International Journal of Advance Computational Engineering and Networking (IJACEN)
.
Follow Us On :
current issues
Volume-9,Issue-5  ( May, 2021 )
Past issues
  1. Volume-9,Issue-4  ( Apr, 2021 )
  2. Volume-9,Issue-3  ( Mar, 2021 )
  3. Volume-9,Issue-2  ( Feb, 2021 )
  4. Volume-9,Issue-1  ( Jan, 2021 )
  5. Volume-8,Issue-12  ( Dec, 2020 )
  6. Volume-8,Issue-11  ( Nov, 2020 )
  7. Volume-8,Issue-10  ( Oct, 2020 )
  8. Volume-8,Issue-9  ( Sep, 2020 )
  9. Volume-8,Issue-8  ( Aug, 2020 )
  10. Volume-8,Issue-7  ( Jul, 2020 )

Statistics report
Sep. 2021
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 100
Paper Published : 1307
No. of Authors : 3297
  Journal Paper


Paper Title :
EFFICIENT USAGE OF UN TRUSTED RELAYS TO END-TO-END COMMUNICATION FOR WSNs

Author :DIVYA RAVI, KAVITHA.

Article Citation :DIVYA RAVI ,KAVITHA. , (2014 ) " EFFICIENT USAGE OF UN TRUSTED RELAYS TO END-TO-END COMMUNICATION FOR WSNs " , International Journal of Advance Computational Engineering and Networking (IJACEN) , pp. 40-44, Volume-2,Issue-3

Abstract : A wireless network differs fundamentally from a network of noiseless bit pipes. The broadcast nature of the medium results in signals transmitted by a node to be overheard by all, making it easier to eavesdrop. Further, an interference result from multiple transmissions overheard by all nodes and fundamentally alters the methods with which information theoretic secrecy can be provided. n this paper, we consider confidential message transfer for wireless networks of arbitrary size within an information theoretic secrecy framework. In order to address this problem with the simplest model which retains the characteristics of a wireless communication medium, namely, broadcast and interference, we consider a line network. The source and the destination in this network are connected by a chain of nodes, any or all of which, despite being a part of the network, and willing to carry out relaying functions, are not to be trusted with the information sent from the source to the destination. To this end, all of these nodes need to be treated as potential eavesdroppers. The achievable rate obtained indicates that imposing secrecy constraints penalizes the capacity by at most 1bit per channel use. Therefore, it is concluded that information theoretic secrecy can be guaranteed for this model irrespective of eavesdropping relays and a fixed modest cost for the end-to-end rate using simulations in the network simulator.

Type : Research paper

Published : Volume-2,Issue-3


DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-520   View Here

Copyright: © Institute of Research and Journals

| PDF |
Viewed - 36
| Published on 2014-03-21
   
   
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World

JOURNAL SUPPORTED BY