On optimizing the security-throughput trade-off in wireless networks with adversaries

Mohamed A. Haleem, Chetan Nanjunda Mathur, R. Chandramouli, K. P. Subbalakshmi

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

In this paper, we model the adversary (eavesdropper) present in the wireless communication medium using probabilistic models. We precisely formulate the security-throughput optimization and derive analytical solutions. The effect of different adversary models, and single and multi-rate modulation schemes (BPSK and MQAM) are studied. Simulation results are given to show that significant throughput gain can be achieved by using link (channel) adaptive and adversary adaptive encryption techniques compared to fixed block length encryption.

Original languageEnglish
Title of host publicationApplied Cryptography and Network Security - 4th International Conference, ACNS 2006, Proceedings
Pages448-458
Number of pages11
DOIs
StatePublished - 2006
Event4th International Conference on Applied Cryptography and Network Security, ACNS 2006 - Singapore, Singapore
Duration: 6 Jun 20069 Jun 2006

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3989 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference4th International Conference on Applied Cryptography and Network Security, ACNS 2006
Country/TerritorySingapore
CitySingapore
Period6/06/069/06/06

Keywords

  • Encryption
  • Opportunistic
  • Optimization
  • Security
  • Tradeoff
  • Wireless

Fingerprint

Dive into the research topics of 'On optimizing the security-throughput trade-off in wireless networks with adversaries'. Together they form a unique fingerprint.

Cite this