Transcript Slides PPT
Impact of Secrecy on Capacity in Large-Scale
Wireless Networks
Jinbei Zhang, Luoyifu, Xinbing Wang
Department of Electronic Engineering
Shanghai Jiao Tong University
Mar 15, 2012
Outline
Introduction
Motivations
Related works
Objectives
Network Model and Definition
Secrecy Capacity for Independent Eavesdroppers
Secrecy Capacity for Colluding Eavesdroppers
Discussion
Conclusion and Future Work
Impact of Secrecy on Capacity in Large-Scale Wireless Networks
2
Motivations
Secrecy is a Major Concern in Wireless Networks.
Mobile Phone Wallet
Military networks
…
Impact of Secrecy on Capacity in Large-Scale Wireless Networks
3
Related works – I/II
Properties of Secrecy Graph
Cited From [5]
Cited From [5]
[4] M. Haenggi, “The Secrecy Graph and Some of Its Properties”, in Proc. IEEE ISIT,
Toronto, Canada, July 2008.
[5] P. C. Pinto, J. Barros, M. Z. Win, “Wireless Secrecy in Large-Scale Networks.” in Proc.
IEEE ITA’11, California, USA, Feb. 2011.
Impact of Secrecy on Capacity in Large-Scale Wireless Networks
4
Related works – II/II
Secrecy Capacity in large-scale networks,
Mobile Networks [16]
Guard Zone [13]
Artificial Noise+Fading Gain(CSI needed) [12]
Cited from [12]
[16] Y. Liang, H. V. Poor and L. Ying, “Secrecy Throughput of MANETs under Passive and
Active Attacks”, in IEEE Trans. Inform. Theory, Vol. 57, No. 10, Oct. 2011.
[13] O. Koyluoglu, E. Koksal, E. Gammel, “On Secrecy Capacity Scaling in Wireless
Networks”, submitted to IEEE Trans. Inform. Theory, Apr. 2010.
[12] S. Vasudevan, D. Goeckel and D. Towsley, “Security-capacity Trade-off in Large
Wireless Networks using Keyless Secrecy”, in Proc. ACM MobiHoc, Chicago, Illinois, USA,
Sept. 2010.
Impact of Secrecy on Capacity in Large-Scale Wireless Networks
5
Objectives
Several questions arise:
CSI information is difficult to obtain
Artificial noises also degrade legitimate receivers’ channels
Cost on capacity is quite large to utilize fading gain
What’s the upper bound of secrecy capacity?
What’s the impact of other network models?
Impact of Secrecy on Capacity in Large-Scale Wireless Networks
6
Outline
Introduction
Network Model and Definition
Secrecy Capacity for Independent Eavesdroppers
Secrecy Capacity for Colluding Eavesdroppers
Discussion
Conclusion and Future Work
Impact of Secrecy on Capacity in Large-Scale Wireless Networks
7
Network Model and Definition – I/II
Legitimate Nodes:
Self-interference cancelation[16] adopted
3 antennas per-node
CSI information unknown
Eavesdroppers:
Location positions unknown
CSI information unknown
Cited from [17]
[17] J. I. Choiy, M. Jainy, K. Srinivasany, P. Levis and S. Katti, “Achieving Single Channel,
Full Duplex Wireless Communication”, in ACM Mobicom’10, Chicago, USA, Sept. 2010.
Impact of Secrecy on Capacity in Large-Scale Wireless Networks
8
Network Model and Definition – II/II
Network Model:
Extended networks
Static
Physical channel model
SIN R ij
SIN R ie
Pt l ( x i , x j )
N0
k T \{ i }
Pt l ( x k , x j )
k R \{ i }
Pr l ( x k , x j )
Pt l ( x i , x e )
N 0 k T \{ i } Pt l ( x k , x e ) k R Pr l ( x k , x e ) where
l ( x i , x j ) m in (1, d ij )
Definition of secrecy capacity
Rij Rij Rie log 2 (1 SIN R ij ) log 2 (1 SIN R ie )
s
where S IN R ie m ax e S IN R ie
Impact of Secrecy on Capacity in Large-Scale Wireless Networks
9
Outline
Introduction
Network Model and Definition
Secrecy Capacity for Independent Eavesdroppers
Lower Bound
Upper Bound
Secrecy Capacity for Colluding Eavesdroppers
Discussion
Conclusion and Future Work
Impact of Secrecy on Capacity in Large-Scale Wireless Networks
10
Independent Eavesdroppers
Capacity for Eavesdroppers
Lemma 1: When a legitimate node t is transmitting to a legitimate
receiver r, the maximum rate that an independent eavesdropper e
can obtain is upper-bounded by
R e m in(
Pt d te
N0
,
Pt
Pr
(1 d tr ) )
Received Power
where d tr is the Euclidean distance between legitimate node
t and node r and d te is the distance between legitimate node
t and eavesdropper e.
