Secure Communication in Stochastic Wireless Networks-Part II: Maximum Rate and Collusion

被引:68
|
作者
Pinto, Pedro C. [1 ]
Barros, Joao [2 ]
Win, Moe Z. [3 ]
机构
[1] Ecole Polytech Fed Lausanne, Audiovisual Commun Lab, Swiss Fed Inst Technol, CH-1015 Lausanne, Switzerland
[2] Univ Porto, Fac Engn, DEEC, P-4200465 Oporto, Portugal
[3] MIT, LIDS, Cambridge, MA 02139 USA
基金
美国国家科学基金会;
关键词
Colluding eavesdroppers; physical-layer security; secrecy capacity; stochastic geometry; wireless networks;
D O I
10.1109/TIFS.2011.2165947
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In Part I of this paper, we introduced the intrinsically secure communications graph (iS-graph)-a random graph which describes the connections that can be established with strong secrecy over a large-scale network, in the presence of eavesdroppers. We focused on the local connectivity of the iS-graph, and proposed techniques to improve it. In this second part, we characterize the maximum secrecy rate (MSR) that can be achieved between a node and its neighbors. We then consider the scenario where the eavesdroppers are allowed to collude, i.e., exchange and combine information. We quantify exactly how eavesdropper collusion degrades the secrecy properties of the network, in comparison to a noncolluding scenario. Our analysis helps clarify how the presence of eavesdroppers can jeopardize the success of wireless physical-layer security.
引用
收藏
页码:139 / 147
页数:9
相关论文
共 50 条
  • [41] Fast and secure communication resume protocol for wireless networks
    Kim, KH
    Hong, JK
    Lim, JG
    [J]. EURO-PAR 2005 PARALLEL PROCESSING, PROCEEDINGS, 2005, 3648 : 1120 - 1129
  • [42] Secure and Authenticated Data Communication in Wireless Sensor Networks
    Alfandi, Omar
    Bochem, Arne
    Kellner, Ansgar
    Goege, Christian
    Hogrefe, Dieter
    [J]. SENSORS, 2015, 15 (08) : 19560 - 19582
  • [43] Energy Efficient Secure Communication in Wireless Sensor Networks
    Gudivada, Ravi Babu
    Hansdah, R. C.
    [J]. PROCEEDINGS 2018 IEEE 32ND INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2018, : 311 - 319
  • [44] Secure Communication and Routing Architecture in Wireless Sensor Networks
    Khan, Fazlullah
    [J]. 2014 IEEE 3RD GLOBAL CONFERENCE ON CONSUMER ELECTRONICS (GCCE), 2014, : 647 - 650
  • [45] Guest Editorial Human-Centric Communication and Networking for Metaverse Over 5G and Beyond Networks-Part II
    Li, Peng
    Guo, Song
    Cai, Lin
    Dianati, Mehrdad
    Ansari, Nirwan
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2024, 42 (04) : 813 - 816
  • [46] Secure Communication in Mobile Underwater Wireless Sensor Networks
    Das, Anjana P.
    Thampi, Sabu M.
    [J]. 2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2015, : 2164 - 2173
  • [47] Analysis of the power consumption of secure communication in wireless networks
    Kim, Kihong
    Hong, Jinkeun
    Lim, Jongin
    [J]. DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2006, 4080 : 894 - 903
  • [48] Practical Signcryption for Secure Communication of Wireless Sensor Networks
    Fagen Li
    Yanan Han
    Chunhua Jin
    [J]. Wireless Personal Communications, 2016, 89 : 1391 - 1412
  • [49] Secure Group Communication in Wireless Sensor Networks: A survey
    Cheikhrouhou, Omar
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 61 : 115 - 132
  • [50] Adaptive Secure Transmission for Wireless Powered Communication Networks
    Yong Wang
    Weiwei Yang
    Tao Zhang
    Yong Chen
    Xiaohui Shang
    Quan Wang
    [J]. China Communications, 2021, 18 (03) : 155 - 173