Escolar Documentos
Profissional Documentos
Cultura Documentos
ABSTRACT
In wireless ad hoc networks the sender and receiver
should sharing the message with secure and timely
manner. Each nodes communicate through an
intermediate node which are moving over the network.
The nature of an intermediate or relay node should
produce the throughput performance on entire network.
Relay transmission can enhance coverage and
Throughput. In this paper, consider the transmission of a
confidential message from a source to a destination in a
decentralized wireless network in the presence of
randomly distributed eavesdroppers. The source
destination pair off can be potentially assisted by
randomly dispersed relays. For an arbitrary relay,
develop exact expressions of secure link probability for
both colluding and noncolluding eavesdroppers. To
obtain lower bound expressions on the secure connection
probability, which are correct when the eavesdropper
density is small. Using these lower bound terminology,
propose a relay selection strategy to improve the secure
connection probability. By analytically compare the
secure connection probability for direct transmission and
relay transmission, to address the important problem of
whether or not to relay and discuss the condition for
relay transmission in terms of the relay density and
sourcedestination space. These analytical results are
accurate in the small eavesdropper density regime. There
is no link failure between nodes because each node
having static velocity. If data loss is occurred any node
that node should retransmit the data to neighbor without
the involvement of source node. It will save the energy
of relay node. A trust based security protocol based on a
MAC-layer approach which attains confidentiality and
authentication of packets in both routing and link layers
of MANETs.
1. INTRODUCTION
The research on wireless ad hoc networks has
experienced a rapid growth over the last few years.
Unique properties of adhoc networks, such as operation
www.ijete.org
2. RELATED WORKS
In[1] P. C. Pinto, J. Barros, and M. Z. Win, In some
applications, this assumption may underestimate the
eavesdroppers power: they can collude, i.e., share their
channel outputs , and render the attack more effective.
Hence, combating colluding eavesdroppers, particularly
in wireless networks, has been a significant challenge.
To the best of our knowledge, all previous works
modeled k colluding eavesdroppers as one eavesdropper
with k antennas; we term these perfect colluding
eavesdroppers. Using the corresponding Single-Input
Multiple Output (SIMO) Gaussian wiretap channel, the
information leak is determined by the aggregate Signal
www.ijete.org
4. EXPERIMENT RESULTS
A relay network consisting of one source (S), several
relays (Rl , l = 1, 2, . . .), one destination (D), and several
eavesdroppers (E j , j = 1, 2, . . .). All the nodes are
equiped with one antenna. The distance between the
source and destination is equal to dSD. The distributions
of relays and eavesdroppers are homogenous PPPs R
and E with density R and E, respectively. In this
system, all the transmitters transmit with the same
power. Then can obtain the instantaneous signal-to-noise
ratio (SNR) at the relays, destination, and eavesdroppers.
The direct transmission match the simulation results
perfectly for two strategies. The lower bounds of secure
connection probability for relay transmission for both
the two strategies are very close to the simulation results,
when E is low, and the gap between them becomes
larger with E increasing. Secondly, the secure
connection probability for non-colluding eavesdroppers
is better than that of colluding eavesdroppers. Thirdly, it
is shown that the secure connection probability for relay
transmission depends on the relay density. When R is
low, the secure connection probability for relay
transmission is worse.
According to RaF means that the source and relay use
independent randomization signal in each hop. The
communication is divided into two slots. In the first time
slot, the source sends data to the relays. In the second
time slot, only the selected relay sends data to the
destination. The RaF strategy, securing each individual
hop is sufficient for securing the end-to-end
transmission, so the message is secured if the two hops
are both secured.
243
www.ijete.org
1
DirectLink(Mon
te Carlo
simulation
colluding)
0.9
5. CONCLUSION
0.8
RelayCooperati
onR=104(Mo
nte Carlo
simulation
colluding)
0.7
0.6
RelayCooperati
onR=104(Mo
nte Carlo
simulation
colluding)
0.5
Direct
link(Monte
Carlo
simulation
noncolluding)
0.4
0.3
RelayCooperati
onR=103(Mo
nte Carlo
simulation
noncolluding)
0.2
0.1
80
85
90
95
100
105
110
dsd(m)
RelayCooperati
onR=104(Mo
nte Carlo
simulation
noncolluding)
REFERENCES
[1] P. C. Pinto, J. Barros, and M. Z. Win, Wireless
physical-layer security: the case of colluding
eavesdroppers, Proc. IEEE ISIT, Jun. 2009.
[2] M. Haenggi, On distances in uniformly random
networks, IEEE Trans. Inf. Theory, vol. 51, no. 10, pp.
35843586, Oct. 2005.
[3] I. S. Gradshteyn and I. M. Ryzhik, Table of Integrals,
Series, and Products, 7th ed. New York, NY, USA:
Academic, 2007.
[4] M. Haenggi, J. G. Andrews, F. Baccelli, O. Dousse,
and M. Franceschetti, Stochastic geometry and random
graphs for the analysis and design of wireless networks,
IEEE J. Sel. Areas Commun., vol. 27, no. 7, pp. 1029
1046, Sep. 2009.
[5] C. Jeong and I.-M. Kim, Optimal power allocation
for secure multicarrier relay systems, IEEE Trans.
Signal Process., vol. 59, no. 11, pp. 54285442, Nov.
2011.
[6] O. O. Koyluoglu, C. E. Koksal, and H. El Gamal,
On secrecy capacity scaling in wireless networks,
244
www.ijete.org
245
www.ijete.org