Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1860093.1860097acmconferencesArticle/Chapter ViewAbstractPublication PagesmobihocConference Proceedingsconference-collections
research-article

Security-capacity trade-off in large wireless networks using keyless secrecy

Published: 20 September 2010 Publication History

Abstract

We investigate the scalability of a class of algorithms that exploit the dynamics of wireless fading channels to achieve secret communication in a large wireless network of n randomly located nodes. We describe a construction in which nodes transmit artificial noise to suppress eavesdroppers whose locations are unknown and ensure secrecy of messages transported across the network. Under a model in which eavesdroppers operate independently and under appropriate conditions on the achievable per-node throughput Ψ(n), we show that the network can tolerate Ω((1⁄√n(n))2c) eavesdroppers while ensuring that the aggregate rate at which eavesdroppers intercept packets goes to 0, where c is a constant such that 0 < c < 1. The result clearly establishes a trade-off between the achievable throughput and the allowable number of eavesdroppers. Under a collaborating eavesdropper model and a similar constraint on the eavesdropper throughput, we show that the network can tolerate a single eavesdropper with Ω((ln 1⁄√n(n))1ε) antennas, ∀ε > 0. We also establish sufficient conditions on the number of eavesdroppers to achieve a non-zero throughput in our construction.

References

[1]
}}V. Brik, S. Banerjee, M. Gruteser, and S. Oh. Wireless device identification with radiometric signatures. In ACM MOBICOM, pages 116--127, 2008.
[2]
}}P. Embrechts, C. Kluppelberg, and T. Mikosch. Modelling extremal events for insurance and finance. Springer-Verlag, 1997.
[3]
}}M. Franceschetti, O. Dousse, D. N. C. Tse, and P. Thiran. Closing the gap in the capacity of wireless networks via percolation theory. IEEE Transactions on Information Theory, 53:1009--1018, 2007.
[4]
}}S. Goel and R. Negi. Guaranteeing secrecy using artificial noise. IEEE Transactions on Wireless Communications, 7(6):2180--2189, 2008.
[5]
}}P. Gupta and P. Kumar. The capacity of wireless networks. IEEE Transactions on Information Theory, 46(2):388--404, 2000.
[6]
}}M. Haenggi. The secrecy graph and some of its properties. In IEEE ISIT, 2008.
[7]
}}J. Hershey, A. Hassan, and R. Yarlagadda. Unconventional cryptographic keying variable management. IEEE Transactions on Communications, 43(1):3--6, 1995.
[8]
}}O. Koyluoglu, C. E. Koksal, and H. E. Gamal. On secrecy capacity scaling in wireless networks. Under submission, (eprint arXiv:0908.0898), 2009.
[9]
}}Y. Liang, H. Poor, and L. Ying. Secrecy throughput of manets with malicious nodes. In International Symposium on Information Theory, 2009.
[10]
}}M. Mitzenmacher and E. Upfal. Probability and Computing: Randomized Algorithms and Probabilistic Analysis. Cambridge University Press, 2005.
[11]
}}Y. Nebat. A lower bound for the achievable throughput in large wireless networks under fixed multipath fading. In IEEE SpaSWiN, 2006.
[12]
}}E. Perron, S. N. Diggavi, and E. Telatar. On cooperative wireless network secrecy. In IEEE INFOCOM, 2009.
[13]
}}S. Toumpis. Capacity and Cross-Layer Design of Wireless Ad Hoc Networks. PhD thesis, Stanford University, 2003.
[14]
}}D. Tse and P. Viswanath. Fundamentals of Wireless Communication. Cambridge University Press, 2005.
[15]
}}S. Vasudevan, S. Adams, D. Goeckel, Z. Ding, D. Towsley, and K. Leung. Multi-user diversity for secrecy in wireless networks. In Information Theory and Applications Workshop, 2009.
[16]
}}S. Vasudevan, D. Goeckel, and D. Towsley. Security-capacity trade-off in large wireless networks using keyless secrecy. Technical Report UM-CS-2010-042, UMass Computer Science, 2010.
[17]
}}A. D. Wyner. The wire-tap channel. Bell Syst. Tech. Journal, 54:1355--1387, 1975.
[18]
}}S. Xiao, H. Pishro-Nik, and W. Gong. Dense parity check based secrecy sharing in wireless communications. In IEEE GLOBECOM, 2007.

