Asymptotic Analysis on Secrecy Capacity in Large-Scale .ppt
《Asymptotic Analysis on Secrecy Capacity in Large-Scale .ppt》由会员分享,可在线阅读,更多相关《Asymptotic Analysis on Secrecy Capacity in Large-Scale .ppt(34页珍藏版)》请在麦多课文档分享上搜索。
1、Asymptotic Analysis on Secrecy Capacity in Large-Scale Wireless Networks,Jinbei Zhang, Luoyifu, Xinbing Wang Department of Electronic Engineering Shanghai Jiao Tong University Aug. 13, 2013,Asymptotic Analysis on Secrecy Capacity in Large-Scale Wireless Networks,2,Outline,Introduction Motivations Re
2、lated works Objectives Network Model and Definition Secrecy Capacity for Independent Eavesdroppers Secrecy Capacity for Colluding Eavesdroppers Discussion Conclusion and Future Work,3,Motivations,Secrecy is a Major Concern in Wireless Networks. Mobile Phone Wallet Military networks ,Asymptotic Analy
3、sis on Secrecy Capacity in Large-Scale Wireless Networks,4,Related works I/II,Properties of Secrecy Graph,4 M. Haenggi, “The Secrecy Graph and Some of Its Properties”, in Proc. IEEE ISIT, Toronto, Canada, July 2008. 5 P. C. Pinto, J. Barros, M. Z. Win, “Wireless Secrecy in Large-Scale Networks.” in
4、Proc. IEEE ITA11, California, USA, Feb. 2011.,Cited From 5,Cited From 5,Asymptotic Analysis on Secrecy Capacity in Large-Scale Wireless Networks,5,Related works II/II,Secrecy Capacity in large-scale networks, Mobile Networks 16 Guard Zone 13 Artificial Noise+Fading Gain(CSI needed) 12,16 Y. Liang, H
5、. V. Poor and L. Ying, “Secrecy Throughput of MANETs under Passive and Active Attacks”, in IEEE Trans. Inform. Theory, Vol. 57, No. 10, Oct. 2011. 13 O. Koyluoglu, E. Koksal, E. Gammel, “On Secrecy Capacity Scaling in Wireless Networks”, submitted to IEEE Trans. Inform. Theory, Apr. 2010. 12 S. Vasu
6、devan, D. Goeckel and D. Towsley, “Security-capacity Trade-off in Large Wireless Networks using Keyless Secrecy”, in Proc. ACM MobiHoc, Chicago, Illinois, USA, Sept. 2010.,Cited from 12,Asymptotic Analysis on Secrecy Capacity in Large-Scale Wireless Networks,6,Objectives,Several questions arise: CSI
7、 information is difficult to obtainArtificial noises also degrade legitimate receivers channelsCost on capacity is quite large to utilize fading gain How to effectively improve the secrecy capacity?,Asymptotic Analysis on Secrecy Capacity in Large-Scale Wireless Networks,7,Outline,Introduction Netwo
8、rk Model and Definition Secrecy Capacity for Independent Eavesdroppers Secrecy Capacity for Colluding Eavesdroppers Discussion Conclusion and Future Work,Asymptotic Analysis on Secrecy Capacity in Large-Scale Wireless Networks,8,Network Model and Definition I/II,Legitimate Nodes: Self-interference c
9、ancelation16 adopted 3 antennas per-node CSI information unknown Eavesdroppers: Location positions unknown CSI information unknown,Cited from 17,17 J. I. Choiy, M. Jainy, K. Srinivasany, P. Levis and S. Katti, “Achieving Single Channel, Full Duplex Wireless Communication”, in ACM Mobicom10, Chicago,
10、 USA, Sept. 2010.,Asymptotic Analysis on Secrecy Capacity in Large-Scale Wireless Networks,9,Network Model and Definition II/II,Network Model: Extended networks: n nodes randomly distributed in a network with size n. Static Physical channel model,where,Definition of secrecy capacity,where,Asymptotic
11、 Analysis on Secrecy Capacity in Large-Scale Wireless Networks,10,Outline,Introduction Network Model and Definition Secrecy Capacity for Independent Eavesdroppers Lower Bound Upper Bound Secrecy Capacity for Colluding Eavesdroppers Discussion Conclusion and Future Work,Asymptotic Analysis on Secrecy
12、 Capacity in Large-Scale Wireless Networks,11,Independent Eavesdroppers,Capacity for Eavesdroppers,Lemma 1: When a legitimate node t is transmitting to a legitimate receiver r, the maximum rate that an independent eavesdropper e can obtain is upper-bounded by,where is the Euclidean distance between
13、legitimate node t and node r and is the distance between legitimate node t and eavesdropper e.,Received Power,Asymptotic Analysis on Secrecy Capacity in Large-Scale Wireless Networks,12,Independent Eavesdroppers,Case 1: when and both greater 1,Case 2-4:,Asymptotic Analysis on Secrecy Capacity in Lar
14、ge-Scale Wireless Networks,13,Independent Eavesdroppers,Capacity for Legitimate Nodes,Lemma 2: When a legitimate node t is transmitting to a legitimate receiver which is located d cells apart, the minimum rate that the legitimate node can receive is lower-bounded by , where is a constant.,when choos
15、ing and is a constant.,Asymptotic Analysis on Secrecy Capacity in Large-Scale Wireless Networks,14,Independent Eavesdroppers,Secrecy Capacity for Each Cell,Choose,Theorem 1: For any legitimate transmitter-receiver pair which is spaced at a distance of d cells apart, there exists an , so that the rec
16、eiver can receive at a rate of securely from the transmitter.,Asymptotic Analysis on Secrecy Capacity in Large-Scale Wireless Networks,15,Independent Eavesdroppers,Highway System Draining Phase Highway Phase Delivery Phase,Theorem 2: With n legitimate nodes poisson distributed, the achievable per-no
17、de secrecy throughput under the existence of independent eavesdroppers is .,Asymptotic Analysis on Secrecy Capacity in Large-Scale Wireless Networks,16,Independent Eavesdroppers,Optimality of Our Scheme,18 P. Gupta and P. Kumar, “The Capacity of Wireless Networks”, in IEEE Trans. Inform. Theory, Vol
18、. 46, No. 2, pp. 388-404, Mar. 2000.,Theorem 2: When n nodes is identically and randomly located in a wireless network and source-destination pairs are randomly chosen, the per-node throughput (n) is upper bounded by .,Asymptotic Analysis on Secrecy Capacity in Large-Scale Wireless Networks,17,Outli
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
2000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ASYMPTOTICANALYSISONSECRECYCAPACITYINLARGESCALEPPT

链接地址:http://www.mydoc123.com/p-378673.html