当前位置:高等教育资讯网  >  中国高校课件下载中心  >  大学文库  >  浏览文档

Asymptotic Analysis on Secrecy Capacity in Large-Scale Wireless Networks

资源类别:文库,文档格式:PPT,文档页数:33,文件大小:1.54MB,团购合买
点击下载完整版文档(PPT)

上游充通大¥ SHANGHAI JIAO TONG UNIVERSITY Asymptotic Analysis on Secrecy Capacity in Large-Scale Wireless Networks Jinbei Zhang,Luoyifu,Xinbing Wang Department of Electronic Engineering Shanghai Jiao Tong University Aug.13,2013

Asymptotic Analysis on Secrecy Capacity in Large-Scale Wireless Networks Jinbei Zhang, Luoyifu, Xinbing Wang Department of Electronic Engineering Shanghai Jiao Tong University Aug. 13, 2013

Outline 上浒充通大¥ SHANGHAI JIAO TONG UNIVERSITY ▣Introduction Motivations Related works >Objectives Q Network Modeland Definition QSecrecy Capacity for Independent Eavesdroppers QSecrecy Capacity for Colluding Eavesdroppers ▣Discussion Q Conclusion and Future Work Asymptotic Analysis on Secrecy Capacity in Large-Scale Wireless Networks 2

Asymptotic Analysis on Secrecy Capacity in Large-Scale Wireless Networks 2 Outline ❑ Introduction ➢ Motivations ➢ Related works ➢ Objectives ❑ Network Model and Definition ❑ Secrecy Capacity for Independent Eavesdroppers ❑ Secrecy Capacity for Colluding Eavesdroppers ❑ Discussion ❑ Conclusion and Future Work

Motivations 上浒充通大粤 SHANGHAI JIAO TONG UNIVERSITY Secrecy is a Major Concern in Wireless Networks. >Mobile Phone Wallet Military networks CARD HERE Asymptotic Analysis on Secrecy Capacity in Large-Scale Wireless Networks 3

3 Motivations ❑ Secrecy is a Major Concern in Wireless Networks. ➢ Mobile Phone Wallet ➢ Military networks ➢ … Asymptotic Analysis on Secrecy Capacity in Large-Scale Wireless Networks

Related works l/ll 上浒充通大 SHANGHAI JIAO TONG UNIVERSITY Properties of Secrecy Graph + 0.5 ● 0.5 ● ● -0.5 -0.5 0 -0.5 0 0.5 -0.5 0.5 (m) z(m) Cited From [5] Cited From [5] [4]M.Haenggi,"The Secrecy Graph and Some of Its Properties",in Proc.IEEE ISIT, Toronto,Canada,July 2008. [5]P.C.Pinto,J.Barros,M.Z.Win,"Wireless Secrecy in Large-Scale Networks."in Proc. IEEE ITA11,California,USA,Feb.2011. Asymptotic Analysis on Secrecy Capacity in Large-Scale Wireless Networks 4

4 Related works – I/II ❑ Properties of Secrecy Graph [4] M. Haenggi, “The Secrecy Graph and Some of Its Properties”, in Proc. IEEE ISIT, Toronto, Canada, July 2008. [5] P. C. Pinto, J. Barros, M. Z. Win, “Wireless Secrecy in Large-Scale Networks.” in Proc. IEEE ITA’11, California, USA, Feb. 2011. Cited From [5] Cited From [5] Asymptotic Analysis on Secrecy Capacity in Large-Scale Wireless Networks

Related works ll/lI 上浒充通大 SHANGHAI JIAO TONG UNIVERSITY Secrecy Capacity in large-scale networks, Mobile Networks [16] Guard Zone [13] Artificial Noise+Fading Gain(CSI needed)[12] Cited from [12] [16]Y.Liang,H.V.Poor and L.Ying,"Secrecy Throughput of MANETs under Passive and Active Attacks",in IEEE Trans.Inform.Theory,Vol.57,No.10,Oct.2011. [13]O.Koyluoglu,E.Koksal,E.Gammel,"On Secrecy Capacity Scaling in Wireless Networks",submitted to IEEE Trans.Inform.Theory,Apr.2010. [12]S.Vasudevan,D.Goeckel and D.Towsley,"Security-capacity Trade-off in Large Wireless Networks using Keyless Secrecy",in Proc.ACM MobiHoc,Chicago,Illinois,USA, Sept.2010. Asymptotic Analysis on Secrecy Capacity in Large-Scale Wireless Networks 5

5 Related works – II/II ❑ Secrecy Capacity in large-scale networks, ➢ Mobile Networks [16] ➢ Guard Zone [13] ➢ Artificial Noise+Fading Gain(CSI needed) [12] [16] Y. Liang, H. V. Poor and L. Ying, “Secrecy Throughput of MANETs under Passive and Active Attacks”, in IEEE Trans. Inform. Theory, Vol. 57, No. 10, Oct. 2011. [13] O. Koyluoglu, E. Koksal, E. Gammel, “On Secrecy Capacity Scaling in Wireless Networks”, submitted to IEEE Trans. Inform. Theory, Apr. 2010. [12] S. Vasudevan, D. Goeckel and D. Towsley, “Security-capacity Trade-off in Large Wireless Networks using Keyless Secrecy”, in Proc. ACM MobiHoc, Chicago, Illinois, USA, Sept. 2010. Cited from [12] Asymptotic Analysis on Secrecy Capacity in Large-Scale Wireless Networks

