2016
DOI: 10.1109/lcomm.2016.2592898
|View full text |Cite
|
Sign up to set email alerts
|

Eavesdropper Localization in Random Walk Channels

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
2

Relationship

2
6

Authors

Journals

citations
Cited by 30 publications
(20 citation statements)
references
References 11 publications
(15 reference statements)
0
20
0
Order By: Relevance
“…In our opinion, the proposed method is simple and computationally less expensive but the overall security is compromised as MC needs more mathematically resilient models for security. Guo et al [180] have proposed a mathematical model for eavesdropper detection and localization in a random walk channel. This is the only work in MC that considers the detection of an absorbing malicious receiver in a random walk channel.…”
Section: ) Eavesdroppingmentioning
confidence: 99%
See 1 more Smart Citation
“…In our opinion, the proposed method is simple and computationally less expensive but the overall security is compromised as MC needs more mathematically resilient models for security. Guo et al [180] have proposed a mathematical model for eavesdropper detection and localization in a random walk channel. This is the only work in MC that considers the detection of an absorbing malicious receiver in a random walk channel.…”
Section: ) Eavesdroppingmentioning
confidence: 99%
“…Eavesdropping Encryption using Diffie-Hellman algorithm. Eavesdropper localization in random walk channels [180] Molecular queries for patients physiological values to engage and deplete the resources, etc.…”
Section: Molecular Communicationmentioning
confidence: 99%
“…Conversely, in molecular communications, the data bearing molecules undergo diffusion via random walk propagation, which means that there is a finite probability to travel in an opposite direction without reflection. This property is exploited to detect the silent eavesdropper [13]. This yields an extra layer of security compared to traditional wireless communication.…”
Section: B Covert Messagingmentioning
confidence: 99%
“…Two kinds of attacks are discussed in [246], which are blackhole attack where malicious bionano things attract the other bionano things towards itself (by emitting chemoattractants) preventing them from their task of localization, and sentry attacks where malicious bionano things in the vicinity of the target cells emit chemo-repellents not letting the legitimate bionano things reach their target. Reference [247] and [248] consider the situations that eavesdropper appears and causes troubles; furthermore, the solutions are also discussed and evaluated. Additionally, in vesicle based molecular transport, vesicles act like keys in MC networks and thus inherently help the cause of secure communication.…”
Section: Security In Molecular Based Nanonetworkmentioning
confidence: 99%