z-logo
open-access-imgOpen Access
Secrecy transmission capacity in mobile ad hoc networks with security‐aware Aloha protocol
Author(s) -
Li Xiaochen,
Zhang Yuanyu,
Shen Yulong,
Jiang Xiaohong
Publication year - 2020
Publication title -
iet communications
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.355
H-Index - 62
eISSN - 1751-8636
pISSN - 1751-8628
DOI - 10.1049/iet-com.2020.0570
Subject(s) - aloha , computer science , computer network , mobile ad hoc network , secrecy , eavesdropping , wireless ad hoc network , physical layer , computer security , protocol (science) , transmission (telecommunications) , throughput , wireless , telecommunications , network packet , medicine , alternative medicine , pathology
Mobile ad hoc networks (MANETs) represent a class of important network models for supporting various critical applications, while the security breach due to eavesdropping attacks has been a critical issue. This study investigates the security issue of MANETs from the perspective of physical layer security (PLS). In particular, by combining PLS techniques [e.g. artificial noise (AN) injection and Secrecy Guard zoNe (SGN)] and the conventional Aloha protocol, the authors first propose an AN‐based Aloha protocol and a SGN‐based Aloha protocol to ensure secure medium access for legitimate transmitters. In the AN‐based Aloha protocol, all potential transmitters are allowed to be active and each active transmitter injects AN into its transmitted signals to confuse eavesdroppers. In the SGN‐based protocol, each potential transmitter has an SGN, a circle centred at itself, and only the potential transmitters whose SGN contains no eavesdroppers are allowed to be active. To understand the security performances of the proposed security‐aware Aloha protocols, the authors then apply tools from Stochastic Geometry to analyse the secrecy transmission capacity (STC) performances of MANETs under both protocols. Finally, the authors provide simulation/numerical results to corroborate the proposed theoretical analysis and also to show the impacts of network parameters on the STC performances.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here