# Optimal Secrecy Capacity-delay Tradeoff in Large-scale Mobile Ad Hoc Networks

Title | Optimal Secrecy Capacity-delay Tradeoff in Large-scale Mobile Ad Hoc Networks |

Publication Type | Journal Article |

Year of Publication | 2016 |

Authors | Cao, Xuanyu, Zhang, Jinbei, Fu, Luoyi, Wu, Weijie, Wang, Xinbing |

Journal | IEEE/ACM Trans. Netw. |

Volume | 24 |

Pagination | 1139–1152 |

ISSN | 1063-6692 |

Keywords | capacity–delay tradeoff, Collaboration, composability, Human Behavior, MANET security, Metrics, Mobile ad hoc networks (MANETs), pubcrawl, Resiliency, Scalability, secrecy constraint |

Abstract | In this paper, we investigate the impact of information-theoretic secrecy constraint on the capacity and delay of mobile ad hoc networks (MANETs) with mobile legitimate nodes and static eavesdroppers whose location and channel state information (CSI) are both unknown. We assume n legitimate nodes move according to the fast i.i.d. mobility pattern and each desires to communicate with one randomly selected destination node. There are also nv static eavesdroppers located uniformly in the network and we assume the number of eavesdroppers is much larger than that of legitimate nodes, i.e., v textgreater 1. We propose a novel simple secure communication model, i.e., the secure protocol model, and prove its equivalence to the widely accepted secure physical model under a few technical assumptions. Based on the proposed model, a framework of analyzing the secrecy capacity and delay in MANETs is established. Given a delay constraint D, we find that the optimal secrecy throughput capacity is [EQUATION](W((D/n))(2/3), where W is the data rate of each link. We observe that: 1) the capacity-delay tradeoff is independent of the number of eavesdroppers, which indicates that adding more eavesdroppers will not degenerate the performance of the legitimate network as long as v textgreater 1; 2) the capacity-delay tradeoff of our paper outperforms the previous result Th((1/npse)) in [11], where pse = nv-1 = o(1) is the density of the eavesdroppers. Throughout this paper, for functions f(n) and G(n), we denote f(n) = o(g(n)) if limn- (f(n)/g(n)) = 0; f(n) = o(g(n)) if g(n) = o(f(n)); f(n) = O(g(n)) if there is a positive constant c such that f(n) cg(n) for sufficiently large n; f(n) = O(g(n))if g(n) = O(f(n)); f(n) = Th(g(n) if both f(n) = O(g(n)) and f(n) = Omega;(g(n)) hold. Besides, the order notation [EQUATION] omits the polylogarithmic factors for better readability. |

URL | http://dl.acm.org/citation.cfm?id=3001647.3001683 |

Citation Key | cao_optimal_2016 |