Asymptotic Analysis on Secrecy Capacity in Large-Scale Wireless Networks Jinbei Zhang,Luoyi Fu,Xinbing Wang Dept.of Electronic Engineering Shanghai Jiao Tong University,China Email:{abelchina,yiluofu,xwang8}@sjtu.edu.cn Abstract-Since wireless channel is vulnerable to eavesdrop- nodes and that of eavesdroppers,which requires the intend- pers,the secrecy during message delivery is a major concern ed receiver to have a stronger channel than eavesdroppers. in many applications such as commercial,governmental and military networks.This paper investigates information-theoretic Recently,securing wireless communications at the physical secrecy in large-scale networks and studies how capacity is layer is intriguing renewed interests among research area affected by the secrecy constraint where the locations and channel Haenggi [4]and Pinto et al.[5]study the in-degree and out- state information (CSI)of eavesdroppers are both unknown.We degree distributions under the security constraints.As is shown consider two scenarios:1)non-colluding case where eavesdrop- in both papers,even a small number of eavesdroppers will pers can only decode messages individually;and 2)colluding case cause dramatic decreasing in nodes'connectivity.To guarantee where eavesdroppers can collude to decode a message.For the non-colluding case,we show that the network secrecy capacity is the secret transmission,Geol and Negi [6]propose artificial not affected in order-sense by the presence of eavesdroppers.For noise generation to suppress eavesdroppers'receiving signal the colluding case,the per-node secrecy capacity of ()can The independence of fading channels is exploited to generate be achieved when the eavesdropper density(n)is O(n) noise to suppress eavesdroppers'channels taking advantage for any constant B>0 and decreases monotonously as of cooperative schemes [7]and multiple antennas [8].[9]. the density of eavesdroppers increases.The upper bounds on Furthermore,Barros et al.[10]show that theoretic information network secrecy capacity are derived for both cases and shown to be achievable by our scheme when ve(n)=O(nP)or secrecy can be achieved by fading alone if channel state (n)=(log),where ar is the path loss gain.We show information (CSI)is available. that there is a clear tradeoff between the security constraints However,so far the research about information theoretic and the achievable capacity.Furthermore,we also investigate the security mainly focuses on distinctive techniques to enhance impact of secrecy constraint on the capacity of dense network, the security,yet little is known about their impact on network the impact of active attacks and other traffic patterns as well as performance such as capacity,delay,etc,especially in large mobility models in the context. scale wireless networks.As some exceptions,Vasudevan et al. [12]study the secrecy capacity issue in a large-scale network. Specifically,they introduce helper nodes around transmitters to I.INTRODUCTION generate noise to degrade eavesdroppers'channel and utilize Although facilitating communications through quick de- channel fading gain of receivers to enhance secure commu- ployment and low cost,the broadcast nature of wireless nications.The impact of secrecy guard zone on capacity is channel makes it vulnerable to attacks such as eavesdropping investigated by Koyluoglu et al.[13]and Zhou et al.[14] and jamming,which are important concerns for commercial, On the other hand,what is the upper bound of secrecy capacity governmental and military networks.Traditional solutions are is unknown.Furthermore,some of pre-known information based on cryptographic methods such as the well-known RSA is needed in the previous works,such as pre-known CSI public key cryptosystem.However,due to the expensive key information of receivers or some pre-known location informa- distribution,the rapid growth of computation power and im- tion of eavesdroppers.These pre-known information can be provement on decoding technology,cryptographic techniques used by transmitters to differentiate receivers'channels from encounter some limitations,especially as the network size eavesdroppers'.And,in real applications it is difficult to obtain increases.Hence,to avoid such limitations,this paper focuses such information a prior,especially in large scale wireless on information theoretic security where eavesdroppers are networks.Therefore,a fundamental question arises:what will assumed to have infinite computational power. be the performance of secrecy capacity,if both the CSI and The basis for information theoretic security stems from location information are unknown to legitimate nodes? Shannon's notion of perfect secrecy [1],which is then ex- We are thus motivated to investigate this issue in static tended to noisy channels by Wyner [2]and later by Csiszar wireless networks.Our main idea to solve the aforementioned and Korner [3].Information theoretic security is achieved problem is to let a receiver distinguish its own channel by exploiting the difference between channels of legitimate by adopting self-interference cancelation.More precisely,we assume each receiver is equipped with three antennas,one for An earlier version of this paper appeared in the Proceedings of IEEE message reception and the other two for simultaneous artificial Infocom 2012(mini)[15]. noise generation to suppress eavesdroppers'channels.Since
