2017
DOI: 10.1109/tvt.2016.2582778
|View full text |Cite
|
Sign up to set email alerts
|

Secrecy Capacity Scaling of Large-Scale Networks With Social Relationships

Abstract: Due to the nature of wireless medium, wireless channel is susceptible to malicious nodes, which encourages the consideration of secrecy in many applications such as satellite networks, social-networking services, etc. Motivated by the social characteristic that makes nodes more likely to communicate with nearby neighbors, we study the secrecy capacity of largescale wireless networks with social relationships. We consider two distributions of legitimate nodes: they are homogeneously placed based on a Poisson po… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
11
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 20 publications
(11 citation statements)
references
References 31 publications
0
11
0
Order By: Relevance
“…Hence, the authors in [10], [11] utilized socially-aware paradigm to identify trusted and non-trusted users based on the social relationship/ties strength. In [12], the authors analysed the secure capacity for large-scale networks considering social relationships. In [13], the social reciprocity and social trust was adopted to improve the security by jamming the transmission of eavesdroppers.…”
Section: Introductionmentioning
confidence: 99%
“…Hence, the authors in [10], [11] utilized socially-aware paradigm to identify trusted and non-trusted users based on the social relationship/ties strength. In [12], the authors analysed the secure capacity for large-scale networks considering social relationships. In [13], the social reciprocity and social trust was adopted to improve the security by jamming the transmission of eavesdroppers.…”
Section: Introductionmentioning
confidence: 99%
“…Inspired by these works, a lot of researchers have devoted their efforts to exploring the security issues in large-scale wireless networks. For instance, the secure routing protocols were investigated in [14][15][16], the design of effective physical layer authentication schemes was analysed in [17][18][19], the security performances in terms of secrecy throughput capacity and eavesdropper-tolerance capability were explored in [20][21][22].…”
Section: Introductionmentioning
confidence: 99%
“…However, they did not consider the data transmission security. In [16]- [18], the authors, considered a large scale wireless networks and analyze the secrecy throughput with ideal control policies. As for the mobile ad hoc networks, Li et al [19] jointly exploited cooperative jamming and secrecy guard zone scheme and derived the exact secrecy throughput based on the physical layer security technology.…”
Section: Introductionmentioning
confidence: 99%