Modeling malicious behavior in cooperative cellular wireless networks

Ninoslav Marina, Walid Saad, Zhu Han, Are Hjørungnes

Research output: Chapter in Book/Report/Conference proceedingChapter

2 Citations (Scopus)

Abstract

Introduction Future communication systems will be decentralized and ad-hoc, hence allowing various types of network mobile terminals to join and leave. This makes the whole system vulnerable and susceptible to attacks. Anyone within communication range can listen to and possibly extract information. While these days we have numerous cryptographic methods to ensure high-level security, there is no system with perfect security on the physical layer. Therefore, the physical layer security is attracting renewed attention. Of special interest is so-called information-theoretic security since it concerns the ability of the physical layer to provide perfect secrecy of the transmitted data. In this chapter, we present different scenarios of a decentralized system that protects the broadcasted data on the physical layer and makes it impossible for the eavesdropper to receive the packets no matter how computationally powerful the eavesdropper is. In approaches where information-theoretic security is applied, the main objective is to maximize the rate of reliable information from the source to the intended destination, while all malicious nodes are kept ignorant of that information. This maximum reliable rate under which a perfectly secret communication is possible is known as the secrecy capacity. This line of work was pioneered by Aaron Wyner, who defined the wiretap channel and established the possibility of secure communication links without relying on private (secret) keys.

Original languageEnglish (US)
Title of host publicationCooperative Cellular Wireless Networks
PublisherCambridge University Press
Pages382-422
Number of pages41
ISBN (Print)9780511667008, 9780521767125
DOIs
StatePublished - Jan 1 2011

Fingerprint

Security of data
Wireless networks
Communication
Telecommunication links
Communication systems
Secure communication

ASJC Scopus subject areas

  • Engineering(all)

Cite this

Marina, N., Saad, W., Han, Z., & Hjørungnes, A. (2011). Modeling malicious behavior in cooperative cellular wireless networks. In Cooperative Cellular Wireless Networks (pp. 382-422). Cambridge University Press. https://doi.org/10.1017/CBO9780511667008.015

Modeling malicious behavior in cooperative cellular wireless networks. / Marina, Ninoslav; Saad, Walid; Han, Zhu; Hjørungnes, Are.

Cooperative Cellular Wireless Networks. Cambridge University Press, 2011. p. 382-422.

Research output: Chapter in Book/Report/Conference proceedingChapter

Marina, N, Saad, W, Han, Z & Hjørungnes, A 2011, Modeling malicious behavior in cooperative cellular wireless networks. in Cooperative Cellular Wireless Networks. Cambridge University Press, pp. 382-422. https://doi.org/10.1017/CBO9780511667008.015
Marina N, Saad W, Han Z, Hjørungnes A. Modeling malicious behavior in cooperative cellular wireless networks. In Cooperative Cellular Wireless Networks. Cambridge University Press. 2011. p. 382-422 https://doi.org/10.1017/CBO9780511667008.015
Marina, Ninoslav ; Saad, Walid ; Han, Zhu ; Hjørungnes, Are. / Modeling malicious behavior in cooperative cellular wireless networks. Cooperative Cellular Wireless Networks. Cambridge University Press, 2011. pp. 382-422
@inbook{341b448682c34dd1b4ca790345711e79,
title = "Modeling malicious behavior in cooperative cellular wireless networks",
abstract = "Introduction Future communication systems will be decentralized and ad-hoc, hence allowing various types of network mobile terminals to join and leave. This makes the whole system vulnerable and susceptible to attacks. Anyone within communication range can listen to and possibly extract information. While these days we have numerous cryptographic methods to ensure high-level security, there is no system with perfect security on the physical layer. Therefore, the physical layer security is attracting renewed attention. Of special interest is so-called information-theoretic security since it concerns the ability of the physical layer to provide perfect secrecy of the transmitted data. In this chapter, we present different scenarios of a decentralized system that protects the broadcasted data on the physical layer and makes it impossible for the eavesdropper to receive the packets no matter how computationally powerful the eavesdropper is. In approaches where information-theoretic security is applied, the main objective is to maximize the rate of reliable information from the source to the intended destination, while all malicious nodes are kept ignorant of that information. This maximum reliable rate under which a perfectly secret communication is possible is known as the secrecy capacity. This line of work was pioneered by Aaron Wyner, who defined the wiretap channel and established the possibility of secure communication links without relying on private (secret) keys.",
author = "Ninoslav Marina and Walid Saad and Zhu Han and Are Hj{\o}rungnes",
year = "2011",
month = "1",
day = "1",
doi = "10.1017/CBO9780511667008.015",
language = "English (US)",
isbn = "9780511667008",
pages = "382--422",
booktitle = "Cooperative Cellular Wireless Networks",
publisher = "Cambridge University Press",

}

TY - CHAP

T1 - Modeling malicious behavior in cooperative cellular wireless networks

AU - Marina, Ninoslav

AU - Saad, Walid

AU - Han, Zhu

AU - Hjørungnes, Are

PY - 2011/1/1

Y1 - 2011/1/1

N2 - Introduction Future communication systems will be decentralized and ad-hoc, hence allowing various types of network mobile terminals to join and leave. This makes the whole system vulnerable and susceptible to attacks. Anyone within communication range can listen to and possibly extract information. While these days we have numerous cryptographic methods to ensure high-level security, there is no system with perfect security on the physical layer. Therefore, the physical layer security is attracting renewed attention. Of special interest is so-called information-theoretic security since it concerns the ability of the physical layer to provide perfect secrecy of the transmitted data. In this chapter, we present different scenarios of a decentralized system that protects the broadcasted data on the physical layer and makes it impossible for the eavesdropper to receive the packets no matter how computationally powerful the eavesdropper is. In approaches where information-theoretic security is applied, the main objective is to maximize the rate of reliable information from the source to the intended destination, while all malicious nodes are kept ignorant of that information. This maximum reliable rate under which a perfectly secret communication is possible is known as the secrecy capacity. This line of work was pioneered by Aaron Wyner, who defined the wiretap channel and established the possibility of secure communication links without relying on private (secret) keys.

AB - Introduction Future communication systems will be decentralized and ad-hoc, hence allowing various types of network mobile terminals to join and leave. This makes the whole system vulnerable and susceptible to attacks. Anyone within communication range can listen to and possibly extract information. While these days we have numerous cryptographic methods to ensure high-level security, there is no system with perfect security on the physical layer. Therefore, the physical layer security is attracting renewed attention. Of special interest is so-called information-theoretic security since it concerns the ability of the physical layer to provide perfect secrecy of the transmitted data. In this chapter, we present different scenarios of a decentralized system that protects the broadcasted data on the physical layer and makes it impossible for the eavesdropper to receive the packets no matter how computationally powerful the eavesdropper is. In approaches where information-theoretic security is applied, the main objective is to maximize the rate of reliable information from the source to the intended destination, while all malicious nodes are kept ignorant of that information. This maximum reliable rate under which a perfectly secret communication is possible is known as the secrecy capacity. This line of work was pioneered by Aaron Wyner, who defined the wiretap channel and established the possibility of secure communication links without relying on private (secret) keys.

UR - http://www.scopus.com/inward/record.url?scp=84926098621&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84926098621&partnerID=8YFLogxK

U2 - 10.1017/CBO9780511667008.015

DO - 10.1017/CBO9780511667008.015

M3 - Chapter

SN - 9780511667008

SN - 9780521767125

SP - 382

EP - 422

BT - Cooperative Cellular Wireless Networks

PB - Cambridge University Press

ER -