TY - GEN
T1 - Wireless information-theoretic security in MANETs
AU - Chrysikos, Theofilos
AU - Kotsopoulos, Stavros
AU - Dagiuklas, Tasos
PY - 2013
Y1 - 2013
N2 - In this work, the relation between the key parameters of Wireless Information-Theoretic Security, namely the probability of non-zero secrecy capacity, the outage probability, and the shadowing deviation is investigated. The purpose is to provide a framework to identify the boundaries of secure communication from a physical layer standpoint in MANETs. This framework is heavily influenced by the intrinsic channel characteristics and propagation irregularities that deviate from simplistic path loss assumptions such as the free space model or any similar deterministic approach that underestimates the fluctuations of the received signal power. This paper provides, for the first time, a realistically confirmed method for evaluating the reliability of the Wireless Information-Theoretic Solution in an obstacle-dense topology where no central infrastructure exists, as a consequence of a natural or man-made disaster, where severe losses in signal transmission and noise meddle with secure and reliable communications. Thus, a robust tool to the cause of Public Safety is provided.
AB - In this work, the relation between the key parameters of Wireless Information-Theoretic Security, namely the probability of non-zero secrecy capacity, the outage probability, and the shadowing deviation is investigated. The purpose is to provide a framework to identify the boundaries of secure communication from a physical layer standpoint in MANETs. This framework is heavily influenced by the intrinsic channel characteristics and propagation irregularities that deviate from simplistic path loss assumptions such as the free space model or any similar deterministic approach that underestimates the fluctuations of the received signal power. This paper provides, for the first time, a realistically confirmed method for evaluating the reliability of the Wireless Information-Theoretic Solution in an obstacle-dense topology where no central infrastructure exists, as a consequence of a natural or man-made disaster, where severe losses in signal transmission and noise meddle with secure and reliable communications. Thus, a robust tool to the cause of Public Safety is provided.
KW - ad-hoc networks
KW - interference
KW - path loss
KW - shadowing
KW - wireless information-theoretic security
UR - http://www.scopus.com/inward/record.url?scp=84890889419&partnerID=8YFLogxK
U2 - 10.1109/ICCW.2013.6649322
DO - 10.1109/ICCW.2013.6649322
M3 - Conference contribution
AN - SCOPUS:84890889419
SN - 9781467357531
T3 - 2013 IEEE International Conference on Communications Workshops, ICC 2013
SP - 692
EP - 696
BT - 2013 IEEE International Conference on Communications Workshops, ICC 2013
T2 - 2013 IEEE International Conference on Communications Workshops, ICC 2013
Y2 - 9 June 2013 through 13 June 2013
ER -