On the Effect of Colluding Eavesdroppers on Secrecy Scaling

نویسندگان

  • O. Ozan Koyluoglu
  • C. Emre Koksal
  • Hesham El Gamal
چکیده

In a powerful secrecy attack, eavesdroppers can collude, i.e., they can share their observations. Securing information in such a scenario will be an even more challenging task compared to non-colluding case. We here analyze the effect of eavesdropper collusion on the achievable performance in both the path loss and ergodic multi-path fading models. We provide two results: 1) If the legitimate nodes have unit intensity (λ = 1) and the colluding eavesdroppers have an intensity of λe = O (

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Constrained Colluding Eavesdroppers: An Information-Theoretic Model

We study the secrecy capacity in the vicinity of colluding eavesdroppers. Contrary to the perfect collusion assumption in previous works, our new information-theoretic model considers constraints in collusion. We derive the achievable secure rates (lower bounds on the perfect secrecy capacity), both for the discrete memoryless and Gaussian channels. We also compare the proposed rates to the non...

متن کامل

Safeguarding Millimeter Wave Communications Against Randomly Located Eavesdroppers

Millimeter wave offers a sensible solution to the capacity crunch faced by 5G wireless communications. This paper comprehensively studies physical layer security in a multi-input single-output (MISO) millimeter wave system where multiple single-antenna eavesdroppers are randomly located. Concerning the specific propagation characteristics of millimeter wave, we investigate two secure transmissi...

متن کامل

Physical layer security for multi-user MIMO systems

T his thesis studies physical layer security for multi-user multiple-input multiple-output (MIMO) wireless systems. Due to the broadcast nature of the physical medium, wireless multi-user communications are very susceptible to eavesdropping, and it is critical to protect the transmitted information. Security of wireless communications has traditionally been achieved at the network layer with cr...

متن کامل

MIMO DF Relay Beamforming for Secrecy with Artificial Noise, Imperfect CSI, and Finite-Alphabet

In this paper, we consider decode-and-forward (DF) relay beamforming with imperfect channel state information (CSI), cooperative artificial noise (AN) injection, and finitealphabet input in the presence of an user and J non-colluding eavesdroppers. The communication between the source and the user is aided by a multiple-input-multiple-output (MIMO) DF relay. We use the fact that a wiretap code ...

متن کامل

Secure Communication in Stochastic Wireless Networks

Information-theoretic security – widely accepted as the strictest notion of security – relies on channel coding techniques that exploit the inherent randomness of the propagation channels to significantly strengthen the security of digital communications systems. Motivated by recent developments in the field, this paper aims at a characterization of the fundamental secrecy limits of wireless ne...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009