Eavesdropping Security in Wireless Ad Hoc Networks with Directional Antennas

被引:0
|
作者
Wang, Qiu [1 ]
Dai, Hong-Ning [1 ]
Zhao, Qinglin [1 ]
机构
[1] Macau Univ Sci & Technol, Fac Informat Technol, Macao, Peoples R China
来源
2013 22ND WIRELESS AND OPTICAL COMMUNICATIONS CONFERENCE (WOCC 2013) | 2013年
关键词
CONNECTIVITY;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The eavesdropping security of wireless ad hoc networks has attracted considerable attention recently. However, most of current studies only consider OMN networks, where each node is mounted with a single omni-directional antenna, which radiates radio signals in all directions and consequently leads to the high eavesdropping possibility. Compared with an omni-directional antenna, a directional antenna can concentrate the radio signals on some desired directions so that it can potentially reduce the eavesdropping possibility. This paper investigates the eavesdropping security of wireless ad hoc networks equipped with directional antennas. In particular, we study the eavesdropping possibility of OMN networks, SDA networks in which each node is equipped with a simplistic directional antenna and RDA networks in which each node is equipped with a realistic directional antenna. More specifically, we identify the eavesdropping activity in wireless networks and propose an eavesdropping model to measure the eavesdropping possibility. We conduct extensive simulations to evaluate the eavesdropping possibility of OMN networks, SDA networks and RDA networks with considering various environment factors, such as path loss attenuation and shadowing effects. Our simulation results show that using a simplistic directional antenna or a realistic antenna in wireless networks can reduce the eavesdropping possibility.
引用
收藏
页码:687 / 692
页数:6
相关论文
共 50 条
  • [31] Throughput and Energy Efficiency in Wireless Ad Hoc Networks With Gaussian Channels
    Shpungin, Hanan
    Li, Zongpeng
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2012, 20 (01) : 15 - 28
  • [32] A Survey on Three-Dimensional Wireless Ad Hoc and Sensor Networks
    Shah, Babar
    Kim, Ki-Il
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
  • [33] On the lifetime of node-to-node communication in wireless ad hoc networks
    Vazifehdan, Javad
    Prasad, R. Venkatesha
    Niemegeers, Ignas
    COMPUTER NETWORKS, 2012, 56 (06) : 1685 - 1709
  • [34] Fault tolerant deployment and topology control in wireless ad hoc networks
    Li, XY
    Wan, PJ
    Wang, Y
    Yi, CW
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2004, 4 (01) : 109 - 125
  • [35] The Node Degree for Wireless Ad Hoc Networks in Shadow Fading Environments
    Guo, Lifang
    Xu, Huimin
    Harfoush, Khaled
    2011 6TH IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS (ICIEA), 2011, : 815 - 820
  • [36] IMPACT OF THE DYNAMIC MEMBERSHIP IN THE CONNECTIVITY GRAPH OF THE WIRELESS AD HOC NETWORKS
    Doci, Arta
    Springer, William
    Xhafa, Fatos
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2009, 10 (01): : 25 - 34
  • [37] Sharp Thresholds for Relative Neighborhood Graphs in Wireless Ad Hoc Networks
    Yi, Chih-Wei
    Wan, Peng-Jun
    Wang, Lixin
    Su, Chao-Min
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2010, 9 (02) : 614 - 623
  • [38] Isolated Node Localization Probablity in Wireless Ad-Hoc Networks
    Jadhav, Souparnika
    Nagesh, K. N.
    2018 SECOND INTERNATIONAL CONFERENCE ON ADVANCES IN ELECTRONICS, COMPUTERS AND COMMUNICATIONS (ICAECC), 2018,
  • [39] Optimum Designs of Wireless Ad Hoc Networks with Random Multiple Access
    Hu, Dali
    Wu, Jingxian
    Fan, Pingzhi
    2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2017,
  • [40] MAC-assisted topology control for ad hoc wireless networks
    Rahman, A.
    Gburzynski, P.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2006, 19 (09) : 955 - 976