Physical-layer security in stochastic wireless networks
- 1 November 2008
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
Motivated by recent developments in physical-layer security and stochastic geometry, we aim to characterize the fundamental limits of secure communication in wireless networks. Based on a general model in which legitimate nodes and potential eavesdroppers are randomly scattered in space, we define the secure communication graph (s-graph) from the point of view of information-theoretic security. For the Poisson s-graph, we provide conclusive results for: (a) the in-degree and out-degree of a node; (b) the isolation probability; and (c) the secrecy capacity between a node and each of its neighbours. Our analysis reveals the innate connections between information-theoretic security and the spatial densities of legitimate and eavesdropper nodes.Keywords
This publication has 18 references indexed in Scilit:
- Strong Secrecy for Wireless Channels (Invited Talk)Lecture Notes in Computer Science, 2008
- The secrecy graph and some of its propertiesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2008
- The Impact of Channel Randomness on Coverage and Connectivity of Ad Hoc and Sensor NetworksIEEE Transactions on Wireless Communications, 2008
- Spectral characterization of wireless networksIEEE Wireless Communications, 2007
- Energy efficiency of dense wireless sensor networks: to cooperate or not to cooperateIEEE Journal on Selected Areas in Communications, 2007
- Narrowband Communication in a Poisson Field of Ultrawideband InterferersPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2006
- Communication in a Poisson Field of InterferersPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2006
- Minimum number of neighbors for fully connected uniform ad hoc wireless networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- Common randomness in information theory and cryptography. I. Secret sharingIEEE Transactions on Information Theory, 1993
- The Entropy of a Point ProcessJournal of the Society for Industrial and Applied Mathematics, 1965