Cooperative Transmission against Impersonation Attack and Authentication Error in Two-Hop Wireless Networks
Weidong Yang,
Liming Sun and
Zhenqiang Xu
Additional contact information
Weidong Yang: Key Laboratory of Grain Information Processing and Control Ministry of Education, School of Information Science and Engineering, Henan University of Technology, Zhengzhou, China
Liming Sun: Beijing Key Laboratory of IOT information security technology, Institute of Information Engineering, CAS, Beijing, China
Zhenqiang Xu: Zhenqiang Xu, School of Information Science and Engineering, Henan University of Technology, Zhengzhou, China
International Journal of Information Security and Privacy (IJISP), 2015, vol. 9, issue 2, 31-59
Abstract:
The wireless information-theoretic security from inter-session interference has attracted considerable attention recently. A prerequisite for available works is the precise distinction between legitimate nodes and eavesdroppers. However, the authentication error always exists in the node authentication process in Two-Hop wireless networks. This paper presents an eavesdropper model with authentication error and two eavesdropping ways. Then, the number of eavesdroppers can be tolerated is analyzed while the desired secrecy is achieved with high probability in the limit of a large number of relay nodes. Final, we draw two conclusions for authentication error: 1) the impersonate nodes are chosen as relay is the dominant factor of the transmitted message leakage, and the impersonation attack does seriously decrease the number of eavesdroppers can be tolerated. 2) The error authentication to legitimate nodes is almost no effect on the number of eavesdroppers can be tolerated.
Date: 2015
References: Add references at CitEc
Citations:
Downloads: (external link)
http://services.igi-global.com/resolvedoi/resolve. ... 018/IJISP.2015040103 (application/pdf)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:igg:jisp00:v:9:y:2015:i:2:p:31-59
Access Statistics for this article
International Journal of Information Security and Privacy (IJISP) is currently edited by Yassine Maleh
More articles in International Journal of Information Security and Privacy (IJISP) from IGI Global
Bibliographic data for series maintained by Journal Editor ().