Loading…
Connectivity of Wireless Multi-hop Stochastic Networks under the Security Constraints in Rayleigh Fading Environment
In this paper, we investigate the probability of existing a secure wireless multi-hop connection between two legitimate users in stochastic wireless networks under the existence of colluding eavesdroppers. Specifically, we introduce a simulation-based analysis that returns the path connectivity by a...
Saved in:
Main Authors: | , , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | In this paper, we investigate the probability of existing a secure wireless multi-hop connection between two legitimate users in stochastic wireless networks under the existence of colluding eavesdroppers. Specifically, we introduce a simulation-based analysis that returns the path connectivity by averaging the connection status of a vast number of topology trails with a security-aware routing algorithm is taken into account. The behaviors of the multi-hop connectivity are examined for different network sizes and the numbers of legitimate users and eavesdroppers. The obtained results in this paper show that increasing the number of legitimate users leads to maximum path connectivity of less than one; meanwhile, path connectivity is continuously reduced as the number of eavesdroppers gets higher. Moreover, scaling down the network size does not always help to increase path connectivity. |
---|---|
ISSN: | 1738-9445 |
DOI: | 10.23919/ICACT48636.2020.9061415 |