Secrecy Capacity Scaling of Large- Scale Cognitive Networks Yitao Chen 1 , Jinbei Zhang 1 , Xinbing Wang 1 , Xiaohua Tian 1 , Weijie Wu 1 , Fan Fu 2 , Chee Wei Tan 3 1 Dept. of Electronic Engineering, Shanghai Jiao Tong University 2 Dept. of Computer Science and Engineering, Shanghai Jiao Tong University 3 Dept. of Computer Science, City University of Hong Kong
23
Embed
Secrecy Capacity Scaling of Large-Scale Cognitive Networks
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Secrecy Capacity Scaling of Large-Scale Cognitive Networks
Yitao Chen1, Jinbei Zhang1, Xinbing Wang1,
Xiaohua Tian1, Weijie Wu1, Fan Fu2, Chee Wei Tan3
1 Dept. of Electronic Engineering, Shanghai Jiao Tong University
2 Dept. of Computer Science and Engineering, Shanghai Jiao Tong University
3 Dept. of Computer Science, City University of Hong Kong
2
Outline Introduction
Network Model and Definition
Independent Eavesdroppers
Colluding Eavesdroppers
Conclusion
Motivations Security is a major concern in wireless networks
3
Mobile Payment Virtual Property
Privacy Military Communication
4
Motivations
Physical Layer Security Assume eavesdroppers
have infinite computation power
Require the intended receiver should have a stronger channel than eavesdroppers
Provable security capacity
Cryptographic methods Key distribution
Rapid growth of computation power
Improvement on
decoding technology
log(1 ) log(1 )eC SNR SNR
5
Related works
Secrecy capacity in large-scale networks Guard zone [9] Artificial noise + Fading gain (CSI needed) [8] Using artificial noise generated by receivers to suppress
eavesdroppers’ channel quality [11]
[9] O. Koyluoglu, E. Koksal, E. Gammel, “On Secrecy Capacity Scaling in Wireless Networks”, IEEE Trans. Inform. Theory, May 2012.
[8] S. Vasudevan, D. Goeckel and D. Towsley, “Security-capacity Trade-off in Large Wireless Networks using Keyless Secrecy,” in Proc. ACM MobiHoc, Chicago, Illinois, USA, Sept. 2010.
[11] J. Zhang, L. Fu, X. Wang, “Asymptotic analysis on secrecy capacity in large-scale wireless networks,” in IEEE/ACM Trans. Netw., Feb. 2014.
Cited from [8]
6
Motivations
Limited spectrum resources and CR networks
Key questions:
What is the impact of security in cognitive networks?
[17] J. I. Choiy, M. Jainy, K. Srinivasany, P. Levis and S. Katti, “Achieving Single Channel, Full Duplex Wireless Communication”, in ACM Mobicom’10, Chicago, USA, Sept. 2010.
9
Network Model and Definition – II/III
Random permutation traffic, no cross network traffic Communication Model
Physical Model: Primary user i transmits to primary user j
Define the physical model for secondary users and eavesdroppers similarly.
Interference from other primary TXs Interference from other primary RXs
Interference from secondary TXs Interference from secondary TXs
10
Network Model and Definition – III/III
Definition of Per Hop Secrecy Throughput: Independent eavesdropper
Colluding eavesdroppers
Definition of Asymptotic Capacity
Similarly, we can define the asymptotic per-node capacity for the secondary network
, if
11
Outline Introduction
Network Model and Definition
Independent Eavesdroppers
Colluding Eavesdroppers
Conclusion
12
Independent Eavesdroppers
Physical Feasibility of Security Primary Networks and Secondary Networks and Operation Rules: