International Journal of Advance Computational Engineering and Networking (IJACEN)
.
current issues
Volume-8,Issue-7  ( Jul, 2020 )
Past issues
  1. Volume-8,Issue-6  ( Jun, 2020 )
  2. Volume-8,Issue-5  ( May, 2020 )
  3. Volume-8,Issue-4  ( Apr, 2020 )
  4. Volume-8,Issue-3  ( Mar, 2020 )
  5. Volume-8,Issue-2  ( Feb, 2020 )
  6. Volume-8,Issue-1  ( Jan, 2020 )
  7. Volume-7,Issue-12  ( Dec, 2019 )
  8. Volume-7,Issue-11  ( Nov, 2019 )
  9. Volume-7, Issue-10  ( Oct, 2019 )
  10. Volume-7, Issue-9  ( Sep, 2019 )

Statistics report
Sep. 2020
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 90
Paper Published : 1248
No. of Authors : 3136
  Journal Paper

Paper Title
EFFICIENT USAGE OF UN TRUSTED RELAYS TO END-TO-END COMMUNICATION FOR WSNs

Abstract
A wireless network differs fundamentally from a network of noiseless bit pipes. The broadcast nature of the medium results in signals transmitted by a node to be overheard by all, making it easier to eavesdrop. Further, an interference result from multiple transmissions overheard by all nodes and fundamentally alters the methods with which information theoretic secrecy can be provided. n this paper, we consider confidential message transfer for wireless networks of arbitrary size within an information theoretic secrecy framework. In order to address this problem with the simplest model which retains the characteristics of a wireless communication medium, namely, broadcast and interference, we consider a line network. The source and the destination in this network are connected by a chain of nodes, any or all of which, despite being a part of the network, and willing to carry out relaying functions, are not to be trusted with the information sent from the source to the destination. To this end, all of these nodes need to be treated as potential eavesdroppers. The achievable rate obtained indicates that imposing secrecy constraints penalizes the capacity by at most 1bit per channel use. Therefore, it is concluded that information theoretic secrecy can be guaranteed for this model irrespective of eavesdropping relays and a fixed modest cost for the end-to-end rate using simulations in the network simulator.


Author - DIVYA RAVI, KAVITHA.

| PDF |
Viewed - 35
| Published on 2014-03-21
   
   
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World

JOURNAL SUPPORTED BY