Co op erative Secrecy to Resist Authentication Error in Two-Hop Wireless Networks

来源 :Chinese Journal of Electronics | 被引量 : 0次 | 上传用户:erdongzi
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
The authentication error in two-hop wireless networks is considered without knowledge of eavesdropper channels and location.The wireless informationtheoretic security has attracted considerable attention recently.A prerequisite for available works is the precise distinction between legitimate nodes and eavesdroppers.However it is unrealistic in the wireless environment.Error is always existing in the node authentication process.Best of our knowledge,there are no works focus on solving this problem in the information-theoretic security.This paper presents a eavesdropper model with authentication error and two eavesdropping ways.Then,the number of eavesdroppers can be tolerated is analyzed while the desired secrecy is achieved with high probability in the limit of a large number of relay nodes.Final,we draw two conclusions for authentication error:1) The impersonate nodes are chosen as relay is the dominant factor of the transmitted message leakage,and the impersonation attack does seriously decrease the number of eavesdroppers can be tolerated.2) The error authentication to legitimate nodes is almost no effect on the number of eavesdroppers can be tolerated. The authentication error in two-hop wireless networks is considered without knowledge of eavesdropper channels and location. Wireless informationtheoretic security has been attractedought attention recently. A prerequisite for available works is the precise distinction between legitimate nodes and eavesdroppers. Yet it is unrealistic in the wireless environment. Error is always existing in the node authentication process. Best of our knowledge, there are no works focus on solving this problem in the information-theoretic security. This paper presents a eavesdropper model with authentication error and two eavesdropping ways. the number of eavesdroppers can be tolerated is analyzed while the desired secrecy is achieved with high probability in the limit of a large number of relay nodes. Final, we draw two conclusions for authentication error: 1) The impersonate nodes are chosen as relay is the dominant factor of the transmitted message leakage, and the impersonation attack does serio usly decrease the number of eavesdroppers can be tolerated.2) The error authentication to legitimate nodes is almost no effect on the number of eavesdroppers can be tolerated.
其他文献
该文从挂篮荷载计算、施工流程、支座及临时固结施工、挂篮安装及试验、合拢段施工、模板制作安装、钢筋安装、混凝土的浇筑及养生、测量监控等方面人手,介绍了S226海滨大桥
在心内科门诊常会遇到一些年富力强的中青年女性,就诊叙述病发时,感觉心前区疼痛、心慌、胸闷,还常觉呼吸困难,且每次发病时,精神特别紧张,甚至有濒死感.经常规检查,可发现心
期刊
Maximum correntropy criterion(MCC)provides a robust optimality criterion for non-Gaussian signal processing.In this paper,the weight update equation of the conv
期刊
介绍了水利水电工程钢闸门焊缝质量、采用超声波检测的工艺特点、T型角焊缝未焊透深度的确定 ,同时介绍了缺陷反射波的波形分析与判别特点 This paper introduces the weldi
In wireless mobile networks,group members join and leave the group frequently,a dynamic group key agreement protocol is required to provide a group of users wit
In existing metro systems,the train ground radio communication system for different applications are deployed independently.Investing and constructing the commu
Repeated memory copy during protocol translation inhibits capacity of a streaming media gateway.Unlike existing optimization techniques that rely on platform-sp
近日,门诊一位患者因发烧、乳房胀痛前来就诊.根据症状,我们诊断为急性乳腺炎.其实,像她这样患上急性乳腺炎的新手妈妈越来越多,每天来门诊就诊的都有十几个.中医治疗急性乳
期刊