of Computer and Electrical Engineering, 2006. pp. 824-830 (44th Annual Allerton Conference on Communication, Control, and Computing 2006).
@inproceedings{cfab93e404e14bef88bf0467dc2ce9f0,
title = "Relay Secrecy in wireless networks with eavesdroppers",
abstract = "Anonymous monitoring of transmissions in a wireless network by eavesdroppers can provide critical information about the data flows in the network. It is, therefore, necessary to design network protocols that maintain secrecy of routes from eavesdroppers. In this work, we present a mathematical formulation of route secrecy when eavesdroppers observe transmission epochs of nodes. We propose scheduling techniques to provide complete secrecy of routes, and characterize achievable rate regions for a multiplex relay under transmitter directed spread spectrum signaling. Further, we extend the results to the case when an additional constraint on packet loss is imposed.",
author = "Parvathinathan Venkitasubramaniam and Ting He and Lang Tong",
year = "2006",
month = "1",
day = "1",
language = "English (US)",
series = "44th Annual Allerton Conference on Communication, Control, and Computing 2006",
publisher = "University of Illinois at Urbana-Champaign, Coordinated Science Laboratory and Department of Computer and Electrical Engineering",
pages = "824--830",
booktitle = "44th Annual Allerton Conference on Communication, Control, and Computing 2006",

}

Venkitasubramaniam, P, He, T & Tong, L 2006, Relay Secrecy in wireless networks with eavesdroppers. in 44th Annual Allerton Conference on Communication, Control, and Computing 2006. 44th Annual Allerton Conference on Communication, Control, and Computing 2006, vol. 2, University of Illinois at Urbana-Champaign, Coordinated Science Laboratory and Department of Computer and Electrical Engineering, pp. 824-830, 44th Annual Allerton Conference on Communication, Control, and Computing 2006, Monticello, United States, 9/27/06.

Relay Secrecy in wireless networks with eavesdroppers. / Venkitasubramaniam, Parvathinathan; He, Ting; Tong, Lang.

44th Annual Allerton Conference on Communication, Control, and Computing 2006. University of Illinois at Urbana-Champaign, Coordinated Science Laboratory and Department of Computer and Electrical Engineering, 2006. p. 824-830 (44th Annual Allerton Conference on Communication, Control, and Computing 2006; Vol. 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Relay Secrecy in wireless networks with eavesdroppers

AU - Venkitasubramaniam, Parvathinathan

AU - He, Ting

AU - Tong, Lang

PY - 2006/1/1

Y1 - 2006/1/1

N2 - Anonymous monitoring of transmissions in a wireless network by eavesdroppers can provide critical information about the data flows in the network. It is, therefore, necessary to design network protocols that maintain secrecy of routes from eavesdroppers. In this work, we present a mathematical formulation of route secrecy when eavesdroppers observe transmission epochs of nodes. We propose scheduling techniques to provide complete secrecy of routes, and characterize achievable rate regions for a multiplex relay under transmitter directed spread spectrum signaling. Further, we extend the results to the case when an additional constraint on packet loss is imposed.

AB - Anonymous monitoring of transmissions in a wireless network by eavesdroppers can provide critical information about the data flows in the network. It is, therefore, necessary to design network protocols that maintain secrecy of routes from eavesdroppers. In this work, we present a mathematical formulation of route secrecy when eavesdroppers observe transmission epochs of nodes. We propose scheduling techniques to provide complete secrecy of routes, and characterize achievable rate regions for a multiplex relay under transmitter directed spread spectrum signaling. Further, we extend the results to the case when an additional constraint on packet loss is imposed.

UR - http://www.scopus.com/inward/record.url?scp=84940658470&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84940658470&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:84940658470

T3 - 44th Annual Allerton Conference on Communication, Control, and Computing 2006

SP - 824

EP - 830

BT - 44th Annual Allerton Conference on Communication, Control, and Computing 2006

PB - University of Illinois at Urbana-Champaign, Coordinated Science Laboratory and Department of Computer and Electrical Engineering

ER -

Venkitasubramaniam P, He T, Tong L. Relay Secrecy in wireless networks with eavesdroppers. In 44th Annual Allerton Conference on Communication, Control, and Computing 2006. University of Illinois at Urbana-Champaign, Coordinated Science Laboratory and Department of Computer and Electrical Engineering. 2006. p. 824-830. (44th Annual Allerton Conference on Communication, Control, and Computing 2006).