Secrecy capacity scaling of large-scale cognitive networks

Increasingly, more spectrum bands are utilized for unlicensed use in wireless cognitive networks. It is important to study how information-theoretic secrecy capacity is affected in large-scale cognitive networks. We consider two scenarios: (1) non-colluding case, where eavesdroppers decode messages individually. In this case, we propose a new secure protocol model to analyze the transmission opportunities of secondary nodes. We show that the secrecy capacity of the primary network is not affected, while the secondary network can achieve the same performance as a standalone network in the order sense. Since our analysis is general as we only make a few relaxed assumptions on both networks, the conclusions hold when both networks are classic static networks, networks with i.i.d mobility, multicast networks etc. (2) colluding case where eavesdroppers can collude to decode a message. In that case, we show that the lower bound of per-node secrecy capacity of the primary network is Ω(1/√n φe-2/α-1(n)) when the eavesdropper density is φe(n)=Ω(log2n). Interestingly the existence of secondary nodes increases the secrecy capacity of the primary network.

[1]  Shaojie Tang,et al.  Multicast Capacity of Wireless Ad Hoc Networks Under Gaussian Channel Model , 2010, IEEE/ACM Transactions on Networking.

[2]  David Tse,et al.  Mobility increases the capacity of ad-hoc wireless networks , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).

[3]  Xinbing Wang,et al.  Throughput and delay scaling of general cognitive networks , 2011, 2011 Proceedings IEEE INFOCOM.

[4]  Panganamala Ramana Kumar,et al.  RHEINISCH-WESTFÄLISCHE TECHNISCHE HOCHSCHULE AACHEN , 2001 .

[5]  Can Emre Koksal,et al.  On Secrecy Capacity Scaling in Wireless Networks , 2012, IEEE Trans. Inf. Theory.

[6]  Massimo Franceschetti,et al.  Closing the Gap in the Capacity of Wireless Networks Via Percolation Theory , 2007, IEEE Transactions on Information Theory.

[7]  Shuguang Cui,et al.  Scaling Laws for Overlaid Wireless Networks: A Cognitive Radio Network vs. a Primary Network , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[8]  Michele Garetto,et al.  Restricted Mobility Improves Delay-Throughput Tradeoffs in Mobile Ad Hoc Networks , 2008, IEEE Transactions on Information Theory.

[9]  Xiang-Yang Li Multicast capacity of wireless ad hoc networks , 2009, TNET.

[10]  Ayfer Özgür,et al.  Hierarchical Cooperation Achieves Optimal Capacity Scaling in Ad Hoc Networks , 2006, IEEE Transactions on Information Theory.

[11]  Michele Garetto,et al.  Capacity scaling of wireless networks with inhomogeneous node density: upper bounds , 2009, IEEE Journal on Selected Areas in Communications.

[12]  Ness B. Shroff,et al.  Delay and Capacity Trade-Offs in Mobile Ad Hoc Networks: A Global Perspective , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[13]  Shmuel Friedland,et al.  Spectrum Management in Multiuser Cognitive Wireless Networks: Optimality and Algorithm , 2011, IEEE Journal on Selected Areas in Communications.

[14]  Eytan Modiano,et al.  Capacity and delay tradeoffs for ad hoc mobile networks , 2005, IEEE Trans. Inf. Theory.

[15]  Sae-Young Chung,et al.  Cognitive networks achieve throughput scaling of a homogeneous network , 2009, WiOpt.

[16]  Xinbing Wang,et al.  Asymptotic Analysis on Secrecy Capacity in Large-Scale Wireless Networks , 2014, IEEE/ACM Transactions on Networking.

[17]  Donald F. Towsley,et al.  Secret communication in large wireless networks without eavesdropper location information , 2012, 2012 Proceedings IEEE INFOCOM.

[18]  Xinbing Wang,et al.  Speed Improves Delay-Capacity Trade-Off in MotionCast , 2011, IEEE Transactions on Parallel and Distributed Systems.

[19]  Mathew D. Penrose,et al.  Random Geometric Graphs , 2003 .

[20]  Donald F. Towsley,et al.  Security-capacity trade-off in large wireless networks using keyless secrecy , 2010, MobiHoc '10.