scholarly journals An information theoretic Location Verification System for wireless networks

Author(s):  
Shihao Yan ◽  
Robert Malaney ◽  
Ido Nevat ◽  
Gareth W. Peters
Author(s):  
Fumio Ishizaki

Since the utilization of multiuser diversity in wireless networks can increase the information theoretic capacity, much attention has been paid to packet schedulers exploiting multiuser diversity. However, it is known if there exists a tradeoff between the information theoretic capacity and fairness achieved by schedulers exploiting multiuser diversity. Therefore, the authors consider the fairness of the schedulers exploiting multiuser diversity as well as their information theoretic capacity. Among schedulers exploiting multiuser diversity, the one-bit feedback fair scheduler is considered an attractive choice due to its good balance between the capacity and fairness. This paper considers a joint scheduler which incorporates the weighted round-robin scheduling into the one-bit feedback fair scheduling. It is expected that by incorporating the round-robin scheduling into the one-bit feedback fair scheduling, the short term fairness of the scheduler is greatly improved. Considering the statistical time-access fairness index (STAFI) as a measure of short term fairness, the authors study the short term fairness properties provided by the joint scheduler. The effects of the threshold of the scheduler on the STAFI are investigated. The threshold of the scheduler strongly affects its short term fairness properties.


2015 ◽  
Vol 9 (2) ◽  
pp. 31-59
Author(s):  
Weidong Yang ◽  
Liming Sun ◽  
Zhenqiang Xu

The wireless information-theoretic security from inter-session interference has attracted considerable attention recently. A prerequisite for available works is the precise distinction between legitimate nodes and eavesdroppers. However, the authentication error always exists in the node authentication process in Two-Hop wireless networks. This paper presents an eavesdropper model with authentication error and two eavesdropping ways. Then, the number of eavesdroppers can be tolerated is analyzed while the desired secrecy is achieved with high probability in the limit of a large number of relay nodes. Final, we draw two conclusions for authentication error: 1) the impersonate nodes are chosen as relay is the dominant factor of the transmitted message leakage, and the impersonation attack does seriously decrease the number of eavesdroppers can be tolerated. 2) The error authentication to legitimate nodes is almost no effect on the number of eavesdroppers can be tolerated.


Sign in / Sign up

Export Citation Format

Share Document