Skip to main content Accessibility help
×
Hostname: page-component-84b7d79bbc-c654p Total loading time: 0 Render date: 2024-07-30T02:26:53.557Z Has data issue: false hasContentIssue false

14 - Modeling malicious behavior in cooperative cellular wireless networks

from Part IV - Game theoretic models for cooperative cellular wireless networks

Published online by Cambridge University Press:  03 May 2011

Ninoslav Marina
Affiliation:
Princeton University, USA
Walid Saad
Affiliation:
UNIK – University of Oslo, Norway
Zhu Han
Affiliation:
University of Houston, USA
Are Hjørungnes
Affiliation:
UNIK – University of Oslo, Norway
Ekram Hossain
Affiliation:
University of Manitoba, Canada
Dong In Kim
Affiliation:
Sungkyunkwan University, Korea
Vijay K. Bhargava
Affiliation:
University of British Columbia, Vancouver
Get access

Summary

Introduction

Future communication systems will be decentralized and ad-hoc, hence allowing various types of network mobile terminals to join and leave. This makes the whole system vulnerable and susceptible to attacks. Anyone within communication range can listen to and possibly extract information. While these days we have numerous cryptographic methods to ensure high-level security, there is no system with perfect security on the physical layer. Therefore, the physical layer security is attracting renewed attention. Of special interest is so-called information-theoretic security since it concerns the ability of the physical layer to provide perfect secrecy of the transmitted data.

In this chapter, we present different scenarios of a decentralized system that protects the broadcasted data on the physical layer and makes it impossible for the eavesdropper to receive the packets no matter how computationally powerful the eavesdropper is. In approaches where information-theoretic security is applied, the main objective is to maximize the rate of reliable information from the source to the intended destination, while all malicious nodes are kept ignorant of that information. This maximum reliable rate under which a perfectly secret communication is possible is known as the secrecy capacity.

This line of work was pioneered by Aaron Wyner, who defined the wiretap channel and established the possibility of secure communication links without relying on private (secret) keys.

Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2011

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×