1 Asymptotic Analysis on Secrecy Capacity in Large-Scale Wireless Networks Jinbei Zhang, Luoyi Fu, Xinbing Wang Dept. of Electronic Engineering Shanghai Jiao Tong University, China Email: {abelchina, yiluofu, xwang8}@sjtu.edu.cn Abstract—Since wireless channel is vulnerable to eavesdroppers, the secrecy during message delivery is a major concern in many applications such as commercial, governmental and military networks. This paper investigates information-theoretic secrecy in large-scale networks and studies how capacity is affected by the secrecy constraint where the locations and channel state information (CSI) of eavesdroppers are both unknown. We consider two scenarios: 1) non-colluding case where eavesdroppers can only decode messages individually; and 2) colluding case where eavesdroppers can collude to decode a message. For the non-colluding case, we show that the network secrecy capacity is not affected in order-sense by the presence of eavesdroppers. For the colluding case, the per-node secrecy capacity of Θ( √1 n ) can be achieved when the eavesdropper density ψe(n) is O(n−β), for any constant β > 0 and decreases monotonously as the density of eavesdroppers increases. The upper bounds on network secrecy capacity are derived for both cases and shown to be achievable by our scheme when ψe(n) = O(n−β) or ψe(n) = Ω(log α−2 α n), where α is the path loss gain. We show that there is a clear tradeoff between the security constraints and the achievable capacity. Furthermore, we also investigate the impact of secrecy constraint on the capacity of dense network, the impact of active attacks and other traffic patterns as well as mobility models in the context. I. INTRODUCTION Although facilitating communications through quick deployment and low cost, the broadcast nature of wireless channel makes it vulnerable to attacks such as eavesdropping and jamming, which are important concerns for commercial, governmental and military networks. Traditional solutions are based on cryptographic methods such as the well-known RSA public key cryptosystem. However, due to the expensive key distribution, the rapid growth of computation power and improvement on decoding technology, cryptographic techniques encounter some limitations, especially as the network size increases. Hence, to avoid such limitations, this paper focuses on information theoretic security where eavesdroppers are assumed to have infinite computational power. The basis for information theoretic security stems from Shannon’s notion of perfect secrecy [1], which is then extended to noisy channels by Wyner [2] and later by Csisza´r and Ko¨rner [3]. Information theoretic security is achieved by exploiting the difference between channels of legitimate An earlier version of this paper appeared in the Proceedings of IEEE Infocom 2012(mini) [15]. nodes and that of eavesdroppers, which requires the intended receiver to have a stronger channel than eavesdroppers. Recently, securing wireless communications at the physical layer is intriguing renewed interests among research area. Haenggi [4] and Pinto et al. [5] study the in-degree and outdegree distributions under the security constraints. As is shown in both papers, even a small number of eavesdroppers will cause dramatic decreasing in nodes’ connectivity. To guarantee the secret transmission, Geol and Negi [6] propose artificial noise generation to suppress eavesdroppers’ receiving signal. The independence of fading channels is exploited to generate noise to suppress eavesdroppers’ channels taking advantage of cooperative schemes [7] and multiple antennas [8], [9]. Furthermore, Barros et al. [10] show that theoretic information secrecy can be achieved by fading alone if channel state information (CSI) is available. However, so far the research about information theoretic security mainly focuses on distinctive techniques to enhance the security, yet little is known about their impact on network performance such as capacity, delay, etc, especially in large scale wireless networks. As some exceptions, Vasudevan et al. [12] study the secrecy capacity issue in a large-scale network. Specifically, they introduce helper nodes around transmitters to generate noise to degrade eavesdroppers’ channel and utilize channel fading gain of receivers to enhance secure communications. The impact of secrecy guard zone on capacity is investigated by Koyluoglu et al. [13] and Zhou et al. [14]. On the other hand, what is the upper bound of secrecy capacity is unknown. Furthermore, some of pre-known information is needed in the previous works, such as pre-known CSI information of receivers or some pre-known location information of eavesdroppers. These pre-known information can be used by transmitters to differentiate receivers’ channels from eavesdroppers’. And, in real applications it is difficult to obtain such information a prior, especially in large scale wireless networks. Therefore, a fundamental question arises: what will be the performance of secrecy capacity, if both the CSI and location information are unknown to legitimate nodes? We are thus motivated to investigate this issue in static wireless networks. Our main idea to solve the aforementioned problem is to let a receiver distinguish its own channel by adopting self-interference cancelation. More precisely, we assume each receiver is equipped with three antennas, one for message reception and the other two for simultaneous artificial noise generation to suppress eavesdroppers’ channels. Since
