Networking With Secrecy Constraints

Wireless Networks are susceptible to anonymous monitoring of transmissions by adversaries who can infer valuable information about data flows in the network. It is therefore necessary to design network protocols that maintain secrecy of routes from eavesdroppers. In this work, the authors present a mathematical formulation of route secrecy when eavesdroppers observe transmission epochs of nodes. The authors consider networks where the nodes use receiver directed signaling schemes and each node has a strict delay constraint for relaying packets.

Provided by: Cornell University Topic: Security Date Added: Jan 2011 Format: PDF

Download Now

Find By Topic