Cited By

View all
  • (2024)Barrier Penetration Routing Against Wireless Spy SensorsIEEE Transactions on Mobile Computing10.1109/TMC.2023.3294415(1-14)Online publication date: 2024
  • (2021)Mobility-Assisted Covert Communication Over Wireless Ad Hoc NetworksIEEE Transactions on Information Forensics and Security10.1109/TIFS.2020.304513216(1768-1781)Online publication date: 2021
  • (2021)Achievable secrecy rate analysis in mmWave ad hoc networks with multi‐array antenna transmission and artificial noiseIET Communications10.1049/cmu2.1224115:16(2068-2086)Online publication date: 12-Jun-2021
  • Show More Cited By

Index Terms

  1. Security-capacity trade-off in large wireless networks using keyless secrecy

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      MobiHoc '10: Proceedings of the eleventh ACM international symposium on Mobile ad hoc networking and computing
      September 2010
      272 pages
      ISBN:9781450301831
      DOI:10.1145/1860093
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 20 September 2010

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. ad hoc networks
      2. keyless secrecy
      3. multi-user diversity
      4. wireless capacity
      5. wireless networks

      Qualifiers

      • Research-article

      Conference

      MobiCom/MobiHoc '10
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 296 of 1,843 submissions, 16%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)4
      • Downloads (Last 6 weeks)1
      Reflects downloads up to 27 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Barrier Penetration Routing Against Wireless Spy SensorsIEEE Transactions on Mobile Computing10.1109/TMC.2023.3294415(1-14)Online publication date: 2024
      • (2021)Mobility-Assisted Covert Communication Over Wireless Ad Hoc NetworksIEEE Transactions on Information Forensics and Security10.1109/TIFS.2020.304513216(1768-1781)Online publication date: 2021
      • (2021)Achievable secrecy rate analysis in mmWave ad hoc networks with multi‐array antenna transmission and artificial noiseIET Communications10.1049/cmu2.1224115:16(2068-2086)Online publication date: 12-Jun-2021
      • (2019)Secure Data Communications in Wireless Networks Using Multi-Path Avoidance RoutingIEEE Transactions on Wireless Communications10.1109/TWC.2019.292880118:10(4753-4767)Online publication date: Oct-2019
      • (2019)Delay Performance of a Two-User Broadcast Channel with Security ConstraintsSN Computer Science10.1007/s42979-019-0055-31:1Online publication date: 21-Dec-2019
      • (2018)Covert Wireless Communication With Artificial Noise GenerationIEEE Transactions on Wireless Communications10.1109/TWC.2018.286594617:11(7252-7267)Online publication date: Nov-2018
      • (2018)On Secure Wireless Communications for Service Oriented ComputingIEEE Transactions on Services Computing10.1109/TSC.2015.247845311:2(318-328)Online publication date: 1-Mar-2018
      • (2018)How to Reduce Unexpected eMBMS Session Disconnection: Design and Performance AnalysisIEEE Wireless Communications Letters10.1109/LWC.2017.27591137:1(126-129)Online publication date: Mar-2018
      • (2017)Safeguarding Decentralized Wireless Networks Using Full-Duplex Jamming ReceiversIEEE Transactions on Wireless Communications10.1109/TWC.2016.262268916:1(278-292)Online publication date: 1-Jan-2017
      • (2017)Secrecy Capacity Scaling in Large Cooperative Wireless NetworksIEEE Transactions on Information Theory10.1109/TIT.2016.264522763:3(1923-1939)Online publication date: 1-Mar-2017
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media