the three antennas are all equipped on one node,the noise gain on capacity can increase linearly with the number of base generated by the receiver itself can be eliminated through station under certain circumstances.Multicast is a common the technique of antenna cancelation proposed in [17].This traffic pattern in real networks which makes the analysis much differs our noise generation pattern from previous works and more difficult.Li [24]proposes a tree-based routing scheme we will show in later part that such difference can dramatically to deal with it.More recently.Wang et al.[25]and Tang et improve network secrecy capacity. al.[26]study multicast capacity in hybrid networks.Mobility Our main contributions are summarized as follows: pattern plays an important part in wireless networks and Neely In the non-colluding case,the optimal per-node secrecy [19]uses queuing theory to study the delay and capacity.Hu capacity e()is achievable in the presence of eaves- [11]further study the multicast capacity in mobile large scale droppers.This result holds even in the scenario where networks.Brownian motion is an important mobility pattern there are more eavesdroppers than legitimate nodes in which is studied in [30]by Lin et al..Homogeneous mobility the network. pattern and uniform node density is the first step for the In the colluding case,we establish the relationship be- study on mobile networks.Garetto et al.[21]investigate the tween the secrecy capacity and the tolerable number heterogeneous cases which include a large body of mobility of eavesdroppers.More importantly,we first derive the models. upper bound for secrecy capacity which is achievable. We identify the underlying interference model to capture the fundamental impact of secrecy constraints.This mod- II.NETWORK MODELS AND DEFINITIONS el relies weakly on the specific settings such as traffic pattern and mobility models of legitimate nodes.Hence. In this paper,we consider a static ad hoc network in an our study can be flexibly applied to more general cases extended network男=[0,v问×O,√冗. and shed insights into the design and analysis of future Legitimate Nodes:Legitimate nodes follow a Poisson dis- wireless networks. tribution with unit intensity over the whole network.And transmitter-receiver pairs are randomly chosen such that each The rest of this paper is organized as follows.In Section II, node is the destination of exactly one source.We denote T we present the system model.Asymptotic analysis on different scenarios is carried out in Section III and IV.We investigate and R as the subsets of nodes simultaneously transmitting and receiving at a given time-slot.We assume that each legitimate the effect of dense network in Section V.Jamming as a node is equipped with three antennas.When a legitimate node different kind of network attacking is investigated in Section acts as a receiver,one antenna is used for message reception VI.Discussions and concluding remarks are given in Section while the other two are devoted to simultaneous artificial noise VII and VIII,respectively. generation to suppress eavesdroppers'channels.The distances between the receive antenna and the two respective transmit A.Related Works antennas should satisfy a difference of half the wavelength. Asymptotic analysis can provide fundamental insight on The interference can therefore be eliminated using the tech- network performance as the network size increases.The nique of self-interference cancelation proposed in [17]. ground-breaking work is initiated by Gupta and Kumar [18]. Eavesdroppers:Independently of legitimate nodes,eaves- who study capacity performance in a network with n randomly droppers also follow a Poisson distribution in the network distributed nodes.They show that the per-node capacity is with intensity Ae.Let be the set of eavesdroppers.We lower bounded by )and upper bounded by assume eavesdroppers always keep silent since they will be easily detected if active.In order to have an insight on This gap is closed later by Franceschetti et al.[20]using the fundamental information theoretical secrecy capacity,we percolation theory.The fundamental difference behind these assume eavesdroppers have infinite computation ability which two works is the underlying connectivity.The communication means that traditional cryptography method can not be applied range in [1]should be to guarantee full connec- here.We also assume that both CSI and location information tivity whereas it only needs to be (in [20]to guarantee of eavesdroppers are unknown to legitimate nodes. partial connectivity at the bottleneck.Later on,Grossglauser The Physical Model:For simplicity,we denote uniform and Tse [23]further indicate the capacity can be improved transmission power as P:and uniform noise generation power to e(1)when mobility is introduced to nodes,at the expense as Pr.The path loss between node i and node j is denoted by of increased delay [19].Since then,asymptotic analysis has I(zi,j).which can be expressed as l(xi,rj)=min(1,dij). drawn considerable attention in research area and we will give Here di;is the transmission distance and the loss exponent a brief introduction in the following. o >2.When node i is transmitting messages to node j,the While interference always has an negative effect on wireless signal to interference and noise ratio (SINR)received by node communication,MIMO technology turns it into useful signal j over a channel of unit bandwidth can be given by: and hence greatly enhance the communication.In [28].Ozgur et al.propose an iterative MIMO scheme to obtain a constant Pl(xi,Ej) per-node capacity which is a great improvement compared to hop-by-hop transmissions.Infrastructure is another effective SINR)=+∑en间PIr,)+2keR)P(k,' way to overcome the interference.Liu et al.[27]prove that the where No denotes the ambient noise power at the receiver
