Secrecy Throughput in Inhomogeneous Wireless Networks with Nonuniform Traffic

被引:1
|
作者
Liu, Qiuming [1 ,2 ]
Yu, Li [1 ]
Yang, Peng [1 ]
Liu, Zuhao [3 ]
机构
[1] Huazhong Univ Sci & Technol, Dept Elect & Informat Engn, Wuhan 430074, Peoples R China
[2] Nanchang Jiangxi Univ Sci & Technol JXUST, Nanchang 330013, Peoples R China
[3] China Yangtze Power Co Ltd, Yichang 443002, Peoples R China
基金
中国国家自然科学基金; 高等学校博士学科点专项科研基金;
关键词
CAPACITY; BOUNDS; NOISE;
D O I
10.1155/2014/460196
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We investigate the secrecy throughput of inhomogeneous wireless network, especially in cases of independent and uniform eavesdropper with single antenna and multiple antennas. Towards the inhomogeneous distribution of legitimate nodes, we novelly construct a circular percolation model under the idea of transforming "inhomogeneous" to "homogeneous." Correspondingly, the information is transmitted by two ways: intracluster transmission and intercluster transmission. For intracluster transmission, a per-node secrecy throughput of Omega(root 1/n(1-v)(1 - v)logn) is derived by circular percolation model, where n and n(v) represent the number of nodes and clusters in the network, respectively. As for intercluster case, a connection called "information pipelines" is built. Then the per-node secrecy throughput of Omega(root Phi/root n) can be obtained, where Phi denotes the minimum node density in the network. Moreover, when the eavesdropper is equipped with psi(n) antennas, the per-node secrecy throughput of Omega(root 1/n(1-v)(1 - v)logn psi(-2/alpha)(n)) and Omega((root Phi/root n)psi(-2/alpha)(n)) is achieved for intracluster and intercluster transmission, respectively.
引用
收藏
页数:11
相关论文
共 50 条
  • [1] Achievable Throughput of Wireless Networks with Local Traffic
    Shariatpanahi, Seyed Pooya
    Khalaj, Babak Hossein
    Shah-Mansouri, Hamed
    [J]. 2014 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2014, : 3076 - 3081
  • [2] Throughput and QoS Optimization in Nonuniform Multichannel Wireless Mesh Networks
    Szymanski, T. H.
    [J]. Q2SWINET'08: PROCEEDINGS OF THE FOURTH ACM INTERNATIONAL SYMPOSIUM ON QOS AND SECURITY FOR WIRELESS AND MOBILE NETWORKS, 2008, : 9 - 18
  • [3] Secrecy Throughput of Wireless Interference Networks with Uncertain Channel State Information
    Sheng, Z.
    Tuan, H. D.
    Nasir, A. A.
    Poor, H. V.
    [J]. 2017 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2017,
  • [4] Transmission Policies for Improving Physical Layer Secrecy Throughput in Wireless Networks
    Gau, Rung-Hung
    [J]. IEEE COMMUNICATIONS LETTERS, 2012, 16 (12) : 1972 - 1975
  • [5] Secrecy Throughput Maximization for Massive MIMO Wireless Powered Communication Networks
    Rezaei, Roohollah
    Sun, Sumei
    Kang, Xin
    Guan, Yong Liang
    Pakravan, Mohammad Reza
    [J]. 2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [6] Throughput maximization in multi-hop wireless networks under a secrecy constraint
    Nardelli, Pedro H. J.
    Alves, Hirley
    De Lima, Carlos H. M.
    Latva-Aho, Matti
    [J]. COMPUTER NETWORKS, 2016, 109 : 13 - 20
  • [7] Secrecy Throughput Maximization for Full-Duplex Wireless Powered Communication Networks
    Rezaei, Roohollah
    Sun, Sumei
    Kang, Xin
    Guan, Yong Liang
    Pakravan, Mohammad Reza
    [J]. ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2019,
  • [8] Intrinsic Secrecy in Inhomogeneous Stochastic Networks
    Chisci, Giovanni
    Conti, Andrea
    Mucchi, Lorenzo
    Win, Moe Z.
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2019, 27 (04) : 1291 - 1304
  • [9] An Achievable Throughput Capacity of Three-Dimensional Inhomogeneous Wireless Networks
    Bai, Guang
    Yu, Li
    Liu, Qiuming
    [J]. 2014 IEEE 80TH VEHICULAR TECHNOLOGY CONFERENCE (VTC FALL), 2014,
  • [10] Perfect secrecy in wireless networks
    Bradford, PG
    Gavrylyako, OV
    Smith, RK
    [J]. 2003 INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING WORKSHOPS, PROCEEDINGS, 2003, : 409 - 416