Artificial Noise Generation from Cooperative Relays for Everlasting Secrecy in Two-Hop Wireless Networks

被引:74
|
作者
Goeckel, Dennis [1 ]
Vasudevan, Sudarshan [2 ]
Towsley, Don [2 ]
Adams, Stephan [1 ]
Ding, Z. [3 ]
Leung, K. [4 ,5 ,6 ]
机构
[1] Univ Massachusetts, Dept Elect & Comp Engn, Amherst, MA 01003 USA
[2] Univ Massachusetts, Dept Comp Sci, Amherst, MA 01003 USA
[3] Newcastle Univ, Sch Elect Elect & Comp Engn, Newcastle Upon Tyne NE1 7RU, Tyne & Wear, England
[4] Univ London Imperial Coll Sci Technol & Med, Dept Elect & Elect Engn, Commun & Signal Proc Grp, London, England
[5] Univ London Imperial Coll Sci Technol & Med, Dept Elect & Elect Engn, Univ Def Res Ctr Signal Proc, London, England
[6] Univ London Imperial Coll Sci Technol & Med, Dept Comp, London, England
基金
美国国家科学基金会;
关键词
Wireless Networks; Scaling Laws; Information-Theoretic Security; Cooperative Jamming;
D O I
10.1109/JSAC.2011.111216
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The secure transmission of information in wireless networks without knowledge of eavesdropper channels or locations is considered. Two key mechanisms are employed: artificial noise generation from system nodes other than the transmitter and receiver, and a form of multi-user diversity that allows message reception in the presence of the artificial noise. We determine the maximum number of independently-operating and uniformly distributed eavesdroppers that can be present while the desired secrecy is achieved with high probability in the limit of a large number of system nodes. While our main motivation is considering eavesdroppers of unknown location, we first consider the case where the path-loss is identical between all pairs of nodes. In this case, a number of eavesdroppers that is exponential in the number of systems nodes can be tolerated. In the case of uniformly distributed eavesdroppers of unknown location, any number of eavesdroppers whose growth is sub-linear in the number of system nodes can be tolerated. The proposed approach significantly outperforms a power control approach based on standard multi-user diversity.
引用
收藏
页码:2067 / 2076
页数:10
相关论文
共 50 条
  • [1] Cooperative Secrecy to Resist Authentication Error in Two-Hop Wireless Networks
    Shen Yulong
    Pei Qingqi
    Ma Jianfeng
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2016, 25 (04) : 746 - 752
  • [2] Cooperative Secrecy to Resist Authentication Error in Two-Hop Wireless Networks
    SHEN Yulong
    PEI Qingqi
    MA Jianfeng
    [J]. Chinese Journal of Electronics, 2016, 25 (04) : 746 - 752
  • [3] Secure Cooperative Communication via Artificial Noise for Wireless Two-Hop Relaying Networks
    Nan Run Zhou
    Zhi Juan Kang
    Xiao Rong Liang
    [J]. Wireless Personal Communications, 2015, 82 : 1759 - 1771
  • [4] Secure Cooperative Communication via Artificial Noise for Wireless Two-Hop Relaying Networks
    Zhou, Nan Run
    Kang, Zhi Juan
    Liang, Xiao Rong
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2015, 82 (03) : 1759 - 1771
  • [5] Cooperative Jamming in a Two-Hop Relay Wireless Network with Buffer-Aided Relays
    Sasaki, Kenta
    Liao, Xuening
    Jiang, Xiaohong
    [J]. 2017 FIFTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING (CANDAR), 2017, : 565 - 569
  • [6] Performance of Asynchronous Two-Relay Two-Hop Wireless Cooperative Networks
    Nahas, Michel
    Saadani, Ahmed
    Hachem, Walid
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2010, 9 (03) : 1086 - 1096
  • [7] Cooperative Medium Access Control in Wireless Networks: the Two-hop Case
    Jiao, Hongzhi
    Li, Frank Y.
    [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS, 2009, : 13 - 18
  • [8] Eavesdropper Tolerance Capability Study in Two-Hop Cooperative Wireless Networks
    Zhang, Yuanyu
    Shen, Yulong
    Jiang, Xiaohong
    [J]. 2013 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), 2013, : 219 - 223
  • [9] Throughput optimal control of wireless networks with two-hop cooperative relaying
    Yeh, Edmund
    Berry, Randall
    [J]. 2007 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, VOLS 1-7, 2007, : 351 - +
  • [10] OFDMA Cellular Networks with Opportunistic Two-Hop Relays
    George Calcev
    Jeff Bonta
    [J]. EURASIP Journal on Wireless Communications and Networking, 2009