On the Effect of Colluding Eavesdroppers on Secrecy Scaling
نویسندگان
چکیده
In a powerful secrecy attack, eavesdroppers can collude, i.e., they can share their observations. Securing information in such a scenario will be an even more challenging task compared to non-colluding case. We here analyze the effect of eavesdropper collusion on the achievable performance in both the path loss and ergodic multi-path fading models. We provide two results: 1) If the legitimate nodes have unit intensity (λ = 1) and the colluding eavesdroppers have an intensity of λe = O (
منابع مشابه
Constrained Colluding Eavesdroppers: An Information-Theoretic Model
We study the secrecy capacity in the vicinity of colluding eavesdroppers. Contrary to the perfect collusion assumption in previous works, our new information-theoretic model considers constraints in collusion. We derive the achievable secure rates (lower bounds on the perfect secrecy capacity), both for the discrete memoryless and Gaussian channels. We also compare the proposed rates to the non...
متن کاملSafeguarding Millimeter Wave Communications Against Randomly Located Eavesdroppers
Millimeter wave offers a sensible solution to the capacity crunch faced by 5G wireless communications. This paper comprehensively studies physical layer security in a multi-input single-output (MISO) millimeter wave system where multiple single-antenna eavesdroppers are randomly located. Concerning the specific propagation characteristics of millimeter wave, we investigate two secure transmissi...
متن کاملPhysical layer security for multi-user MIMO systems
T his thesis studies physical layer security for multi-user multiple-input multiple-output (MIMO) wireless systems. Due to the broadcast nature of the physical medium, wireless multi-user communications are very susceptible to eavesdropping, and it is critical to protect the transmitted information. Security of wireless communications has traditionally been achieved at the network layer with cr...
متن کاملMIMO DF Relay Beamforming for Secrecy with Artificial Noise, Imperfect CSI, and Finite-Alphabet
In this paper, we consider decode-and-forward (DF) relay beamforming with imperfect channel state information (CSI), cooperative artificial noise (AN) injection, and finitealphabet input in the presence of an user and J non-colluding eavesdroppers. The communication between the source and the user is aided by a multiple-input-multiple-output (MIMO) DF relay. We use the fact that a wiretap code ...
متن کاملSecure Communication in Stochastic Wireless Networks
Information-theoretic security – widely accepted as the strictest notion of security – relies on channel coding techniques that exploit the inherent randomness of the propagation channels to significantly strengthen the security of digital communications systems. Motivated by recent developments in the field, this paper aims at a characterization of the fundamental secrecy limits of wireless ne...
متن کامل