2 the three antennas are all equipped on one node, the noise generated by the receiver itself can be eliminated through the technique of antenna cancelation proposed in [17]. This differs our noise generation pattern from previous works and we will show in later part that such difference can dramatically improve network secrecy capacity. Our main contributions are summarized as follows: • In the non-colluding case, the optimal per-node secrecy capacity Θ( √ 1 n ) is achievable in the presence of eavesdroppers. This result holds even in the scenario where there are more eavesdroppers than legitimate nodes in the network. • In the colluding case, we establish the relationship between the secrecy capacity and the tolerable number of eavesdroppers. More importantly, we first derive the upper bound for secrecy capacity which is achievable. • We identify the underlying interference model to capture the fundamental impact of secrecy constraints. This model relies weakly on the specific settings such as traffic pattern and mobility models of legitimate nodes. Hence, our study can be flexibly applied to more general cases and shed insights into the design and analysis of future wireless networks. The rest of this paper is organized as follows. In Section II, we present the system model. Asymptotic analysis on different scenarios is carried out in Section III and IV. We investigate the effect of dense network in Section V. Jamming as a different kind of network attacking is investigated in Section VI. Discussions and concluding remarks are given in Section VII and VIII, respectively. A. Related Works Asymptotic analysis can provide fundamental insight on network performance as the network size increases. The ground-breaking work is initiated by Gupta and Kumar [18], who study capacity performance in a network with n randomly distributed nodes. They show that the per-node capacity is lower bounded by Ω(√ 1 n log n ) and upper bounded by O( √ 1 n ). This gap is closed later by Franceschetti et al. [20] using percolation theory. The fundamental difference behind these two works is the underlying connectivity. The communication range in [18] should be Θ(log n n ) to guarantee full connectivity whereas it only needs to be Θ( 1 n ) in [20] to guarantee partial connectivity at the bottleneck. Later on, Grossglauser and Tse [23] further indicate the capacity can be improved to Θ(1) when mobility is introduced to nodes, at the expense of increased delay [19]. Since then, asymptotic analysis has drawn considerable attention in research area and we will give a brief introduction in the following. While interference always has an negative effect on wireless communication, MIMO technology turns it into useful signal and hence greatly enhance the communication. In [28], Ozg ¨ ur¨ et al. propose an iterative MIMO scheme to obtain a constant per-node capacity which is a great improvement compared to hop-by-hop transmissions. Infrastructure is another effective way to overcome the interference. Liu et al. [27] prove that the gain on capacity can increase linearly with the number of base station under certain circumstances. Multicast is a common traffic pattern in real networks which makes the analysis much more difficult. Li [24] proposes a tree-based routing scheme to deal with it. More recently, Wang et al. [25] and Tang et al. [26] study multicast capacity in hybrid networks. Mobility pattern plays an important part in wireless networks and Neely [19] uses queuing theory to study the delay and capacity. Hu [11] further study the multicast capacity in mobile large scale networks. Brownian motion is an important mobility pattern which is studied in [30] by Lin et al.. Homogeneous mobility pattern and uniform node density is the first step for the study on mobile networks. Garetto et al. [21] investigate the heterogeneous cases which include a large body of mobility models. II. NETWORK MODELS AND DEFINITIONS In this paper, we consider a static ad hoc network in an extended network B = [0, √n] × [0, √n]. Legitimate Nodes: Legitimate nodes follow a Poisson distribution with unit intensity over the whole network. And transmitter-receiver pairs are randomly chosen such that each node is the destination of exactly one source. We denote T and R as the subsets of nodes simultaneously transmitting and receiving at a given time-slot. We assume that each legitimate node is equipped with three antennas. When a legitimate node acts as a receiver, one antenna is used for message reception while the other two are devoted to simultaneous artificial noise generation to suppress eavesdroppers’ channels. The distances between the receive antenna and the two respective transmit antennas should satisfy a difference of half the wavelength. The interference can therefore be eliminated using the technique of self-interference cancelation proposed in [17]. Eavesdroppers: Independently of legitimate nodes, eavesdroppers also follow a Poisson distribution in the network with intensity λe. Let E be the set of eavesdroppers. We assume eavesdroppers always keep silent since they will be easily detected if active. In order to have an insight on the fundamental information theoretical secrecy capacity, we assume eavesdroppers have infinite computation ability which means that traditional cryptography method can not be applied here. We also assume that both CSI and location information of eavesdroppers are unknown to legitimate nodes. The Physical Model: For simplicity, we denote uniform transmission power as Pt and uniform noise generation power as Pr. The path loss between node i and node j is denoted by l(xi, xj ), which can be expressed as l(xi, xj ) = min(1, d−α ij ). Here dij is the transmission distance and the loss exponent α > 2. When node i is transmitting messages to node j, the signal to interference and noise ratio (SINR) received by node j over a channel of unit bandwidth can be given by: SINRij = Ptl(xi, xj ) N0 + k∈T \{i} Ptl(xk, xj ) + k∈R\{j} Prl(xk, xj ) , where N0 denotes the ambient noise power at the receiver.