Impact of Secrecy on Capacity in Large-Scale Wireless Networks
11
Independent Eavesdroppers
Case 1: when d te and d re both greater 1,
SIN R e
Pt l ( x t , x e )
N0
k T \{ i }
Pt l ( x t , x e )
=
Prl ( xr , x e )
Pd
t te
Pr( drt d te )
Pt l ( x k , x e )
t te
r re
kR
Pr l ( x k , x e )
Pd
Pd
Pt
Pr
(1 d tr )
Impact of Secrecy on Capacity in Large-Scale Wireless Networks
12
Independent Eavesdroppers
Capacity for Legitimate Nodes
Lemma 2: When a legitimate node t is transmitting to a legitimate
receiver which is located d cells apart, the minimum rate that the
legitimate node can receive is lower-bounded by c 2 Pt d , where c 2
is a constant.
R ( d ) log(1
log(1
S (d )
)
N 0 I (d )
Pt ( c ( d 1))
N 0 c1 ( Pt Pr )( kc )
'
c 2 Pt ( c ( d 1))
c 2 Pt d
1
when choosing k ( P
r
)
)
and c 2 is a constant.
Impact of Secrecy on Capacity in Large-Scale Wireless Networks
13
Independent Eavesdroppers
Secrecy Capacity for Each Cell
Theorem 1: For any legitimate transmitter-receiver pair which is
spaced at a distance of d cells apart, there exists an R s ( d ) ( d 4 ) ,
so that the receiver can receive at a rate of R s ( d ) securely from
the transmitter.
Rs (d )
Choose
Pr 2
c3
1
(k d )
1
2
(k d )
2
d
( R ( d ) Re )
( c 2 Pt d
2
c2
Rs (d ) (d
c3
Pt
d )
Pr
1
k ( Pr ) ( d )
2
4
)
Impact of Secrecy on Capacity in Large-Scale Wireless Networks
14
Independent Eavesdroppers
Highway System
Draining Phase
Highway Phase
Delivery Phase
Rs (d ) (d
4
)
Theorem 2: With n legitimate nodes poisson distributed, the
achievable per-node secrecy throughput under the existence of
1
independent eavesdroppers is ( ) .
n
Impact of Secrecy on Capacity in Large-Scale Wireless Networks
15
Independent Eavesdroppers
Optimality of Our Scheme
Theorem 2: When n nodes is identically and randomly located in a
wireless network and source-destination pairs are randomly
chosen, the per-node throughput λ(n) is upper bounded by ( 1 ) .
n
[18] P. Gupta and P. Kumar, “The Capacity of Wireless Networks”, in IEEE Trans. Inform.
Theory, Vol. 46, No. 2, pp. 388-404, Mar. 2000.
Impact of Secrecy on Capacity in Large-Scale Wireless Networks
16
Outline
Introduction
Network Model and Definition
Secrecy Capacity for Independent Eavesdroppers
Secrecy Capacity for Colluding Eavesdroppers
Lower Bound
Upper Bound
Discussion
Conclusion and Future Work
Impact of Secrecy on Capacity in Large-Scale Wireless Networks
17
Colluding Eavesdroppers
Eavesdroppers Collude
Assume that the eavesdropper can employ maximum ratio
combining to maximize the SINR which means that the correlation
across the antennas is ignored.
Theorem 4: If eavesdroppers are equipped with A(n) antennas, the
1
per-node secrecy capacity
.
s( n ) is
(
A( n )
)
2
n
Impact of Secrecy on Capacity in Large-Scale Wireless Networks
18
Colluding Eavesdroppers
Eavesdroppers Collude
Assume that each eavesdropper equipped with one antenna and
different eavesdroppers can collude to decode the message.
R e m in(
SI NRe SI NRei
Pt d te
Pt
,
N0
Pr
(1 d tr ) )
SI NR1j
j e1
SI NRi j
i 2 j ei
2f ( n ) e( n )SI NRe 1
2f ( n )
e
( n )SI NRei
i 2
Pt
2f ( n ) e( n )
Pr
2 e( n ) ( r 1
2
Pt
Pr
(1 drt )
2f ( n )
( n)
Pt r i 1
e
N0
i 2
(1 drt )
Pt
N0
2
r1
i
2
)
i 1
Impact of Secrecy on Capacity in Large-Scale Wireless Networks
19
Colluding Eavesdroppers
Lower Bound
Theorem 5: Consider the wireless network B where legitimate nodes and
eavesdroppers are independent poisson distributed with parameter 1
eand
( n)
respectively, the per-node secrecy capacity is
2
2
1
e( n ) 2 ) , e( n ) ( l og n )
(
n
s( n )
2
2
1
(
l og n ) , e( n ) O( l og n )
n
Impact of Secrecy on Capacity in Large-Scale Wireless Networks
20
Colluding Eavesdroppers
Lower Bound
Lemma 5: When the intensity of the eavesdroppers is e( n )=O( n ) for
any constant β>0, partitioning the network into disjoint regions with
N ei
constant size c and denoting by
the number of nodes inside
region i, we have
P( N ei v , i ) 1
where
1
v +1
Theorem 6: If eavesdroppers are poisson-distributed in the network with
intensity e( n ) O( n ) for any constant β>0, the per-node secrecy
capacity is ( 1 ) .
