On the throughput cost of physical layer security in decentralized wireless networks
-
Altmetric Citations
Ganti, Radha Krishna; Andrews, Jeffrey G.; Hjørungnes, Are; Zhou, Xiangyun
Description
This paper studies the throughput of large-scale decentralized wireless networks with physical layer security constraints. In particular, we are interested in the question of how much throughput needs to be sacrificed for achieving a certain level of security. We consider random networks where the legitimate nodes and the eavesdroppers are distributed according to independent two-dimensional Poisson point processes. The transmission capacity framework is used to characterize the area spectral...[Show more]
dc.contributor.author | Ganti, Radha Krishna | |
---|---|---|
dc.contributor.author | Andrews, Jeffrey G. | |
dc.contributor.author | Hjørungnes, Are | |
dc.contributor.author | Zhou, Xiangyun | |
dc.date.accessioned | 2015-12-13T22:43:01Z | |
dc.date.created | 2011 | |
dc.identifier.issn | 1536-1276 | |
dc.identifier.uri | http://hdl.handle.net/1885/79009 | |
dc.description.abstract | This paper studies the throughput of large-scale decentralized wireless networks with physical layer security constraints. In particular, we are interested in the question of how much throughput needs to be sacrificed for achieving a certain level of security. We consider random networks where the legitimate nodes and the eavesdroppers are distributed according to independent two-dimensional Poisson point processes. The transmission capacity framework is used to characterize the area spectral efficiency of secure transmissions with constraints on both the quality of service (QoS) and the level of security. This framework illustrates the dependence of the network throughput on key system parameters, such as the densities of legitimate nodes and eavesdroppers, as well as the QoS and security constraints. One important finding is that the throughput cost of achieving a moderate level of security is quite low, while throughput must be significantly sacrificed to realize a highly secure network. We also study the use of a secrecy guard zone, which is shown to give a significant improvement on the throughput of networks with high security requirements. | |
dc.format.mimetype | application/pdf | |
dc.language.iso | en_AU | |
dc.publisher | Institute of Electrical and Electronics Engineers (IEEE) | |
dc.source | IEEE Transactions on Wireless Communications | |
dc.subject | Keywords: decentralized wireless networks; guard zone; KeY systems; Network throughput; Physical layer security; Poisson point process; Random network; Secure networks; Secure transmission; Security constraint; Security requirements; Spectral efficiencies; Transmis decentralized wireless networks; guard zone; Physical layer security; transmission capacity | |
dc.title | On the throughput cost of physical layer security in decentralized wireless networks | |
dc.type | Journal article | |
local.description.notes | Imported from ARIES | |
local.identifier.citationvolume | 10 | |
local.identifier.absfor | 100510 - Wireless Communications | |
local.identifier.ariespublication | f5625xPUB7552 | |
local.type.status | Published Version | |
local.contributor.affiliation | Zhou, Xiangyun (Sean), College of Engineering and Computer Science, ANU | |
local.contributor.affiliation | Ganti, Radha Krishna, University of Texas | |
local.contributor.affiliation | Andrews, Jeffrey G., University of Texas | |
local.contributor.affiliation | Hjørungnes, Are, University of Oslo | |
local.description.embargo | 2037-12-31 | |
local.bibliographicCitation.issue | 8 | |
local.bibliographicCitation.startpage | 2764 | |
local.bibliographicCitation.lastpage | 2775 | |
local.identifier.doi | 10.1109/TWC.2011.061511.102257 | |
dc.date.updated | 2016-02-24T09:35:41Z | |
local.identifier.scopusID | 2-s2.0-84860402665 | |
Collections | ANU Research Publications |
Download
File | Description | Size | Format | Image |
---|---|---|---|---|
01_Zhou_On_the_throughput_cost_of_2011.pdf | 803.69 kB | Adobe PDF | Request a copy |
Items in Open Research are protected by copyright, with all rights reserved, unless otherwise indicated.
Updated: 17 November 2022/ Responsible Officer: University Librarian/ Page Contact: Library Systems & Web Coordinator