Title :
On Secrecy Capacity Scaling in Wireless Networks
Author :
Koyluoglu, O. Ozan ; Koksal, Can Emre ; Gamal, Hesham El
Author_Institution :
Dept. of Electr. & Comput. Eng., Ohio State Univ., Columbus, OH, USA
fDate :
5/1/2012 12:00:00 AM
Abstract :
This paper studies the achievable secure rate per source-destination pair in wireless networks. First, a path loss model is considered, where the legitimate and eavesdropper nodes are assumed to be placed according to Poisson point processes with intensities λ and λe, respectively. It is shown that, as long as λe/λ = o((logn)-2), almost all of the nodes achieve a perfectly secure rate of Ω(1/√n) for the extended and dense network models. Therefore, under these assumptions, securing the network does not entail a loss in the per-node throughput. The achievability argument is based on a novel multihop forwarding scheme where randomization is added in every hop to ensure maximal ambiguity at the eavesdropper(s). Second, an ergodic fading model with n source-destination pairs and ne eavesdroppers is considered. Employing the ergodic interference alignment scheme with an appropriate secrecy precoding, each user is shown to achieve a constant positive secret rate for sufficiently large n. Remarkably, the scheme does not require eavesdropper CSI (only the statistical knowledge is assumed) and the secure throughput per node increases as we add more legitimate users to the network in this setting. Finally, the effect of eavesdropper collusion on the performance of the proposed schemes is characterized.
Keywords :
channel capacity; fading channels; precoding; radio networks; radiofrequency interference; telecommunication security; Poisson point process; dense network model; eavesdropper nodes; ergodic fading model; ergodic interference alignment; extended network model; legitimate nodes; multihop forwarding scheme; path loss model; per-node throughput; secrecy capacity scaling; secrecy precoding; source-destination pair; wireless networks; Fading; Interference; Receivers; Road transportation; Signal to noise ratio; Transmitters; Wireless networks; Capacity scaling; information theoretic security; network information theory; secure throughput; wireless networks;
Journal_Title :
Information Theory, IEEE Transactions on
DOI :
10.1109/TIT.2012.2184692