Proceedings of the Eleventh ACM International Symposium on Mobile Ad Hoc Networking and Computing 2010
DOI: 10.1145/1860093.1860097
|View full text |Cite
|
Sign up to set email alerts
|

Security-capacity trade-off in large wireless networks using keyless secrecy

Abstract: We investigate the scalability of a class of algorithms that exploit the dynamics of wireless fading channels to achieve secret communication in a large wireless network of n randomly located nodes. We describe a construction in which nodes transmit artificial noise to suppress eavesdroppers whose locations are unknown and ensure secrecy of messages transported across the network. Under a model in which eavesdroppers operate independently and under appropriate conditions on the achievable per-node throughput Ψ… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
113
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 72 publications
(114 citation statements)
references
References 19 publications
1
113
0
Order By: Relevance
“…We start from the right side of the constraint (13) in the recent theorem and insert the value of a (k)…”
Section: Proofmentioning
confidence: 99%
“…We start from the right side of the constraint (13) in the recent theorem and insert the value of a (k)…”
Section: Proofmentioning
confidence: 99%
“…As shown in Lemma 6 and according to (6), the secrecy rate ( ) which each square can obtain is as follows:…”
Section: Theorem 7 In Each Square the Rate That Legitimate Sourcedementioning
confidence: 99%
“…Consequently, it is urgent to reveal the effect of this technology on the network performance such as capacity and connectivity. In [6], Vasudevan et al investigated the trade-off between capacity and security in large-scale wireless networks. To 2 International Journal of Distributed Sensor Networks degrade the channel of eavesdropper, the authors used helper nodes around the transmitters to generate artificial noise.…”
Section: Introductionmentioning
confidence: 99%
“…For instance, the per-node secure throughput in large decentralized networks was explored in [17], [18], [28], the secrecy capacity maximization problem was investigated in [19]- [21] based on cooperative communication, how to design efficient jamming strategies in terms of power or position of jamming was analyzed in [22]- [24], the opportunistic selection and use of the relays to enhance the physical layer security was studied in [25]- [27]. However, to the best of our knowledge, relatively fewer works consider the performance limits of the eavesdropper-tolerance capability of a network.…”
Section: Introductionmentioning
confidence: 99%
“…For infinite network scenarios, the scaling law of eavesdropper-tolerance capability against the per-node throughput was studied in [28] by constructing a highway system. By cooperative jamming, Goeckel et al [31] considered one source-destination pair with opportunistic relaying scheme [32], where the best relay is selected among the available relays based on some policy in terms of their channels to the source and destination, and analyzed the asymptotic behavior of eavesdropper-tolerance capability as the number of relays goes to infinity.…”
Section: Introductionmentioning
confidence: 99%