Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
184 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
45 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Secure Communication in Dynamic Wireless Ad hoc Networks (1904.10856v3)

Published 24 Apr 2019 in cs.IT and math.IT

Abstract: We consider a wireless ad hoc network in the presence of eavesdroppers (EDs), where the nodes are distributed according to independent Poisson point processes (PPPs). The legitimate nodes follow the half-duplex mode of operation employing the slotted ALOHA protocol for transmission. For such a network, a novel communication scheme that induces a time-varying secure connectivity graph (SCG) is proposed, and the connectivity behavior of this induced SCG is studied. In particular, for a legitimate node in the network, we analyze (i) the average number of incoming edges and the average number of outgoing edges; (ii) the time to nearest-neighbor secure connectivity; and (iii) a condition on the EDs' density that allows information percolation, {\ie}, a condition for the existence of a `giant' component. The average time for secure connectivity among the nodes in this giant component is shown to scale linearly with the Euclidean distance. Further, we show that by splitting the packets into two sub-packets and routing each sub-packet along paths that are sufficiently far apart can (a) potentially improve secure connectivity and (b) reduce the overall delay incurred in exchanging packets between any two legitimate nodes in the giant component.

Summary

We haven't generated a summary for this paper yet.