Skip navigation
Skip navigation

On the throughput cost of physical layer security in decentralized wireless networks

Ganti, Radha Krishna; Andrews, Jeffrey G.; Hjørungnes, Are; Zhou, Xiangyun

Description

This paper studies the throughput of large-scale decentralized wireless networks with physical layer security constraints. In particular, we are interested in the question of how much throughput needs to be sacrificed for achieving a certain level of security. We consider random networks where the legitimate nodes and the eavesdroppers are distributed according to independent two-dimensional Poisson point processes. The transmission capacity framework is used to characterize the area spectral...[Show more]

dc.contributor.authorGanti, Radha Krishna
dc.contributor.authorAndrews, Jeffrey G.
dc.contributor.authorHjørungnes, Are
dc.contributor.authorZhou, Xiangyun
dc.date.accessioned2015-12-13T22:43:01Z
dc.date.created2011
dc.identifier.issn1536-1276
dc.identifier.urihttp://hdl.handle.net/1885/79009
dc.description.abstractThis paper studies the throughput of large-scale decentralized wireless networks with physical layer security constraints. In particular, we are interested in the question of how much throughput needs to be sacrificed for achieving a certain level of security. We consider random networks where the legitimate nodes and the eavesdroppers are distributed according to independent two-dimensional Poisson point processes. The transmission capacity framework is used to characterize the area spectral efficiency of secure transmissions with constraints on both the quality of service (QoS) and the level of security. This framework illustrates the dependence of the network throughput on key system parameters, such as the densities of legitimate nodes and eavesdroppers, as well as the QoS and security constraints. One important finding is that the throughput cost of achieving a moderate level of security is quite low, while throughput must be significantly sacrificed to realize a highly secure network. We also study the use of a secrecy guard zone, which is shown to give a significant improvement on the throughput of networks with high security requirements.
dc.format.mimetypeapplication/pdf
dc.language.isoen_AU
dc.publisherInstitute of Electrical and Electronics Engineers (IEEE)
dc.sourceIEEE Transactions on Wireless Communications
dc.subjectKeywords: decentralized wireless networks; guard zone; KeY systems; Network throughput; Physical layer security; Poisson point process; Random network; Secure networks; Secure transmission; Security constraint; Security requirements; Spectral efficiencies; Transmis decentralized wireless networks; guard zone; Physical layer security; transmission capacity
dc.titleOn the throughput cost of physical layer security in decentralized wireless networks
dc.typeJournal article
local.description.notesImported from ARIES
local.identifier.citationvolume10
local.identifier.absfor100510 - Wireless Communications
local.identifier.ariespublicationf5625xPUB7552
local.type.statusPublished Version
local.contributor.affiliationZhou, Xiangyun (Sean), College of Engineering and Computer Science, ANU
local.contributor.affiliationGanti, Radha Krishna, University of Texas
local.contributor.affiliationAndrews, Jeffrey G., University of Texas
local.contributor.affiliationHjørungnes, Are, University of Oslo
local.description.embargo2037-12-31
local.bibliographicCitation.issue8
local.bibliographicCitation.startpage2764
local.bibliographicCitation.lastpage2775
local.identifier.doi10.1109/TWC.2011.061511.102257
dc.date.updated2016-02-24T09:35:41Z
local.identifier.scopusID2-s2.0-84860402665
CollectionsANU Research Publications

Download

File Description SizeFormat Image
01_Zhou_On_the_throughput_cost_of_2011.pdf803.69 kBAdobe PDF    Request a copy


Items in Open Research are protected by copyright, with all rights reserved, unless otherwise indicated.

Updated:  17 November 2022/ Responsible Officer:  University Librarian/ Page Contact:  Library Systems & Web Coordinator