9,275 research outputs found
Wireless Secrecy in Large-Scale Networks
The ability to exchange secret information is critical to many commercial,
governmental, and military networks. The intrinsically secure communications
graph (iS-graph) is a random graph which describes the connections that can be
securely established over a large-scale network, by exploiting the physical
properties of the wireless medium. This paper provides an overview of the main
properties of this new class of random graphs. We first analyze the local
properties of the iS-graph, namely the degree distributions and their
dependence on fading, target secrecy rate, and eavesdropper collusion. To
mitigate the effect of the eavesdroppers, we propose two techniques that
improve secure connectivity. Then, we analyze the global properties of the
iS-graph, namely percolation on the infinite plane, and full connectivity on a
finite region. These results help clarify how the presence of eavesdroppers can
compromise secure communication in a large-scale network.Comment: To appear: Proc. IEEE Information Theory and Applications Workshop
(ITA'11), San Diego, CA, Feb. 2011, pp. 1-10, Invited Pape
Secure Communications in Millimeter Wave Ad Hoc Networks
Wireless networks with directional antennas, like millimeter wave (mmWave)
networks, have enhanced security. For a large-scale mmWave ad hoc network in
which eavesdroppers are randomly located, however, eavesdroppers can still
intercept the confidential messages, since they may reside in the signal beam.
This paper explores the potential of physical layer security in mmWave ad hoc
networks. Specifically, we characterize the impact of mmWave channel
characteristics, random blockages, and antenna gains on the secrecy
performance. For the special case of uniform linear array (ULA), a tractable
approach is proposed to evaluate the average achievable secrecy rate. We also
characterize the impact of artificial noise in such networks. Our results
reveal that in the low transmit powerregime, the use of low mmWave frequency
achieves better secrecy performance, and when increasing transmit power, a
transition from low mmWave frequency to high mmWave frequency is demanded for
obtaining a higher secrecy rate. More antennas at the transmitting nodes are
needed to decrease the antenna gain obtained by the eavesdroppers when using
ULA. Eavesdroppers can intercept more information by using a wide beam pattern.
Furthermore, the use of artificial noise may be ineffective for enhancing the
secrecy rate.Comment: Accepted by IEEE Transactions on Wireless Communication
Generalized Interference Alignment --- Part I: Theoretical Framework
Interference alignment (IA) has attracted enormous research interest as it
achieves optimal capacity scaling with respect to signal to noise ratio on
interference networks. IA has also recently emerged as an effective tool in
engineering interference for secrecy protection on wireless wiretap networks.
However, despite the numerous works dedicated to IA, two of its fundamental
issues, i.e., feasibility conditions and transceiver design, are not completely
addressed in the literature. In this two part paper, a generalised interference
alignment (GIA) technique is proposed to enhance the IA's capability in secrecy
protection. A theoretical framework is established to analyze the two
fundamental issues of GIA in Part I and then the performance of GIA in
large-scale stochastic networks is characterized to illustrate how GIA benefits
secrecy protection in Part II. The theoretical framework for GIA adopts
methodologies from algebraic geometry, determines the necessary and sufficient
feasibility conditions of GIA, and generates a set of algorithms that can solve
the GIA problem. This framework sets up a foundation for the development and
implementation of GIA.Comment: Minor Revision at IEEE Transactions on Signal Processin
Physical Layer Security in Large-Scale Millimeter Wave Ad Hoc Networks
Wireless networks with directional antennas, like millimeter wave (mmWave) networks, have enhanced security. For a large scale mmWave ad hoc network in which eavesdroppers are randomly located, however, eavesdroppers can still intercept the confidential messages, since they may reside in the signal beam. This paper explores the potential of physical layer security in the mmWave ad hoc networks. Specifically, we characterize the impact of mmWave channel characteristics and large antenna arrays on the secrecy performance. We also characterize the impact of artificial noise in this networks. Our results reveal that in the low transmit power regime, the use of low mmWave frequency achieves better secrecy performance, when increasing transmit power, a transition from low mmWave frequency to high mmWave frequency is demanded for obtaining more secrecy rate. Eavesdroppers can intercept more information by using wide beam pattern. Furthermore, the use of artificial noise may be unable to enhance the secrecy rate for the case of low node density
Generalized Interference Alignment—Part II: Application to Wireless Secrecy
In contrast to its wired counterpart, wireless communication is highly susceptible to eavesdropping due to the broadcast nature of the wireless propagation medium. Recent works have proposed the use of interference to reduce eavesdropping capabilities in wireless wiretap networks. However, the concurrent effect of interference on both eavesdropping receivers (ERs) and legitimate receivers has not been thoroughly investigated, and careful engineering of the network interference is required to harness the full potential of interference for wireless secrecy. This two-part article addresses this issue by proposing a generalized interference alignment (GIA) technique, which jointly designs the transceivers at the legitimate partners to impede the ERs without interfering with LRs. In Part I, we have established a theoretical framework for the GIA technique. In Part II, we will first propose an efficient GIA algorithm that is applicable to large-scale networks and then evaluate the performance of this algorithm in stochastic wireless wiretap network via both analysis and simulation. These results reveal insights into when and how GIA contributes to wireless secrecy
Secure Communications in Millimeter Wave Ad Hoc Networks
Wireless networks with directional antennas, like
millimeter wave (mmWave) networks, have enhanced security.
For a large-scale mmWave ad hoc network in which eavesdroppers are randomly located, however, eavesdroppers can still intercept the confidential messages, since they may reside in the signal beam. This paper explores the potential of physical layer security in mmWave ad hoc networks. Specifically, we characterize the impact of mmWave channel characteristics, random blockages, and antenna gains on the secrecy performance. For the special case of uniform linear array (ULA), a tractable approach is proposed to evaluate the average achievable secrecy rate. We also characterize the impact of artificial noise in such networks. Our results reveal that in the low transmit power regime, the use of low mmWave frequency achieves better secrecy performance, and when increasing transmit power, a transition from low mmWave frequency to high mmWave frequency is demanded for obtaining a higher secrecy rate. More antennas at the transmitting nodes are needed to decrease the antenna gain obtained by the eavesdroppers when using ULA. Eavesdroppers can intercept more information by using a wide beam pattern. Furthermore, the use of artificial noise may be ineffective forenhancing the secrecy rate
- …