On the Throughput Cost of Physical Layer Security in Decentralized Wireless Networks
Top Cited Papers
- 27 June 2011
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Wireless Communications
- Vol. 10 (8), 2764-2775
- https://doi.org/10.1109/twc.2011.061511.102257
Abstract
This paper studies the throughput of large-scale decentralized wireless networks with physical layer security constraints. In particular, we are interested in the question of how much throughput needs to be sacrificed for achieving a certain level of security. We consider random networks where the legitimate nodes and the eavesdroppers are distributed according to independent two-dimensional Poisson point processes. The transmission capacity framework is used to characterize the area spectral efficiency of secure transmissions with constraints on both the quality of service (QoS) and the level of security. This framework illustrates the dependence of the network throughput on key system parameters, such as the densities of legitimate nodes and eavesdroppers, as well as the QoS and security constraints. One important finding is that the throughput cost of achieving a moderate level of security is quite low, while throughput must be significantly sacrificed to realize a highly secure network. We also study the use of a secrecy guard zone, which is shown to give a significant improvement on the throughput of networks with high security requirements.Other Versions
This publication has 30 references indexed in Scilit:
- Secure Wireless Network Connectivity with Multi-Antenna TransmissionIEEE Transactions on Wireless Communications, 2010
- Secrecy coveragePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2010
- Continuum percolation in the intrinsically secure communications graphPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2010
- Modeling location uncertainty for eavesdroppers: A secrecy graph approachPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2010
- Secrecy throughput of MANETs with malicious nodesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2009
- The secrecy graph and some of its propertiesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2008
- Secrecy in cooperative relay broadcast channelsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2008
- Guaranteeing Secrecy using Artificial NoiseIEEE Transactions on Wireless Communications, 2008
- The Guard Zone in Wireless Ad hoc NetworksIEEE Transactions on Wireless Communications, 2007
- Packet Switching in Radio Channels: Part I--Carrier Sense Multiple-Access Modes and Their Throughput-Delay CharacteristicsIEEE Transactions on Communications, 1975