Eavesdropper tolerance capability study in two-hop cooperative wireless networks

This work considers the maximum number of eavesdroppers that can be tolerated (i.e., eavesdropper tolerance capability) by applying the secure and reliable transmission protocol with cooperative relays in Two-Hop wireless networks with passive and independently-operating eavesdroppers of unknown location and channel information. While previous works on this problem mainly studied either the scaling law results for infinite networks, or bounds on the maximum number of eavesdroppers in finite networks, this paper proposes an approach to determine the exact maximum number of eavesdroppers that can be present in more practical network scenarios by taking into account both the reliability and security requirements. To the best of our knowledge, this is the first work on the study of exact maximum number of eavesdroppers. Theoretical analysis and numerical results are further provided to determine the eavesdropper tolerance capability to satisfy a specified requirement in terms of secrecy outage probability and transmission outage probability, and to explore the trade-offs among eavesdropper tolerance capability and other system parameters.

[1]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[2]  Xiaohong Jiang,et al.  Secure and Reliable Transmission with Cooperative Relays in Two-Hop Wireless Networks , 2013, ITCS.

[3]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[4]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[5]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[6]  R. Negi,et al.  Secret communication using artificial noise , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..

[7]  Donald F. Towsley,et al.  Physical layer security from inter-session interference in large wireless networks , 2012, 2012 Proceedings IEEE INFOCOM.

[8]  L. Mattner,et al.  Stochastic ordering of classical discrete distributions , 2009, Advances in Applied Probability.

[9]  Donald F. Towsley,et al.  Security-capacity trade-off in large wireless networks using keyless secrecy , 2010, MobiHoc '10.

[10]  Can Emre Koksal,et al.  On Secrecy Capacity Scaling in Wireless Networks , 2012, IEEE Trans. Inf. Theory.

[11]  Aylin Yener,et al.  Two-Hop Secure Communication Using an Untrusted Relay: A Case for Cooperative Jamming , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[12]  R. Negi,et al.  Secret communication in presence of colluding eavesdroppers , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.

[13]  Kin K. Leung,et al.  Artificial Noise Generation from Cooperative Relays for Everlasting Secrecy in Two-Hop Wireless Networks , 2011, IEEE Journal on Selected Areas in Communications.