Asymptotic Analysis on Secrecy Capacity in Large-Scale Wireless Networks

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secrecy Transmission Capacity in Noisy Wireless Ad Hoc Networks

This paper considers the transmission of confidential messages over noisy wireless ad hoc networks, where both background noise and interference from concurrent transmitters affect the received signals. For the random networks where the legitimate nodes and the eavesdroppers are distributed as Poisson point processes, we study the secrecy transmission capacity (STC), as well as the connection o...

متن کامل

Asymptotic Analysis of Random Wireless Networks: Broadcasting, Secrecy, and Hybrid Networks

ASYMPTOTIC ANALYSIS OF RANDOMWIRELESS NETWORKS: BROADCASTING, SECRECY, AND HYBRID NETWORKS

متن کامل

Security Versus Capacity Tradeoffs in Large Wireless Networks Using Keyless Secrecy

We investigate the scalability of a class of algorithms that exploit the dynamics of wireless fading channels to achieve secret communication in a large wireless network of n randomly located nodes. We describe a construction in which nodes transmit artificial noise to suppress eavesdroppers, yet achieving a per-node throughput of Ω((n f (n))−1/2), where f (n) is any arbitrary function satisfyi...

متن کامل

Scaling Laws of Capacity for Large Scale Wireless Networks

In this paper, we focus on the networking-theoretic multicast capacity bounds for both random extended networks (REN) and random dense networks (RDN) under Gaussian Channel model, when all wireless nodes have the same constant transmission power P . During the transmission, the power decays along path with attenuation exponent α > 2. In REN and RDN, n nodes are randomly distributed in the squar...

متن کامل

Security Versus Capacity Tradeoffs in Large Wireless Networks Using Keyless Secrecy

We investigate the scalability of a class of algorithms that exploit dynamics of wireless fading channels to achieve secret unicast communication between multiple source-destination pairs in the presence of eavesdroppers. We first describe a construction that allows artificial noise generation to suppress eavesdroppers, yet yields a pernode throughput of Ω((n f (n))−1/2) in a wireless network o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE/ACM Transactions on Networking

سال: 2014

ISSN: 1063-6692,1558-2566

DOI: 10.1109/tnet.2013.2244230