On secrecy capacity scaling in wireless networks

O. Ozan Koyluoglu, Can Emre Koksal, Hesham El Gamal

Research output: Contribution to journalArticlepeer-review

154 Scopus citations

Abstract

This paper studies the achievable secure rate per source-destination pair in wireless networks. First, a path loss model is considered, where the legitimate and eavesdropper nodes are assumed to be placed according to Poisson point processes with intensities λ and λ e , respectively. It is shown that, as long as λ eλ=o\ left(logn) -2}right) , almost all of the nodes achieve a perfectly secure rate of Ω(1radic;n}) for the extended and dense network models. Therefore, under these assumptions, securing the network does not entail a loss in the per-node throughput. The achievability argument is based on a novel multihop forwarding scheme where randomization is added in every hop to ensure maximal ambiguity at the eavesdropper(s). Second, an ergodic fading model with n source-destination pairs and n e eavesdroppers is considered. Employing the ergodic interference alignment scheme with an appropriate secrecy precoding, each user is shown to achieve a constant positive secret rate for sufficiently large n. Remarkably, the scheme does not require eavesdropper CSI (only the statistical knowledge is assumed) and the secure throughput per node increases as we add more legitimate users to the network in this setting. Finally, the effect of eavesdropper collusion on the performance of the proposed schemes is characterized.

Original languageEnglish (US)
Article number6142080
Pages (from-to)3000-3015
Number of pages16
JournalIEEE Transactions on Information Theory
Volume58
Issue number5
DOIs
StatePublished - May 2012
Externally publishedYes

Keywords

  • Capacity scaling
  • information theoretic security
  • network information theory
  • secure throughput
  • wireless networks

ASJC Scopus subject areas

  • Information Systems
  • Computer Science Applications
  • Library and Information Sciences

Fingerprint

Dive into the research topics of 'On secrecy capacity scaling in wireless networks'. Together they form a unique fingerprint.

Cite this