Cooperative Secrecy to Resist Authentication Error in Two-Hop Wireless Networks  被引量:1

Cooperative Secrecy to Resist Authentication Error in Two-Hop Wireless Networks

在线阅读下载全文

作  者:SHEN Yulong PEI Qingqi MA Jianfeng 

机构地区:[1]School of Computer Science and Technology, Xidian University, Xi'an 710071, China [2]The State Key Laboratory of Integrated Services Networks, Xi'an 710071, China [3]School of Telecommunications Engineering, Xidian University, Xi'an 710071, China

出  处:《Chinese Journal of Electronics》2016年第4期746-752,共7页电子学报(英文版)

基  金:supported by the National Natural Science Foundation of China(No.61100153,No.61373173,No.U1135002,No.U1536202);the Fundamental Research Funds for the Central Universities(No.BDY131419)

摘  要:The authentication error in two-hop wireless networks is considered without knowledge of eavesdropper channels and location.The wireless informationtheoretic security has attracted considerable attention recently.A prerequisite for available works is the precise distinction between legitimate nodes and eavesdroppers.However it is unrealistic in the wireless environment.Error is always existing in the node authentication process.Best of our knowledge,there are no works focus on solving this problem in the information-theoretic security.This paper presents a eavesdropper model with authentication error and two eavesdropping ways.Then,the number of eavesdroppers can be tolerated is analyzed while the desired secrecy is achieved with high probability in the limit of a large number of relay nodes.Final,we draw two conclusions for authentication error:1) The impersonate nodes are chosen as relay is the dominant factor of the transmitted message leakage,and the impersonation attack does seriously decrease the number of eavesdroppers can be tolerated.2) The error authentication to legitimate nodes is almost no effect on the number of eavesdroppers can be tolerated.The authentication error in two-hop wireless networks is considered without knowledge of eavesdropper channels and location.The wireless informationtheoretic security has attracted considerable attention recently.A prerequisite for available works is the precise distinction between legitimate nodes and eavesdroppers.However it is unrealistic in the wireless environment.Error is always existing in the node authentication process.Best of our knowledge,there are no works focus on solving this problem in the information-theoretic security.This paper presents a eavesdropper model with authentication error and two eavesdropping ways.Then,the number of eavesdroppers can be tolerated is analyzed while the desired secrecy is achieved with high probability in the limit of a large number of relay nodes.Final,we draw two conclusions for authentication error:1) The impersonate nodes are chosen as relay is the dominant factor of the transmitted message leakage,and the impersonation attack does seriously decrease the number of eavesdroppers can be tolerated.2) The error authentication to legitimate nodes is almost no effect on the number of eavesdroppers can be tolerated.

关 键 词:Wireless networks Information-theoretic security Cooperative secrecy Authentication error 

分 类 号:TN918[电子电信—通信与信息系统]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象