Team for Research in
Ubiquitous Secure Technology

Relay Secrecy in Wireless Networks with Eavesdroppers
Parvathinathan Venkitasubramaniam, Ting He, Lang Tong

Citation
Parvathinathan Venkitasubramaniam, Ting He, Lang Tong. "Relay Secrecy in Wireless Networks with Eavesdroppers". 44th Allerton Conference on Communication, Control and Computing, September, 2006.

Abstract
Anonymous monitoring of transmissions in a wireless network by eavesdroppers can provide critical information about the data flows in the network. It is, therefore, necessary to design network protocols that maintain secrecy of routes from eavesdroppers. In this work, we present a mathematical formulation of route secrecy when eavesdroppers observe transmission epochs of nodes. We propose scheduling techniques to provide complete secrecy of routes, and characterize achievable rate regions for a multiplex relay under transmitter directed spread spectrum signaling. Further, we extend the results to the case when an additional constraint on packet loss is imposed.

Electronic downloads

Citation formats  
  • HTML
    Parvathinathan Venkitasubramaniam, Ting He, Lang Tong. <a
    href="http://www.truststc.org/pubs/158.html"
    >Relay Secrecy in Wireless Networks with
    Eavesdroppers</a>, 44th Allerton Conference on
    Communication, Control and Computing, September, 2006.
  • Plain text
    Parvathinathan Venkitasubramaniam, Ting He, Lang Tong.
    "Relay Secrecy in Wireless Networks with
    Eavesdroppers". 44th Allerton Conference on
    Communication, Control and Computing, September, 2006.
  • BibTeX
    @inproceedings{VenkitasubramaniamHeTong06_RelaySecrecyInWirelessNetworksWithEavesdroppers,
        author = {Parvathinathan Venkitasubramaniam and Ting He and
                  Lang Tong},
        title = {Relay Secrecy in Wireless Networks with
                  Eavesdroppers},
        booktitle = {44th Allerton Conference on Communication, Control
                  and Computing},
        month = {September},
        year = {2006},
        abstract = {Anonymous monitoring of transmissions in a
                  wireless network by eavesdroppers can provide
                  critical information about the data flows in the
                  network. It is, therefore, necessary to design
                  network protocols that maintain secrecy of routes
                  from eavesdroppers. In this work, we present a
                  mathematical formulation of route secrecy when
                  eavesdroppers observe transmission epochs of
                  nodes. We propose scheduling techniques to provide
                  complete secrecy of routes, and characterize
                  achievable rate regions for a multiplex relay
                  under transmitter directed spread spectrum
                  signaling. Further, we extend the results to the
                  case when an additional constraint on packet loss
                  is imposed.},
        URL = {http://www.truststc.org/pubs/158.html}
    }
    

Posted by Lang Tong on 8 Feb 2007.
Groups: trust
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.