期刊
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
卷 7, 期 1, 页码 139-147出版社
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TIFS.2011.2165947
关键词
Colluding eavesdroppers; physical-layer security; secrecy capacity; stochastic geometry; wireless networks
资金
- Portuguese Science and Technology Foundation [SFRH-BD-17388-2004]
- MIT Institute for Soldier Nanotechnologies
- Office of Naval Research [N00014-09-1-0435]
- National Science Foundation [ECS-0636519]
- Fundação para a Ciência e a Tecnologia [SFRH/BD/17388/2004] Funding Source: FCT
In Part I of this paper, we introduced the intrinsically secure communications graph (iS-graph)-a random graph which describes the connections that can be established with strong secrecy over a large-scale network, in the presence of eavesdroppers. We focused on the local connectivity of the iS-graph, and proposed techniques to improve it. In this second part, we characterize the maximum secrecy rate (MSR) that can be achieved between a node and its neighbors. We then consider the scenario where the eavesdroppers are allowed to collude, i.e., exchange and combine information. We quantify exactly how eavesdropper collusion degrades the secrecy properties of the network, in comparison to a noncolluding scenario. Our analysis helps clarify how the presence of eavesdroppers can jeopardize the success of wireless physical-layer security.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据