3 The SINR received by eavesdropper e can be represented by:where dr is the Euclidean distance between legitimate node Pl(x,xe) t and node r and dte is the distance between legitimate node SNRe=NO+∑kenP(,)+2keRP,7,万 t and eavesdropper e. Proof:First we prove the maximum SINR that eaves- Secrecy Throughput Per Hop:As is defined in [3].the secure droppers can obtain is(+dt).Consider the following throughput between any active transmitter-receiver pair is: four cases. Case 1:When dte and dre are both greater than 1,then RijRij Rie log2(1 SINRij)-log2(1+SINRie) where SINRie maxeEe SINRie. SINR= Pl(xt,xe】 Asymptotic Capacity:Asymptotic per node capacity A(n) NO+∑ke八ePl(rk,Ee)+∑keRP,(zk,e】 is said to be achievable if there is a scheduling and routing scheme such that every node can transmit A(n)bits per second Pl(rt,xe) Pidieo 0,partition the eavesdroppers. network into rectangles of size m x(K log m-em)and choose We present the following lemma which will be quoted em=o(1)as the smallest value such that the side length is an throughout this paper. integer.Denote Ri as the ith rectangle and Ci as the number Lemma 1:When a legitimate node t is transmitting to a of edge-disjoint crossings of Ri.Then the minimal number of legitimate receiver r,the maximum rate that an independent disjoint crossing paths Np=min;Ci can be upper bounded by eavesdropper e can obtain is upper-bounded by 6logm when m goes to infinity and 6 is a constant.Further, to make sure that there are at least as many paths as slices Re≤min Pidie P(+du) inside each rectangle,each rectangle is sliced into horizontal No P. (1) strips with constant w=k log m/Np
3 The SINR received by eavesdropper e can be represented by: SINRie = Ptl(xi, xe) N0 + k∈T \{i} Ptl(xk, xe) + k∈R Prl(xk, xe) . Secrecy Throughput Per Hop: As is defined in [3], the secure throughput between any active transmitter-receiver pair is: Rs ij = Rij − Rie = log2(1 + SINRij ) − log2(1 + SINRie) where SINRie = maxe∈E SINRie. Asymptotic Capacity: Asymptotic per node capacity λ(n) is said to be achievable if there is a scheduling and routing scheme such that every node can transmit λ(n) bits per second on average to its destination in the long term. Knuth Notations: Denote λ(n) = O(f(n)) if there is a positive constant c1 such that limn→∞ P( λ(n) f(n) ≤ c1)=1 and λ(n) = Ω(f(n)) if f(n) = O(λ(n)). λ(n) is said to be Θ(f(n)) if both λ(n) = O(f(n)) and λ(n) = Ω(f(n)) hold. In Table 1, we list the parameters that will be frequently used in later analysis, proofs and discussions. TABLE I: Notations Notation Definition n The total number of legitimate nodes in the network. λs(n) The per-node secrecy capacity. ψe(n) The expected density of poisson distributed eavesdroppers. Pt The power to transmit packets. Pr The power to generate noise. R(d) The rate that a transmitter can transmit to an intended receiver which is located d distance away. Re The rate that an eavesdropper can obtain from a transmitting node. Rs(d) The rate that a transmitter can securely transmit to an intended receiver which is located d distance away. III. SECURITY CAPACITY FOR INDEPENDENT EAVESDROPPERS CASE In this section, we investigate secrecy capacity for independent eavesdroppers. We use percolation theory to construct the routing scheme which contains three phases, e.g., draining phase, highway transmission and delivery phase. Since our scheme should guarantee the secrecy communication, it seems that the capacity should be degraded. However, we show that regardless of the fact that the capacity will be sacrificed to ensure secrecy in draining phase and delivery phase, the bottleneck still lies in the highway phase where the secrecy capacity remains the same as that in the network without eavesdroppers. We present the following lemma which will be quoted throughout this paper. Lemma 1: When a legitimate node t is transmitting to a legitimate receiver r, the maximum rate that an independent eavesdropper e can obtain is upper-bounded by Re ≤ min Ptd−α te N0 , Pt Pr (1 + dtr) α , (1) where dtr is the Euclidean distance between legitimate node t and node r and dte is the distance between legitimate node t and eavesdropper e. Proof: First we prove the maximum SINR that eavesdroppers can obtain is Pt Pr (1 + drt)α. Consider the following four cases. Case 1: When dte and dre are both greater than 1, then SINRe = Ptl(xt, xe) N0 + k∈T \{t} Ptl(xk, xe) + k∈R Prl(xk, xe) 1 and dre 1, we can easily see that the path loss gain of T-E pair is 1 when the bound derived in case 1 holds, which means that the bound cannot be broken by condition dte 0, partition the network into rectangles of size m×(κ log m−m) and choose m = o(1) as the smallest value such that the side length is an integer. Denote Ri as the ith rectangle and Ci as the number of edge-disjoint crossings of Ri. Then the minimal number of disjoint crossing paths Np = mini Ci can be upper bounded by δ log m when m goes to infinity and δ is a constant. Further, to make sure that there are at least as many paths as slices inside each rectangle, each rectangle is sliced into horizontal strips with constant w = κ log m/Np.
