TY - JOUR
T1 - On secrecy capacity scaling in wireless networks
AU - Koyluoglu, O. Ozan
AU - Koksal, Can Emre
AU - Gamal, Hesham El
N1 - Funding Information:
Manuscript received April 10, 2010; revised May 26, 2011; accepted October 18, 2011. Date of publication January 28, 2012; date of current version April 17, 2012. This work was supported in part by the National Science Foundation under Grant CCF-07-28762, Grant 08-31919, Grant 09-16664, and Grant 10-54738, in part by Los Alamos National Laboratory and Qatar National Research Fund, and in part by the Presidential Fellowship Award of the Ohio State University. The material in this paper was presented in part at the Information Theory and Applications Workshop, La Jolla, CA, January 2010, and in part at the European Wireless Conference, Lucca, Italy, April 2010.
PY - 2012/5
Y1 - 2012/5
N2 - This paper studies the achievable secure rate per source-destination pair in wireless networks. First, a path loss model is considered, where the legitimate and eavesdropper nodes are assumed to be placed according to Poisson point processes with intensities λ and λ e , respectively. It is shown that, as long as λ eλ=o\ left(logn) -2}right) , almost all of the nodes achieve a perfectly secure rate of Ω(1radic;n}) for the extended and dense network models. Therefore, under these assumptions, securing the network does not entail a loss in the per-node throughput. The achievability argument is based on a novel multihop forwarding scheme where randomization is added in every hop to ensure maximal ambiguity at the eavesdropper(s). Second, an ergodic fading model with n source-destination pairs and n e eavesdroppers is considered. Employing the ergodic interference alignment scheme with an appropriate secrecy precoding, each user is shown to achieve a constant positive secret rate for sufficiently large n. Remarkably, the scheme does not require eavesdropper CSI (only the statistical knowledge is assumed) and the secure throughput per node increases as we add more legitimate users to the network in this setting. Finally, the effect of eavesdropper collusion on the performance of the proposed schemes is characterized.
AB - This paper studies the achievable secure rate per source-destination pair in wireless networks. First, a path loss model is considered, where the legitimate and eavesdropper nodes are assumed to be placed according to Poisson point processes with intensities λ and λ e , respectively. It is shown that, as long as λ eλ=o\ left(logn) -2}right) , almost all of the nodes achieve a perfectly secure rate of Ω(1radic;n}) for the extended and dense network models. Therefore, under these assumptions, securing the network does not entail a loss in the per-node throughput. The achievability argument is based on a novel multihop forwarding scheme where randomization is added in every hop to ensure maximal ambiguity at the eavesdropper(s). Second, an ergodic fading model with n source-destination pairs and n e eavesdroppers is considered. Employing the ergodic interference alignment scheme with an appropriate secrecy precoding, each user is shown to achieve a constant positive secret rate for sufficiently large n. Remarkably, the scheme does not require eavesdropper CSI (only the statistical knowledge is assumed) and the secure throughput per node increases as we add more legitimate users to the network in this setting. Finally, the effect of eavesdropper collusion on the performance of the proposed schemes is characterized.
KW - Capacity scaling
KW - information theoretic security
KW - network information theory
KW - secure throughput
KW - wireless networks
UR - http://www.scopus.com/inward/record.url?scp=84860255627&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84860255627&partnerID=8YFLogxK
U2 - 10.1109/TIT.2012.2184692
DO - 10.1109/TIT.2012.2184692
M3 - Article
AN - SCOPUS:84860255627
SN - 0018-9448
VL - 58
SP - 3000
EP - 3015
JO - IEEE Transactions on Information Theory
JF - IEEE Transactions on Information Theory
IS - 5
M1 - 6142080
ER -