Asymptotic Analysis on Secrecy Capacity in Large-Scale Wireless Networks
نویسندگان
چکیده
منابع مشابه
Secrecy Transmission Capacity in Noisy Wireless Ad Hoc Networks
This paper considers the transmission of confidential messages over noisy wireless ad hoc networks, where both background noise and interference from concurrent transmitters affect the received signals. For the random networks where the legitimate nodes and the eavesdroppers are distributed as Poisson point processes, we study the secrecy transmission capacity (STC), as well as the connection o...
متن کاملAsymptotic Analysis of Random Wireless Networks: Broadcasting, Secrecy, and Hybrid Networks
ASYMPTOTIC ANALYSIS OF RANDOMWIRELESS NETWORKS: BROADCASTING, SECRECY, AND HYBRID NETWORKS
متن کاملSecurity Versus Capacity Tradeoffs in Large Wireless Networks Using Keyless Secrecy
We investigate the scalability of a class of algorithms that exploit the dynamics of wireless fading channels to achieve secret communication in a large wireless network of n randomly located nodes. We describe a construction in which nodes transmit artificial noise to suppress eavesdroppers, yet achieving a per-node throughput of Ω((n f (n))−1/2), where f (n) is any arbitrary function satisfyi...
متن کاملScaling Laws of Capacity for Large Scale Wireless Networks
In this paper, we focus on the networking-theoretic multicast capacity bounds for both random extended networks (REN) and random dense networks (RDN) under Gaussian Channel model, when all wireless nodes have the same constant transmission power P . During the transmission, the power decays along path with attenuation exponent α > 2. In REN and RDN, n nodes are randomly distributed in the squar...
متن کاملSecurity Versus Capacity Tradeoffs in Large Wireless Networks Using Keyless Secrecy
We investigate the scalability of a class of algorithms that exploit dynamics of wireless fading channels to achieve secret unicast communication between multiple source-destination pairs in the presence of eavesdroppers. We first describe a construction that allows artificial noise generation to suppress eavesdroppers, yet yields a pernode throughput of Ω((n f (n))−1/2) in a wireless network o...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE/ACM Transactions on Networking
سال: 2014
ISSN: 1063-6692,1558-2566
DOI: 10.1109/tnet.2013.2244230