Secure node packing of large-scale wireless networks

This paper presents a new framework to evaluate the performance of wireless networks with intrinsic secrecy. Specifically, we put forth the notion of secure node packing (SNP), defined as the number of legitimate users capable of transmitting data with secrecy using stochastic geometry. Transmission with secrecy means a legitimate receiver can decode transmitted data (reliability) while its corresponding eavesdropper cannot decode (secrecy). The SNP is derived for two cases of secure transmission: weakly secure transmission against the nearest eavesdropper and strongly secure transmission against all eavesdroppers. We quantify the effect of network parameters, including spatial densities of legitimate transmitter and eavesdropper, on the throughput of wireless networks with secrecy. In addition, we determine the SNP in the presence of a coexisting network and show that the additional interference from a coexisting network with an appropriate spatial density is beneficial for the secure network throughput.

[1]  Martin E. Hellman,et al.  A note on Wyner's wiretap channel (Corresp.) , 1977, IEEE Trans. Inf. Theory.

[2]  Martin Haenggi The secrecy graph and some of its properties , 2008, 2008 IEEE International Symposium on Information Theory.

[3]  Can Emre Koksal,et al.  On Secrecy Capacity Scaling in Wireless Networks , 2012, IEEE Trans. Inf. Theory.

[4]  François Baccelli,et al.  An Aloha protocol for multihop mobile wireless networks , 2006, IEEE Transactions on Information Theory.

[5]  Moe Z. Win,et al.  Communication in a Poisson Field of Interferers--Part I: Interference Distribution and Error Probability , 2010, IEEE Transactions on Wireless Communications.

[6]  John Orriss,et al.  Probability distributions for the number of radio transceivers which can communicate with one another , 2003, IEEE Trans. Commun..

[7]  Jeffrey G. Andrews,et al.  A primer on spatial modeling and analysis in wireless networks , 2010, IEEE Communications Magazine.

[8]  Moe Z. Win,et al.  A stochastic geometry approach to coexistence in heterogeneous wireless networks , 2009, IEEE Journal on Selected Areas in Communications.

[9]  Alberto Zanella,et al.  Interference Analysis in a Poisson Field of Nodes of Finite Area , 2009, IEEE Transactions on Vehicular Technology.

[10]  Moe Z. Win,et al.  A Mathematical Theory of Network Interference and Its Applications , 2009, Proceedings of the IEEE.

[11]  D. Stoyan,et al.  Stochastic Geometry and Its Applications , 1989 .

[12]  Moe Z. Win,et al.  Communication in a Poisson Field of Interferers-Part II: Channel Capacity and Interference Spectrum , 2010, IEEE Transactions on Wireless Communications.

[13]  Hyundong Shin,et al.  Cognitive Network Interference , 2011, IEEE Journal on Selected Areas in Communications.

[14]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[15]  Moe Z. Win,et al.  Secure Communication in Stochastic Wireless Networks—Part II: Maximum Rate and Collusion , 2012, IEEE Transactions on Information Forensics and Security.

[16]  Moe Z. Win,et al.  Secure Communication in Stochastic Wireless Networks—Part I: Connectivity , 2012, IEEE Transactions on Information Forensics and Security.

[17]  Jeffrey G. Andrews,et al.  On the Throughput Cost of Physical Layer Security in Decentralized Wireless Networks , 2010, IEEE Transactions on Wireless Communications.

[18]  Jeffrey G. Andrews,et al.  Spectrum-Sharing Transmission Capacity , 2011, IEEE Transactions on Wireless Communications.

[19]  M. Haenggi,et al.  Interference in Large Wireless Networks , 2009, Found. Trends Netw..