On Secrecy Capacity Scaling in Wireless Networks

被引:146
作者
Koyluoglu, O. Ozan [1 ]
Koksal, Can Emre [1 ]
El Gamal, Hesham [1 ]
机构
[1] Ohio State Univ, Dept Elect & Comp Engn, Columbus, OH 43210 USA
基金
美国国家科学基金会;
关键词
Capacity scaling; information theoretic security; network information theory; secure throughput; wireless networks; INTERFERENCE ALIGNMENT; HIERARCHICAL COOPERATION; COMMUNICATION; CHANNELS;
D O I
10.1109/TIT.2012.2184692
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper studies the achievable secure rate per source-destination pair in wireless networks. First, a path loss model is considered, where the legitimate and eavesdropper nodes are assumed to be placed according to Poisson point processes with intensities lambda and lambda(e), respectively. It is shown that, as long as lambda(e)/lambda = 0 ((log n)(-2)), almost all of the nodes achieve a perfectly secure rate of Omega(1/root n) for the extended and dense network models. Therefore, under these assumptions, securing the network does not entail a loss in the per-node throughput. The achievability argument is based on a novel multihop forwarding scheme where randomization is added in every hop to ensure maximal ambiguity at the eavesdropper(s). Second, an ergodic fading model with n source-destination pairs and n(e) eavesdroppers is considered. Employing the ergodic interference alignment scheme with an appropriate secrecy precoding, each user is shown to achieve a constant positive secret rate for sufficiently large n. Remarkably, the scheme does not require eavesdropper CSI (only the statistical knowledge is assumed) and the secure throughput per node increases as we add more legitimate users to the network in this setting. Finally, the effect of eavesdropper collusion on the performance of the proposed schemes is characterized.
引用
收藏
页码:3000 / 3015
页数:16
相关论文
共 32 条
[1]  
[Anonymous], 1926, J AIEE
[2]  
[Anonymous], 1999, PERCOLATION
[3]  
[Anonymous], P 2 IEEE WORKSH MISS
[4]   Interference alignment and degrees of freedom of the K-user interference channel [J].
Cadambe, Viveck R. ;
Jafar, Syed Ali .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (08) :3425-3441
[5]  
Cover T.M., 2006, ELEMENTS INFORM THEO, V2nd ed
[6]  
CSISZAR I, 1978, IEEE T INFORM THEORY, V24, P339, DOI 10.1109/TIT.1978.1055892
[7]  
Delfs H., 2007, Introduction to cryptography: principles and applications
[8]  
Fraiiceschetti M., 2007, RANDOM NETWORKS COMM
[9]   Closing the gap in the capacity of wireless networks via percolation theory [J].
Franceschetti, Massimo ;
Dousse, Olivier ;
Tse, David N. C. ;
Thiran, Patrick .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2007, 53 (03) :1009-1018
[10]   The Capacity of Wireless Networks: Information-Theoretic and Physical Limits [J].
Franceschetti, Massimo ;
Migliore, Marco Donald ;
Minero, Paolo .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2009, 55 (08) :3413-3424