The role of aggregate interference on intrinsic network secrecy

Upper layer wireless security relies on the computational intractability assumption for solving certain number-theoretic problems. These methods can be complemented by techniques that exploit, at the physical layer, the intrinsic properties of the wireless channel and interference. This paper considers communications with intrinsic secrecy in the presence of spatially distributed nodes, namely legitimate users, eavesdroppers, and interferers. We characterize the role of aggregate interference on intrinsic network secrecy, providing insights into regimes in which interference is beneficial for network secrecy.

[1]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[2]  John Orriss,et al.  Probability distributions for the number of radio transceivers which can communicate with one another , 2003, IEEE Trans. Commun..

[3]  Moe Z. Win,et al.  Intentional Network Interference for Denial of Wireless Eavesdropping , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[4]  Richard E. Blahut,et al.  Secrecy capacity of SIMO and slow fading channels , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..

[5]  Andrea Conti,et al.  Mathematical Evaluation of Environmental Monitoring Estimation Error through Energy-Efficient Wireless Sensor Networks , 2007, IEEE Transactions on Mobile Computing.

[6]  Moe Z. Win,et al.  Communication in a Poisson Field of Interferers-Part II: Channel Capacity and Interference Spectrum , 2010, IEEE Transactions on Wireless Communications.

[7]  Matthew R. McKay,et al.  Rethinking the Secrecy Outage Formulation: A Secure Transmission Design Perspective , 2011, IEEE Communications Letters.

[8]  Hyundong Shin,et al.  Cognitive Network Interference , 2011, IEEE Journal on Selected Areas in Communications.

[9]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[10]  Shlomo Shamai,et al.  Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.

[11]  Jeffrey G. Andrews,et al.  On the Throughput Cost of Physical Layer Security in Decentralized Wireless Networks , 2010, IEEE Transactions on Wireless Communications.

[12]  Andrea Giorgetti,et al.  Influence of fading on the Gaussian approximation for BPSK and QPSK with asynchronous cochannel interference , 2005, IEEE Transactions on Wireless Communications.

[13]  Moe Z. Win,et al.  A Mathematical Theory of Network Interference and Its Applications , 2009, Proceedings of the IEEE.

[14]  Marco Chiani,et al.  Outage evaluation for slow frequency-hopping mobile radio systems , 1999, IEEE Trans. Commun..

[15]  Vishal Misra,et al.  Connectivity Maintenance in Mobile Wireless Networks via Constrained Mobility , 2012, IEEE J. Sel. Areas Commun..

[16]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..