首页> 外文会议>International Conference on Computer Supported Cooperative Work in Design >Eavesdropping attack in collaborative wireless networks: Security protocols and intercept behavior
【24h】

Eavesdropping attack in collaborative wireless networks: Security protocols and intercept behavior

机译:协作无线网络中的窃听攻击:安全协议和拦截行为

获取原文

摘要

In this paper, we investigate security issues in a collaborative wireless network in the presence of eavesdropping attacks, where multiple amplify-and-forward (AF) relays are exploited to secure the message transmission between legitimate users. We first consider the multiple AF relays all participating in assisting the transmission from source to destination, which is called all-relay based collaborative transmission scheme as denoted by all-relay scheme for notational convenience. We also propose the best-relay transmission scheme in which only the single “best” relay is selected to help the source transmit messages to destination. We then analyze the intercept behavior in wireless networks and evaluate intercept probabilities of the proposed all-relay and best-relay schemes as well as the conventional direct transmission without relay in a Rayleigh fading environment. Numerical results show that the best-relay transmission scheme always outperforms the all-relay and direct transmission schemes in terms of intercept probability. It is also shown that as the number of eavesdroppers increases, the intercept probabilities of both all-relay and best-relay schemes increase. Moreover, the intercept probability performance of all-relay and best-relay schemes significantly improves with an increasing number of relays, implying the advantage of exploiting multiple relays against eavesdropping attacks.
机译:在本文中,我们研究了存在窃听攻击的协作无线网络中的安全问题,其中利用了多个放大转发(AF)中继来保护合法用户之间的消息传输。我们首先考虑多个AF中继,它们都参与协助从源到目的地的传输,这被称为基于全中继的协作传输方案,为表示方便起见由全中继方案表示。我们还提出了最佳中继传输方案,其中仅选择单个“最佳”中继来帮助源将消息传输到目的地。然后,我们分析了无线网络中的拦截行为,并评估了所提出的全中继和最佳中继方案以及在瑞利衰落环境中不带中继的常规直接传输的拦截概率。数值结果表明,就拦截概率而言,最佳中继传输方案始终优于全中继和直接传输方案。还显示出,随着窃听者数量的增加,全中继方案和最佳中继方案的拦截概率均增加。此外,随着中继数量的增加,全中继和最佳中继方案的拦截概率性能显着提高,这意味着利用多个中继来防范窃听攻击的优势。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号