Networking With Secrecy Constraints

Download Now Date Added: Jan 2011
Format: PDF

Wireless Networks are susceptible to anonymous monitoring of transmissions by adversaries who can infer valuable information about data flows in the network. It is therefore necessary to design network protocols that maintain secrecy of routes from eavesdroppers. In this work, the authors present a mathematical formulation of route secrecy when eavesdroppers observe transmission epochs of nodes. The authors consider networks where the nodes use receiver directed signaling schemes and each node has a strict delay constraint for relaying packets.