Satyanarayana Vuppala, S. Chatzinotas, B. Ottersten
{"title":"多窃听器随机无线网络的保密性分析","authors":"Satyanarayana Vuppala, S. Chatzinotas, B. Ottersten","doi":"10.1109/PIMRC.2017.8292513","DOIUrl":null,"url":null,"abstract":"In this paper, we investigate the secrecy outage probability of random wireless networks from the perspective of the k-th best source, which has still not been well characterized. We consider the artificial noise (AN) transmission strategy at source nodes to confuse the eavesdropper. Furthermore, we use a concept of security-region based on the k-th best source index. This is pragmatic in creating a protected communication zone for the typical destination and also in bounding the number of sources that can cooperate in a Coordinated Multi-point transmission (CoMP) network. We further derive the secrecy outage probability for these CoMP sources based on the security-region. We also provide a closed-form expression for the maximum number of eavesdroppers for a given secrecy outage constraint, which can effect the secure communication. Tractable numerical results are presented under various assumptions of densities, antenna gains, AN transmission factors and path loss exponents.","PeriodicalId":397107,"journal":{"name":"2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Secrecy analysis of random wireless networks with multiple eavesdroppers\",\"authors\":\"Satyanarayana Vuppala, S. Chatzinotas, B. Ottersten\",\"doi\":\"10.1109/PIMRC.2017.8292513\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we investigate the secrecy outage probability of random wireless networks from the perspective of the k-th best source, which has still not been well characterized. We consider the artificial noise (AN) transmission strategy at source nodes to confuse the eavesdropper. Furthermore, we use a concept of security-region based on the k-th best source index. This is pragmatic in creating a protected communication zone for the typical destination and also in bounding the number of sources that can cooperate in a Coordinated Multi-point transmission (CoMP) network. We further derive the secrecy outage probability for these CoMP sources based on the security-region. We also provide a closed-form expression for the maximum number of eavesdroppers for a given secrecy outage constraint, which can effect the secure communication. Tractable numerical results are presented under various assumptions of densities, antenna gains, AN transmission factors and path loss exponents.\",\"PeriodicalId\":397107,\"journal\":{\"name\":\"2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)\",\"volume\":\"32 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-10-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/PIMRC.2017.8292513\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PIMRC.2017.8292513","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Secrecy analysis of random wireless networks with multiple eavesdroppers
In this paper, we investigate the secrecy outage probability of random wireless networks from the perspective of the k-th best source, which has still not been well characterized. We consider the artificial noise (AN) transmission strategy at source nodes to confuse the eavesdropper. Furthermore, we use a concept of security-region based on the k-th best source index. This is pragmatic in creating a protected communication zone for the typical destination and also in bounding the number of sources that can cooperate in a Coordinated Multi-point transmission (CoMP) network. We further derive the secrecy outage probability for these CoMP sources based on the security-region. We also provide a closed-form expression for the maximum number of eavesdroppers for a given secrecy outage constraint, which can effect the secure communication. Tractable numerical results are presented under various assumptions of densities, antenna gains, AN transmission factors and path loss exponents.