Asymptotic Analysis on Secrecy Capacity in Large-Scale Wireless Networks

Since wireless channel is vulnerable to eavesdroppers, the secrecy during message delivery is a major concern in many applications such as commercial, governmental, and military networks. This paper investigates information-theoretic secrecy in large-scale networks and studies how capacity is affected by the secrecy constraint where the locations and channel state information (CSI) of eavesdroppers are both unknown. We consider two scenarios: 1) noncolluding case where eavesdroppers can only decode messages individually; and 2) colluding case where eavesdroppers can collude to decode a message. For the noncolluding case, we show that the network secrecy capacity is not affected in order-sense by the presence of eavesdroppers. For the colluding case, the per-node secrecy capacity of Θ([1/(√n)]) can be achieved when the eavesdropper density ψe(n) is O(n-β), for any constant β > 0 and decreases monotonously as the density of eavesdroppers increases. The upper bounds on network secrecy capacity are derived for both cases and shown to be achievable by our scheme when ψe(n)=O(n-β) or ψe(n)=Ω(log[(α-2)/(α)]n), where α is the path-loss gain. We show that there is a clear tradeoff between the security constraints and the achievable capacity. Furthermore, we also investigate the impact of secrecy constraint on the capacity of dense network, the impact of active attacks and other traffic patterns, as well as mobility models in the context.

[1]  Shlomo Shamai,et al.  A Note on the Secrecy Capacity of the Multiple-Antenna Wiretap Channel , 2007, IEEE Transactions on Information Theory.

[2]  Mathew D. Penrose,et al.  Random Geometric Graphs , 2003 .

[3]  Devavrat Shah,et al.  Throughput-delay trade-off in wireless networks , 2004, IEEE INFOCOM 2004.

[4]  Shaojie Tang,et al.  Multicast Throughput for Hybrid Wireless Networks under Gaussian Channel Model , 2009, IEEE Transactions on Mobile Computing.

[5]  Martin Haenggi The secrecy graph and some of its properties , 2008, 2008 IEEE International Symposium on Information Theory.

[6]  Xinbing Wang,et al.  Delay and Capacity Tradeoff Analysis for MotionCast , 2011, IEEE/ACM Transactions on Networking.

[7]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[8]  Suhas N. Diggavi,et al.  On Cooperative Wireless Network Secrecy , 2009, IEEE INFOCOM 2009.

[9]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[10]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[11]  Ness B. Shroff,et al.  Degenerate delay-capacity tradeoffs in ad-hoc networks with Brownian mobility , 2006, IEEE Transactions on Information Theory.

[12]  Xinbing Wang,et al.  Impact of secrecy on capacity in large-scale wireless networks , 2012, 2012 Proceedings IEEE INFOCOM.

[13]  Onur Ozan Koyluoglu,et al.  On Secrecy Capacity Scaling in Wireless Networks , 2012, IEEE Transactions on Information Theory.

[14]  Yuguang Fang,et al.  On the Price of Security in Large-Scale Wireless Ad Hoc Networks , 2011, IEEE/ACM Transactions on Networking.

[15]  Donald F. Towsley,et al.  Capacity of a wireless ad hoc network with infrastructure , 2007, MobiHoc '07.

[16]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2007, IEEE Transactions on Information Theory.

[17]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[18]  Jeffrey G. Andrews,et al.  The Throughput Cost of Information-Theoretic Security in Decentralized Wireless Networks , 2010, ArXiv.

[19]  Devavrat Shah,et al.  Throughput and Delay in Random Wireless Networks With Restricted Mobility , 2007, IEEE Transactions on Information Theory.

[20]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[21]  Philip Levis,et al.  Achieving single channel, full duplex wireless communication , 2010, MobiCom.

[22]  Donald F. Towsley,et al.  Security-capacity trade-off in large wireless networks using keyless secrecy , 2010, MobiHoc '10.

[23]  J. Dall,et al.  Random geometric graphs. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.

[24]  Panganamala Ramana Kumar,et al.  RHEINISCH-WESTFÄLISCHE TECHNISCHE HOCHSCHULE AACHEN , 2001 .

[25]  Torben Hagerup,et al.  A Guided Tour of Chernoff Bounds , 1990, Inf. Process. Lett..

[26]  Massimo Franceschetti,et al.  Closing the Gap in the Capacity of Wireless Networks Via Percolation Theory , 2007, IEEE Transactions on Information Theory.

[27]  Eytan Modiano,et al.  Capacity and delay tradeoffs for ad hoc mobile networks , 2004, IEEE Transactions on Information Theory.

[28]  Xiang-Yang Li Multicast Capacity of Wireless Ad Hoc Networks , 2009, IEEE/ACM Transactions on Networking.

[29]  H. Vincent Poor,et al.  Secrecy Throughput of MANETs Under Passive and Active Attacks , 2011, IEEE Transactions on Information Theory.

[30]  Shaojie Tang,et al.  Closing the gap in the multicast capacity of hybrid wireless networks , 2012, MobiHoc '12.

[31]  E. Leonardi,et al.  Capacity Scaling in Ad Hoc Networks With Heterogeneous Mobile Nodes: The Super-Critical Regime , 2009, IEEE/ACM Transactions on Networking.

[32]  Ayfer Özgür,et al.  Hierarchical Cooperation Achieves Optimal Capacity Scaling in Ad Hoc Networks , 2006, IEEE Transactions on Information Theory.

[33]  Moe Z. Win,et al.  Wireless secrecy in large-scale networks , 2011, 2011 Information Theory and Applications Workshop.

[34]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[35]  David Tse,et al.  Mobility increases the capacity of ad hoc wireless networks , 2002, TNET.