Multi-user diversity for secrecy in wireless networks

The ability to transmit a message securely in the presence of eavesdroppers in a dense wireless network is considered. As with a number of recent schemes, system nodes other than the transmitter and receiver are chosen to generate noise that confuses the eavesdropper. By exploiting the dynamics of the fading, significantly improved performance is achieved beyond that generated from the standard multi-user diversity gain expected from opportunistic relaying. In particular, the node with the best fading characteristics takes responsibility for message relaying, while those whose fading will significantly reduce their impact on the desired communication play the role of noise generators. For a source transmitting to a destination using a set of intermediate relays, we consider the number of eavesdroppers that can be present without the interception of packets, in both the case where the eavesdroppers operate independently and in the case where they collude. The latter case also encompasses the more likely scenario of a single eavesdropper with a sophisticated receiver.

[1]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[2]  David Tse,et al.  Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels , 2007, IEEE Transactions on Information Forensics and Security.

[3]  Andrea J. Goldsmith,et al.  Large wireless networks under fading, mobility, and delay constraints , 2004, IEEE INFOCOM 2004.

[4]  Aylin Yener,et al.  Two-Hop Secure Communication Using an Untrusted Relay: A Case for Cooperative Jamming , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[5]  Russ Bubley,et al.  Randomized algorithms , 1995, CSUR.

[6]  Hossein Pishro-Nik,et al.  Dense Parity Check Based Secrecy Sharing in Wireless Communications , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[7]  Hesham El Gamal,et al.  Cooperative Secrecy: The Relay-Eavesdropper Channel , 2007, 2007 IEEE International Symposium on Information Theory.

[8]  J. Corcoran Modelling Extremal Events for Insurance and Finance , 2002 .

[9]  C. Klüppelberg,et al.  Modelling Extremal Events , 1997 .

[10]  R. Negi,et al.  Secret communication using artificial noise , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..