SHEN Yulong, PEI Qingqi, MA Jianfeng, “Cooperative Secrecy to Resist Authentication Error in Two-Hop Wireless Networks,” Chinese Journal of Electronics, vol. 25, no. 4, pp. 746-752, 2016, doi: 10.1049/cje.2016.07.004
Citation: SHEN Yulong, PEI Qingqi, MA Jianfeng, “Cooperative Secrecy to Resist Authentication Error in Two-Hop Wireless Networks,” Chinese Journal of Electronics, vol. 25, no. 4, pp. 746-752, 2016, doi: 10.1049/cje.2016.07.004

Cooperative Secrecy to Resist Authentication Error in Two-Hop Wireless Networks

doi: 10.1049/cje.2016.07.004
Funds:  This work is supported by the National Natural Science Foundation of China (No.61100153, No.61373173, No.U1135002, No.U1536202) and the Fundamental Research Funds for the Central Universities (No.BDY131419).
  • Received Date: 2014-07-04
  • Rev Recd Date: 2014-09-03
  • Publish Date: 2016-07-10
  • The authentication error in two-hop wireless networks is considered without knowledge of eavesdropper channels and location. The wireless information-theoretic security has attracted considerable attention recently. A prerequisite for available works is the precise distinction between legitimate nodes and eavesdroppers. However it is unrealistic in the wireless environment. Error is always existing in the node authentication process. Best of our knowledge, there are no works focus on solving this problem in the information-theoretic security. This paper presents a eavesdropper model with authentication error and two eavesdropping ways. Then, the number of eavesdroppers can be tolerated is analyzed while the desired secrecy is achieved with high probability in the limit of a large number of relay nodes. Final, we draw two conclusions for authentication error:1) The impersonate nodes are chosen as relay is the dominant factor of the transmitted message leakage, and the impersonation attack does seriously decrease the number of eavesdroppers can be tolerated. 2) The error authentication to legitimate nodes is almost no effect on the number of eavesdroppers can be tolerated.
  • loading
  • J. Talbot and D. Welsh, Complexity and Crytography:An Introduction, Cambridge, U.K., 2006.
    A.D. Wyner, "The wire-tap channel", Bell Syst. Tech. Journal, Vol.54, No.8 pp.1355-1387, 1975.
    J. Hershey, A. Hassan and R. Yarlagedda, "Unconventional cryptographic keying variable management", IEEE Transaction on Communications, Vol.43, No.1, pp.3-6, 1995.
    X. Zhao, X. Wang, W. Yu, et al., "An effcient broadcast authentication protocolin wireless sensor networks", Chinese Journal of Electronics, Vol.18, No.2, pp.368-372, 2009.
    S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise", IEEE Transactions on Wireless Communications, Vol.7, No.6, pp.2180-2189, 2008.
    S. Vasudevan, S. Adams, D. Geockel, et al., "Multi-user diversity for secrecy in wireless networks", Information Theorem and Applications Workshop, Amherst, MA, USA, pp.1-5, 2009.
    L. Lai and H. El Gamal, "The relay-eavesdropper channel:Cooperation for secrecy", IEEE Trans. Inf. Theory, Vol.54, No.9, pp.4005-4019, 2008.
    V. Aggarwal, L. Sankar, A.R. Calderbank, et al., "Secrecy capacity of a class of orthogonal relay eavesdropper channels", EURASIP Journal on Wireless Communications and Networking, Vol.2009, Article No.4, 15 pages, doi:10.1155/2009/494696, 2009.
    M. Yuksel, X. Liu and E. Erkip, "Secure communication with a relay helping the wiretapper", IEEE Trans. on Information Forensics and Security, Vol.6, No.3, pp.818-830, 2011.
    X. He and A. Yener, "Two-hop secure communication using an untrusted relay", EURASIP Journal on Wireless Communications and Networking, Vol.2009, Article No.9, 13 pages, doi:10.1155/2009/305146, 2009.
    R. Negi and S. Goelm, "Secret communication using artificial noise", Proc. IEEE Vehicular Tech. Conf, Dallas TX, pp.1906-1910, 2005.
    L. Dong, Z. Han, A. Petropulu, et al., "Improving wireless physical layer security via cooperating relays", IEEE Trans. Sig. Proc., Vol.58, No.3, pp.1875-1888, 2010.
    D. Goeckel, S. Vasudevan, D. Towsley, et al., "Artificial noise generation from cooperative relays for everlasting secrecy in two-hop wireless networks", IEEE Journal on Selected Areas in Communications, Vol.29, No.10, pp.2067-2076, 2011.
    A. Sheikholeslami, D. Goeckel, H. Pishro-Nik, et al., "Physical layer security from inter-session interference in large wireless networks", Proc. IEEE INFOCOM, Orlando, FL, pp.1179-1187, 2012.
    S. Vasudevan, D. Goeckel and D. Towsley, "Security versus capacity tradeoffs in large wireless networks using keyless secrecy", ACM MobiHoc, Chicago, Illinois, pp.21-30, 2010.
    L. Tamilselvan and V. Sankaranarayanan, "Prevention of impersonation attack in wireless mobile ad hoc networks", IJCSNS International Journal of Computer Science and Network Security, Vol.7, No.3, pp.118-123, 2007.
    M. Xiao, L. Huang, H. Xu, et al., "Privacy preserving hop-distance computation in wireless sensor networks", Chinese Journal of Electronics, Vol.19, No.1, pp.191-194, 2010.
    S. Leung-Yan-Cheong and M. Hellman, "The Gaussian wire-tap channel", IEEE Trans. on Information Theory, Vol.24, No.4, pp.451-456, 1978.
    M. Mitzenmacher and E. Upfal, Probability and Computing:Randomized Alogrithms and Probabilitic Analysis, Cambridge University Press, 2005.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (405) PDF downloads(1199) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return