Note that Iw 2,8ilc)-converges to a constant when≥ 2. Since the distance from the transmitter to the designated receiver is at most c(d+1),the receiving signal S(d)can be lower-bounded by S(d≥Pl(c(d+1) (4) =P(c(d+1)-a Notice that l(c(d+1))=(c(d+1))-since d is an integer and c is greater than 1. Fig.1:There are at least 6logm disjoint highways in each Now the accurate rate that the legitimate receiver may rectangle.Nodes in i-th slice will transmit to nodes located in achieve can be derived as follows: the i-th highway and crosses denote eavesdroppers. R(d)=log1+ S(d) No+I(d) Our packet routing scheme includes three steps: P(c(d+1)-a Step 1:Each source in the i-th slice transmits directly to a ≥1og)1+No+4B+Pk@- (5 legitimate relay located on the i-th path.The relay is chosen in a way such that it is closest to the source among all other 2c2P(c(d+1)-a nodes on the i-th path,as is shown in Fig.1. ≥c2Pdra Step 2:Packets are relayed horizontally through the high- way and then along a vertical highway until it arrives at an when choosing k=(P,)and c2 is a constant. ◆ exit point closest to the destination in a multi-hop fashion. Now we will show that secrecy communication can be as- Step 3:Packets are directly delivered from the highway to sured for any T-R pairs by appropriately spacing for concurrent the destination similar to the first step. transmissions. Theorem 1:For any legitimate transmitter-receiver pair B.Analysis of Secrecy Capacity which is spaced at a distance of d cells apart,there exists Next we present our scheduling scheme and compute the an Ra(d)=(d--4).so that the receiver can receive at a lower bound of the legitimate receiver's rate.Note that our rate of Rs(d)securely from the transmitter. scheduling scheme is different from that proposed in [20], Proof:According to the definition of secure rate and since we should take the issue of secrecy into account.And combining with Lemma I and Lemma 2,the secrecy rate the basic idea is to space concurrent transmission sufficiently R.(d)each cell can transmit can be denoted as: far away so that the interference is tolerable Lemma 2:When a legitimate node is transmitting to a 1 legitimate receiver which is located d cells apart,the minimum R,间=k+(R④-R) (6 rate that the legitimate node can receive is lower-bounded by 1 P c2Pid-,where c2 is a constant. ≥依+)eaRd“-esgr( Proof:First we compute the interference at the receiver. Divide the network into disjoint subsquares of (k+d)x ( where is the time utilization factor,ca and ca are both constants. d)cells,where k will be explained later.Every cell in each subsquare takes turn to transmit.Consider a given transmitter- Let P,=2d20.Hence,to bound the interference in- receiver pair,the eight closest transmitters and receivers are curred to the intended receiver,according to Equation (5) located at distance of at least ck and c(k+d-1)from the k=e(p)=e(d2).Therefore,the secrecy rate each cell receiver.The sixteen next closest transmitters and receivers can receive is (d--4). ◆ are located at distance at least c(2k+d)and c(2k+2d-1) Theorem 1 indicates positive secrecy rate is achievable even away from the receiver and so on.Taking into consideration under the worst attack.In order to calculate per-node secrecy all the interferences in the whole network,the interference at capacity,we first compute the number of legitimate nodes in the intended destination can be upper-bounded as follows: each cell and then derive the traffic load that each node in Id≤∑8i(P,lc(ik+d-d)+P,lc(ik+d-1)》 the highway should relay,as are shown in the following two lemmas. i=1 Lemma 3:There are at most log n legitimate nodes in each ≤28R+Plea cell of constant size c=w.h.p.. =1 =(P+P)(kc)-8i(ci)-a. i=1 In this paper,w.h.p stands for with high probability.which means the (3)probability tends to 1 as n goes to infinity
