Secure Wireless Network Connectivity with Multi-Antenna Transmission

被引:98
作者
Zhou, Xiangyun [1 ]
Ganti, Radha Krishna [2 ]
Andrews, Jeffrey G. [2 ]
机构
[1] Univ Oslo, UNIK Univ Grad Ctr, N-0316 Oslo, Norway
[2] Univ Texas Austin, Dept Elect & Comp Engn, Austin, TX 78712 USA
关键词
Network connectivity; physical-layer security; colluding eavesdroppers; directional antenna; beamforming;
D O I
10.1109/TWC.2010.112310.101008
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Information-theoretic security constraints reduce the connectivity of wireless networks in the presence of eavesdroppers, which motivates better modeling of such networks and the development of techniques that are robust to eavesdropping. In this letter, we are concerned with the existence of secure connections from a typical transmitter to the legitimate receiver(s) over fading channels, where the legitimate nodes and eavesdroppers are all randomly located. We consider non-colluding and colluding eavesdroppers, and derive the network secure connectivity for both eavesdropper strategies. We mathematically show how nodes with multiple transmit antenna elements can improve secure connectivity by forming a directional antenna or using eigen-beamforming. Compared with single antenna transmission, a large connectivity improvement can be achieved by both multi-antenna transmission techniques even with a small number of antennas.
引用
收藏
页码:425 / 430
页数:6
相关论文
共 20 条
  • [1] [Anonymous], 1996, Stochastic Geometry and its Applications
  • [2] An Aloha protocol for multihop mobile wireless networks
    Baccelli, F
    Blaszczyszyn, B
    Mühlethaler, P
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2006, 52 (02) : 421 - 436
  • [3] Wireless information-theoretic security
    Bloch, Matthieu
    Barros, Joao
    Rodrigues, Miguel R. D.
    McLaughlin, Steven W.
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) : 2515 - 2534
  • [4] CSISZAR I, 1978, IEEE T INFORM THEORY, V24, P339, DOI 10.1109/TIT.1978.1055892
  • [5] Goel S., 2010, P IEEE INT S INF THE
  • [6] On distances in uniformly random networks
    Haenggi, M
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2005, 51 (10) : 3584 - 3586
  • [7] The Secrecy Graph and Some of its Properties
    Haenggi, Martin
    [J]. 2008 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, VOLS 1-6, 2008, : 539 - 543
  • [8] Haenggi M, 2009, IEEE J SEL AREA COMM, V27, P1029, DOI 10.1109/JSAC.2009.090902
  • [9] Transmission Capacity of Ad Hoc Networks with Spatial Diversity
    Hunter, Andrew M.
    Andrews, Jeffrey G.
    Weber, Steven
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2008, 7 (12) : 5058 - 5071
  • [10] Secure Transmission With Multiple Antennas-Part II: The MIMOME Wiretap Channel
    Khisti, Ashish
    Wornell, Gregory W.
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2010, 56 (11) : 5515 - 5532