Cooperative Transmission Against Impersonation Attack Using Inter-Session Interference in Two-Hop Wireless Networks

Author(s):  
Weidong Yang ◽  
Le Xiao ◽  
Limin Sun ◽  
Qing Li
2015 ◽  
Vol 9 (2) ◽  
pp. 31-59
Author(s):  
Weidong Yang ◽  
Liming Sun ◽  
Zhenqiang Xu

The wireless information-theoretic security from inter-session interference has attracted considerable attention recently. A prerequisite for available works is the precise distinction between legitimate nodes and eavesdroppers. However, the authentication error always exists in the node authentication process in Two-Hop wireless networks. This paper presents an eavesdropper model with authentication error and two eavesdropping ways. Then, the number of eavesdroppers can be tolerated is analyzed while the desired secrecy is achieved with high probability in the limit of a large number of relay nodes. Final, we draw two conclusions for authentication error: 1) the impersonate nodes are chosen as relay is the dominant factor of the transmitted message leakage, and the impersonation attack does seriously decrease the number of eavesdroppers can be tolerated. 2) The error authentication to legitimate nodes is almost no effect on the number of eavesdroppers can be tolerated.


2018 ◽  
Vol 66 (7) ◽  
pp. 2809-2825 ◽  
Author(s):  
Wanli Wen ◽  
Ying Cui ◽  
Fu-Chun Zheng ◽  
Shi Jin ◽  
Yanxiang Jiang

Sign in / Sign up

Export Citation Format

Share Document