Title :
Asymptotic Analysis on Secrecy Capacity in Large-Scale Wireless Networks
Author :
Jinbei Zhang ; Luoyi Fu ; Xinbing Wang
Author_Institution :
Dept. of Electron. Eng., Shanghai Jiao Tong Univ., Shanghai, China
Abstract :
Since wireless channel is vulnerable to eavesdroppers, the secrecy during message delivery is a major concern in many applications such as commercial, governmental, and military networks. This paper investigates information-theoretic secrecy in large-scale networks and studies how capacity is affected by the secrecy constraint where the locations and channel state information (CSI) of eavesdroppers are both unknown. We consider two scenarios: 1) noncolluding case where eavesdroppers can only decode messages individually; and 2) colluding case where eavesdroppers can collude to decode a message. For the noncolluding case, we show that the network secrecy capacity is not affected in order-sense by the presence of eavesdroppers. For the colluding case, the per-node secrecy capacity of Θ([1/(√n)]) can be achieved when the eavesdropper density ψe(n) is O(n-β), for any constant β > 0 and decreases monotonously as the density of eavesdroppers increases. The upper bounds on network secrecy capacity are derived for both cases and shown to be achievable by our scheme when ψe(n)=O(n-β) or ψe(n)=Ω(log[(α-2)/(α)]n), where α is the path-loss gain. We show that there is a clear tradeoff between the security constraints and the achievable capacity. Furthermore, we also investigate the impact of secrecy constraint on the capacity of dense network, the impact of active attacks and other traffic patterns, as well as mobility models in the context.
Keywords :
channel capacity; communication complexity; constraint theory; radio networks; telecommunication security; telecommunication traffic; wireless channels; active attacks impact; asymptotic analysis; channel state information; eavesdropper density; information theoretic secrecy; large-scale wireless network; message decoding; message delivery; mobility models; network secrecy capacity; noncolluding case; path loss gain; per node secrecy capacity; secrecy constraint; security constraints; traffic patterns; upper bounds; wireless channel vulnerability; Interference; Noise; Receivers; Relays; Road transportation; Security; Wireless networks; Scaling law; secrecy capacity;
Journal_Title :
Networking, IEEE/ACM Transactions on
DOI :
10.1109/TNET.2013.2244230