4 Fig. 1: There are at least δ log m disjoint highways in each rectangle. Nodes in i-th slice will transmit to nodes located in the i-th highway and crosses denote eavesdroppers. Our packet routing scheme includes three steps: Step 1: Each source in the i-th slice transmits directly to a legitimate relay located on the i-th path. The relay is chosen in a way such that it is closest to the source among all other nodes on the i-th path, as is shown in Fig. 1. Step 2: Packets are relayed horizontally through the highway and then along a vertical highway until it arrives at an exit point closest to the destination in a multi-hop fashion. Step 3: Packets are directly delivered from the highway to the destination similar to the first step. B. Analysis of Secrecy Capacity Next we present our scheduling scheme and compute the lower bound of the legitimate receiver’s rate. Note that our scheduling scheme is different from that proposed in [20], since we should take the issue of secrecy into account. And the basic idea is to space concurrent transmission sufficiently far away so that the interference is tolerable. Lemma 2: When a legitimate node is transmitting to a legitimate receiver which is located d cells apart, the minimum rate that the legitimate node can receive is lower-bounded by c2Ptd−α, where c2 is a constant. Proof: First we compute the interference at the receiver. Divide the network into disjoint subsquares of (k + d) × (k + d) cells, where k will be explained later. Every cell in each subsquare takes turn to transmit. Consider a given transmitterreceiver pair, the eight closest transmitters and receivers are located at distance of at least ck and c(k + d − 1) from the receiver. The sixteen next closest transmitters and receivers are located at distance at least c(2k + d) and c(2k + 2d − 1) away from the receiver and so on. Taking into consideration all the interferences in the whole network, the interference at the intended destination can be upper-bounded as follows: I(d) ≤ ∞ i=1 8i(Ptl(c(i(k + d) − d)) + Prl(c(i(k + d) − 1))) ≤ ∞ i=1 8i(Pt + Pr)l(cik) = (Pt + Pr)(kc) −α∞ i=1 8i(ci) −α. (3) Note that ∞ i=1 8i(ci)−α converges to a constant c 1 when α ≥ 2. Since the distance from the transmitter to the designated receiver is at most c(d + 1), the receiving signal S(d) can be lower-bounded by S(d) ≥ Ptl(c(d + 1)) = Pt(c(d + 1))−α. (4) Notice that l(c(d + 1)) = (c(d + 1))−α since d is an integer and c is greater than 1. Now the accurate rate that the legitimate receiver may achieve can be derived as follows: R(d) = log 1 + S(d) N0 + I(d) ≥ log 1 + Pt(c(d + 1))−α N0 + c 1(Pt + Pr)(kc)−α ≥ c 2Pt(c(d + 1))−α ≥ c2Ptd−α, (5) when choosing k = Θ(P 1 α r ) and c2 is a constant. Now we will show that secrecy communication can be assured for any T-R pairs by appropriately spacing for concurrent transmissions. Theorem 1: For any legitimate transmitter-receiver pair which is spaced at a distance of d cells apart, there exists an Rs(d) = Ω(d−α−4), so that the receiver can receive at a rate of Rs(d) securely from the transmitter. Proof: According to the definition of secure rate and combining with Lemma 1 and Lemma 2, the secrecy rate Rs(d) each cell can transmit can be denoted as: Rs(d) = 1 (k + d)2 (R(d) − Re) ≥ 1 (k + d)2 c2Ptd−α − c3 Pt Pr dα (6) where 1 (k+d)2 is the time utilization factor, c2 and c3 are both constants. Let Pr = 2 c3 c2 d2α. Hence, to bound the interference incurred to the intended receiver, according to Equation (5), k = Θ(P 1 α r ) = Θ(d2). Therefore, the secrecy rate each cell can receive is Ω(d−α−4). Theorem 1 indicates positive secrecy rate is achievable even under the worst attack. In order to calculate per-node secrecy capacity, we first compute the number of legitimate nodes in each cell and then derive the traffic load that each node in the highway should relay, as are shown in the following two lemmas. Lemma 3: There are at most log n legitimate nodes in each cell of constant size c2 w.h.p.1. 1In this paper, w.h.p stands for with high probability, which means the probability tends to 1 as n goes to infinity.
