机构地区:[1]School of Computer Science and Technology, Xidian University, Xi'an 710071, China [2]The State Key Laboratory of Integrated Services Networks, Xi'an 710071, China [3]School of Telecommunications Engineering, Xidian University, Xi'an 710071, China
出 处:《Chinese Journal of Electronics》2016年第4期746-752,共7页电子学报(英文版)
基 金:supported by the National Natural Science Foundation of China(No.61100153,No.61373173,No.U1135002,No.U1536202);the Fundamental Research Funds for the Central Universities(No.BDY131419)
摘 要:The authentication error in two-hop wireless networks is considered without knowledge of eavesdropper channels and location.The wireless informationtheoretic security has attracted considerable attention recently.A prerequisite for available works is the precise distinction between legitimate nodes and eavesdroppers.However it is unrealistic in the wireless environment.Error is always existing in the node authentication process.Best of our knowledge,there are no works focus on solving this problem in the information-theoretic security.This paper presents a eavesdropper model with authentication error and two eavesdropping ways.Then,the number of eavesdroppers can be tolerated is analyzed while the desired secrecy is achieved with high probability in the limit of a large number of relay nodes.Final,we draw two conclusions for authentication error:1) The impersonate nodes are chosen as relay is the dominant factor of the transmitted message leakage,and the impersonation attack does seriously decrease the number of eavesdroppers can be tolerated.2) The error authentication to legitimate nodes is almost no effect on the number of eavesdroppers can be tolerated.The authentication error in two-hop wireless networks is considered without knowledge of eavesdropper channels and location.The wireless informationtheoretic security has attracted considerable attention recently.A prerequisite for available works is the precise distinction between legitimate nodes and eavesdroppers.However it is unrealistic in the wireless environment.Error is always existing in the node authentication process.Best of our knowledge,there are no works focus on solving this problem in the information-theoretic security.This paper presents a eavesdropper model with authentication error and two eavesdropping ways.Then,the number of eavesdroppers can be tolerated is analyzed while the desired secrecy is achieved with high probability in the limit of a large number of relay nodes.Final,we draw two conclusions for authentication error:1) The impersonate nodes are chosen as relay is the dominant factor of the transmitted message leakage,and the impersonation attack does seriously decrease the number of eavesdroppers can be tolerated.2) The error authentication to legitimate nodes is almost no effect on the number of eavesdroppers can be tolerated.
关 键 词:Wireless networks Information-theoretic security Cooperative secrecy Authentication error
分 类 号:TN918[电子电信—通信与信息系统]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...