On secrecy capacity scaling in wireless networks
- 1 January 2010
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
We study a random extended network, where the legitimate and eavesdropper nodes are assumed to be placed according to Poisson point processes in a square region of area n. It is shown that, when the legitimate nodes have unit intensity, ¿ = 1, and the eavesdroppers have an intensity of ¿ e = O((log n) -2 ), almost all of the nodes achieve a perfectly secure rate of ¿ (1/¿n). The achievability argument is based on a novel multi-hop forwarding scheme where randomization is added in every hop to ensure maximal ambiguity at the eavesdropper(s). Remarkable, under these assumptions, securing the transmissions of nodes does not entail a loss in the per-node throughput in terms of scaling.Keywords
Other Versions
This publication has 8 references indexed in Scilit:
- On secrecy capacity scaling in wireless networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2010
- Secure capacity of multi-hop wireless networks with random key pre-distributionPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2008
- Hierarchical Cooperation Achieves Optimal Capacity Scaling in Ad Hoc NetworksIEEE Transactions on Information Theory, 2007
- Closing the Gap in the Capacity of Wireless Networks Via Percolation TheoryIEEE Transactions on Information Theory, 2007
- The capacity of wireless networksIEEE Transactions on Information Theory, 2000
- Domination by product measuresThe Annals of Probability, 1997
- The Wire-Tap ChannelBell System Technical Journal, 1975
- Communication Theory of Secrecy Systems*Bell System Technical Journal, 1949