Secure Communication in Dynamic Wireless Ad hoc Networks

04/24/2019
by   B. N. Bharath, et al.
0

We consider a wireless ad hoc network in the presence of eavesdroppers (EDs), where the nodes are distributed according to independent Poisson point processes (PPPs). The legitimate nodes follow the half-duplex mode of operation employing the slotted ALOHA protocol for transmission. For such a network, a novel communication scheme that induces a time-varying secure connectivity graph (SCG) is proposed, and the connectivity behavior of this induced SCG is studied. In particular, we derive (i) the average in-degree and out-degree of any legitimate node in the network; (ii) the time to nearest-neighbor secure connectivity; and (iii) a condition on the EDs' density that allows information percolation, i.e., a condition for the existence of a `giant' component. The average time for secure connectivity among the nodes in this giant component is shown to scale linearly with the Euclidean distance. Further, we show that by splitting the packets into two sub-packets and routing each sub-packet along paths that are sufficiently far apart can (a) potentially improve secure connectivity and (b) reduce the overall delay incurred in exchanging packets between any two legitimate nodes in the giant component.

READ FULL TEXT
research
04/03/2018

GRB: Greedy Routing Protocol with Backtracking for Mobile Ad Hoc Network (Extended Version)

Routing protocols for Mobile Ad Hoc Networks (MANETs) have been extensiv...
research
10/25/2017

Competitive Routing in Hybrid Communication Networks

Routing is a challenging problem for wireless ad hoc networks, especiall...
research
10/29/2020

Experimental Analysis of Communication Relaying Delay in Low-Energy Ad-hoc Networks

In recent years, more and more applications use ad-hoc networks for loca...
research
08/09/2020

Overhead Control with Reliable Transmission of Popular Packets in Ad-Hoc Social Networks

Reliable social connectivity and transmission of data for popular nodes ...
research
03/02/2021

On the Connectivity and Giant Component Size of Random K-out Graphs Under Randomly Deleted Nodes

Random K-out graphs, denoted ℍ(n;K), are generated by each of the n node...
research
03/19/2023

Connectivity Analysis of Directed Highway VANETs using Graph Theory

Graph theory is a promising approach in handling the problem of estimati...
research
01/21/2022

Asymptotic Critical Transmission Radii in Wireless Networks over a Convex Region

Critical transmission ranges (or radii) in wireless ad-hoc and sensor ne...

Please sign up or login with your details

Forgot password? Click here to reset