n
Impact of Secrecy on Capacity in Large-Scale Wireless Networks
21
Colluding Eavesdroppers
Upper Bound
Nei
SI NRe
1
2
e( n ) k
Sj
N0 I
J
(
N ei
3k
4
)
j
N0 I
c 11 e( n ) k
2
j
2
1
k e( n ) 2
Impact of Secrecy on Capacity in Large-Scale Wireless Networks
s( n ) (
1
k
2
)
n
22
Colluding Eavesdroppers
Upper Bound
Theorem 7: Consider the wireless network B where
legitimate nodes and eavesdroppers are independent
e( n )
poisson distributed with parameter 1 and
respectively,
the per-node secrecy capacity is
2
1
e( n ) 2 ) , e( n ) ( 1)
O(
n
s( n )
1
O(
) , e( n ) O( 1)
n
Impact of Secrecy on Capacity in Large-Scale Wireless Networks
23
Outline
Introduction
Network Model and Definition
Secrecy Capacity for Independent Eavesdroppers
Secrecy Capacity for Colluding Eavesdroppers
Discussion
Conclusion and Future Work
Impact of Secrecy on Capacity in Large-Scale Wireless Networks
24
Discussions
Secrecy Capacity in Random Networks
Random networks: total node number is given
Poisson networks: node numbers in different regions are
independent
When n goes to infinity, they are the same in the sense of
probability
Our results still hold in random networks
[27] M. Penrose, “Random Geometric Graphs”, Oxford Univ. Press, Oxford, U.K., 2003.
Impact of Secrecy on Capacity in Large-Scale Wireless Networks
25
Discussions
Multicast Secrecy Capacity
[24] X. Li, “Multicast Capacity of Wireless Ad Hoc Networks”, in IEEE/ACM Trans.
Networking, Vol. 17, No. 3, pp. 950-961, 2009.
Impact of Secrecy on Capacity in Large-Scale Wireless Networks
26
Discussions
Secrecy Capacity in i.i.d Mobility Networks
[19] M. J. Neely and E. Modiano, “Capacity and Delay Tradeoffs for Ad Hoc Mobile
Networks”, in IEEE Trans. Inform. Theory, Vol. 51, No. 6, pp. 1917-1937, 2005..
Impact of Secrecy on Capacity in Large-Scale Wireless Networks
27
Discussions
Secrecy Capacity under Random Walk Networks
[30] A. Gamal, J. Mammen, B. Prabhakar, and D. Shah, “Throughput-delay trade-off in
wireless networks”, In Proceeding of IEEE INFOCOM, Hong Kong, China, Mar. 2004.
Impact of Secrecy on Capacity in Large-Scale Wireless Networks
28
Outline
Introduction
Network Model and Definition
Secrecy Capacity for Independent Eavesdroppers
Secrecy Capacity for Colluding Eavesdroppers
Discussion
Conclusion and Future Work
Impact of Secrecy on Capacity in Large-Scale Wireless Networks
29
Conclusions
In the non-colluding case, the optimal per-node secrecy
capacity is achievable in the presence of eavesdroppers.
In the colluding case, we establish the relationship
between the secrecy capacity and the tolerable number of
eavesdroppers. More importantly, we first derive the upper
bound for secrecy capacity which is achievable.
We identify the underlying interference model to capture
the fundamental impact of secrecy constraints. This model
relies weakly on the specific settings such as traffic pattern
and mobility models of legitimate nodes. Hence, our study
can be flexibly applied to more general cases and shed
insights into the design and analysis of future wireless
networks.
Impact of Secrecy on Capacity in Large-Scale Wireless Networks
30
Future Work
Secrecy capacity under active attacks
The impact of dense networks
The impact of heterogeneity networks
The impact of social networks
Impact of Secrecy on Capacity in Large-Scale Wireless Networks
31
Thank you !
Backup
Details on the Models of Legitimate nodes
Revolve on its own
Using 4 antennas
Impact of Secrecy on Capacity in Large-Scale Wireless Networks
33