Objectives 上游充通大学 SHANGHAI JIAO TONG UNIVERSITY Several questions arise: CSI information is difficult to obtain Artificial noises also degrade legitimate receivers'channels >Cost on capacity is quite large to utilize fading gain How to effectively improve the secrecy capacity? Asymptotic Analysis on Secrecy Capacity in Large-Scale Wireless Networks 6

6 Objectives ❑ Several questions arise: ➢ CSI information is difficult to obtain ➢ Artificial noises also degrade legitimate receivers’ channels ➢ Cost on capacity is quite large to utilize fading gain How to effectively improve the secrecy capacity? Asymptotic Analysis on Secrecy Capacity in Large-Scale Wireless Networks

Outline 上浒充通大学 SHANGHAI JIAO TONG UNIVERSITY ▣Introduction QNetwork Model and Definition QSecrecy Capacity for Independent Eavesdroppers QSecrecy Capacity for Colluding Eavesdroppers ▣Discussion Conclusion and Future Work Asymptotic Analysis on Secrecy Capacity in Large-Scale Wireless Networks 7

7 Outline ❑ Introduction ❑ Network Model and Definition ❑ Secrecy Capacity for Independent Eavesdroppers ❑ Secrecy Capacity for Colluding Eavesdroppers ❑ Discussion ❑ Conclusion and Future Work Asymptotic Analysis on Secrecy Capacity in Large-Scale Wireless Networks

Network Model and Definition l/ll 上浒充通大 SHANGHAI JIAO TONG UNIVERSITY ▣Legitimate Nodes. >Self-interference cancelation[16]adopted >3 antennas per-node Antenna Cancellation TX RX d+λ/2 CSI information unknown Power Splitter ▣Eavesdroppers. OHx220 RF Input RF Analog Interference 个 Location positions unknown Reference Output! RF Analog Baseband→RF RF Interference Cancellation 个 CSI information unknown Digital Interference Cancellation ADC RF>Baseband DAC Digital Decoder Interference Encoder Reference TX Signal Path 一RX Signal Path Cited from [17] [17]J.I.Choiy,M.Jainy,K.Srinivasany,P.Levis and S.Katti,"Achieving Single Channel, Full Duplex Wireless Communication",in ACM Mobicom'10,Chicago,USA,Sept.2010. Asymptotic Analysis on Secrecy Capacity in Large-Scale Wireless Networks 8

8 Network Model and Definition – I/II ❑ Legitimate Nodes: ➢ Self-interference cancelation[16] adopted ➢ 3 antennas per-node ➢ CSI information unknown ❑ Eavesdroppers: ➢ Location positions unknown ➢ CSI information unknown Cited from [17] [17] J. I. Choiy, M. Jainy, K. Srinivasany, P. Levis and S. Katti, “Achieving Single Channel, Full Duplex Wireless Communication”, in ACM Mobicom’10, Chicago, USA, Sept. 2010. Asymptotic Analysis on Secrecy Capacity in Large-Scale Wireless Networks

Network Model and Definition ll/ll 上洋充通大学 SHANGHAI JIAO TONG UNIVERSITY ▣Network Model: Extended networks: n nodes randomly distributed in a network with size n. Static >Physical channel model Pl(;x;) SNR,+∑rP4(x,+2P】 PI(xx) SINR.N+∑nP)+2x,) where I(xx)=min(1,d) Definition of secrecy capacity Ri=Ry-Re log2 (1+SINR )-log2 (1+SINRie) where SINR=maxce:SINR Asymptotic Analysis on Secrecy Capacity in Large-Scale Wireless Networks 9

9 Network Model and Definition – II/II ❑ Network Model: ➢ Extended networks: n nodes randomly distributed in a network with size n. ➢ Static ➢ Physical channel model where ➢ Definition of secrecy capacity 0 \{ } \{ } ( , ) ( , ) ( , ) t i j ij t k j r k j k T i k R i Pl x x SINR N Pl x x Pl x x   = + +   0 \{ } ( , ) ( , ) ( , ) t i e ie t k e r k e k T i k R Pl x x SINR N Pl x x Pl x x   = + +   ( , ) min(1, ) i j ij l x x d − = 2 2 log (1 ) log (1 ) s R R R SINR SINR ij ij ie ij ie = − = + − + max ie e ie SINR SINR =  where Asymptotic Analysis on Secrecy Capacity in Large-Scale Wireless Networks

Outline 上浒充通大¥ SHANGHAI JIAO TONG UNIVERSITY ▣Introduction Q Network Modeland Definition ▣ Secrecy Capacity for Independent Eavesdroppers >Lower Bound >Upper Bound QSecrecy Capacity for Colluding Eavesdroppers ▣Discussion Q Conclusion and Future Work Asymptotic Analysis on Secrecy Capacity in Large-Scale Wireless Networks 10

10 Outline ❑ Introduction ❑ Network Model and Definition ❑ Secrecy Capacity for Independent Eavesdroppers ➢ Lower Bound ➢ Upper Bound ❑ Secrecy Capacity for Colluding Eavesdroppers ❑ Discussion ❑ Conclusion and Future Work Asymptotic Analysis on Secrecy Capacity in Large-Scale Wireless Networks

点击下载完整版文档(PPT)VIP每日下载上限内不扣除下载券和下载次数;
按次数下载不扣除下载券;
24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
共33页,可试读12页,点击继续阅读 ↓↓
相关文档

关于我们|帮助中心|下载说明|相关软件|意见反馈|联系我们

Copyright © 2008-现在 cucdc.com 高等教育资讯网 版权所有