Distributed network secrecy

J Lee, A Conti, A Rabbachin… - IEEE Journal on Selected …, 2013 - ieeexplore.ieee.org
Secrecy is essential for a variety of emerging wireless applications where distributed
confidential information is communicated in a multilevel network from sources to …

Interleaved coding for secrecy with a hidden key

D Sarmento, J Vilela, WK Harrison… - 2015 IEEE Globecom …, 2015 - ieeexplore.ieee.org
We propose a coding scheme based on the combination of interleaving with systematic
channel codes for secrecy. The basic idea consists of generating a random interleaving key …

Exact secrecy throughput capacity study in mobile ad hoc networks

X Li, Y Zhang, S Zhao, Y Shen, X Jiang - Ad Hoc Networks, 2018 - Elsevier
The secrecy throughput capacity (STC) performance study of mobile ad hoc networks
(MANETs) is critical for supporting their applications in security-sensitive scenarios. Despite …

Load based key generation for MANETs: a comparative study with DSR and AODV

KR Shibu, R Suji Pramila - Wireless Personal Communications, 2021 - Springer
Automatic key establishment schemes are the root of secure communication in Mobile
adhoc networks (MANETs). These schemes are not universal, their performance depends …

Secrecy transmission capacity in noisy wireless ad hoc networks

J Zhu, Y Chen, Y Shen, O Takahashi, X Jiang… - Ad hoc networks, 2014 - Elsevier
This paper considers the transmission of confidential messages over noisy wireless ad hoc
networks, where both background noise and interference from concurrent transmitters affect …

Securing distributed wireless edge networks via information-theoretic security approaches

Y Liang - 2023 - hdsr.mitpress.mit.edu
Modern distributed wireless edge networks, such as Internet of Things (IoT), data center,
cloud systems with wireless edges and mobile devices, and so on, represent one of the most …

Retracted: Selection of intermediate routes for secure data communication systems using graph theory application and grey wolf optimization algorithm in MANETs

S Balaji, MS Obaidat, S Suthir, M Rajesh… - IET …, 2021 - Wiley Online Library
Retraction:“Selection of intermediate routes for secure data communication systems using
graph theory application and grey wolf optimization algorithm in MANETs” by authors …

Optimal secrecy capacity-delay tradeoff in large-scale mobile ad hoc networks

X Cao, J Zhang, L Fu, W Wu… - IEEE/ACM Transactions …, 2015 - ieeexplore.ieee.org
In this paper, we investigate the impact of information-theoretic secrecy constraint on the
capacity and delay of mobile ad hoc networks (MANETs) with mobile legitimate nodes and …

Theoretical analysis of secrecy transmission capacity in wireless ad hoc networks

K Yu, J Yu, X Cheng, T Song - 2017 IEEE Wireless …, 2017 - ieeexplore.ieee.org
This paper analyzes the secrecy transmission capacity (STC) over wireless ad hoc networks,
where the legitimate nodes and eavesdroppers are distributed as Poisson point process. We …

A SCOPE FOR MANET ROUTING AND SECURITY THREATS.

T Lathies Bhasker - Economy of Industry, 2013 - search.ebscohost.com
The mobile Ad-hoc networks (MANET) are wireless networks which utilize mobile nodes for
communicating among them and in the external transmission range. The vulnerable nature …