Proof:Let A;be the number of legitimate nodes in cell Theorem 1.According to the routing scheme,each source i and A be the maximum number of A;.Hence,we have in the i-th slice transmit packets to the i-th highway in the P(A≥logn)=P(maxA.≥logn) same rectangle.Since the density of legitimate nodes is 1 and the size of each slice is wvn,which satisfy the conditions ≤P(U(A:≥logn) given by Lemma 4,we obtain that the maximum number of ≤P(A:≥logn) legitimate nodes inside each slice is no larger than 2wvn. Hence,the traffic load on each relay node in the highway is ne-c e2 logn at most 2wn nodes.Therefore,the secrecy capacity of the ≤2e logn highway phase is). Based on the results above,we conclude that per-node 1 c2e1+1/c2 secrecy capacity is(). ■ →0. log n Note that the third inequality follows from union bounds and C.The Optimality of Our Scheme the fourth one follows from Chernoff bounds [31]. We first consider the case where no eavesdropper exists in Lemma 4:If nodes are poisson distributed with intensity the network.Due to the broadcast nature of wireless channel, (n)in the network,partition the network into disjoint every concurrent transmission will incure interference to other regions with same size f(n),let Ni be the number of nodes transmissions.The following lemma shows that there is a inside region i.We have constraint on the total network throughput underlying this P(传foe回≤≤2f回.i)=1 fundamental physical model. Lemma 5:When n nodes are identically and randomly located in a wireless network and source-destination pairs when f(n)v(n)>logale n and f(n)=(1). are randomly chosen,the per-node throughput A(n)is upper Proof:The number of nodes inside each region N;is a poisson variable and denote its expectation as Hence,we bounded by () Proof:Let L be the expected distance between all source- have =E(Ni)=f(n)(n).Letting N be the maximum destination pairs.Hence L=θ(√m)l8l.Denote r and number of Ni,for all i.Under similar derivation of Lemma T(r)as the average transmission range and rate of each hop 3,we can get that respectively.Let I be the average distance that simultaneous 12 PN≥2fmm)≤fPN≥2fm)w(n) transmissions can occure.Since the expected number of hops that a packet should travel is L/r,the total traffic load eψ 、2g the network should carry is nA(n)L/r.And the total traffic ≤e中 2b/ that the network can carry is (r).Hence,we obtain f(n)(n)】 (7) n thatn(m)Lr≤T(rl,which means(n)≤只 Substituting T(r)into the equation,we have ≤m→0 .T(r) Pmin(1,r-a)) Am)≤P√7=NO+ZAE同P,写BV7 when f(n)v(n)>logale n and f(n)=(1). where T denotes the set of concurrent transmission nodes and Similarly,we can show that min;Ni is greater than I(k,)denotes the path loss gain. f(n)(n)w.h.p.when conditions hold. ■ It is easily verified that min(r,r1-)=O(1).Next We Theorem 2:With n legitimate nodes randomly distributed in the achievable per-node secrecy throughput under the show that (No+)l(k))2=(1).If (1),the result is straightforward.If I=o(1).there would be existence of independent eavesdroppers is () e()concurrent transmission nodes inside unit area around Proof:As is shown in the routing scheme,the maximum the receiver and the path loss gain between these nodes and distance between source and relay on the highway is no larger the intended receiver is e(1).Therefore,the result holds. than klogm+2c in the first step.Applying Theorem 1.we Since the per-node throughput without the secrecy constraint obtain that one node in the cell can transmit securely at rate is O().the per-node secrecy capacity can also be bounded (log-n)to the relay.Since there may be multiple nodes inside the cell,they should share the transmission chances.The by O()which indicates the optimality of our scheme. number of nodes inside each cell can be bounded as O(logn) according to Lemma 3.Hence,the achievable secrecy capacity IV.COLLUDING EAVESDROPPERS is (log-5n)in the draining phase.Note that since the In previous section,the maximum SINR received by an delivery phase is a reverse process of the draining phase,the independent eavesdropper can be suppressed by artificial noise secrecy capacity of the delivery phase is the same as that of generation.And it has already been shown that the per-node draining phase. throughput does not entail lost,regardless of how many eaves- In the highway phase,the transmission range between T-R droppers are present in the network.However,if eavesdroppers pairs is at most 2v2c.Hence each node on the highway can are equipped with multiple antennas or multiple eavesdroppers transmit securely at rate (1)to the next relay by applying can collude to decode the messages,is it still possible to
5 Proof: Let Ai be the number of legitimate nodes in cell i and A be the maximum number of Ai. Hence, we have P(A ≥ log n) = P (max Ai ≥ log n) ≤ P (∪i(Ai ≥ log n)) ≤ i P(Ai ≥ log n) ≤ n c2 e−c2 c2e log n c2 log n = 1 c2 e−c2 c2e1+1/c2 log n c2 log n → 0. Note that the third inequality follows from union bounds and the fourth one follows from Chernoff bounds [31]. Lemma 4: If nodes are poisson distributed with intensity ψ(n) in the network B, partition the network into disjoint regions with same size f(n), let Ni be the number of nodes inside region i. We have P 1 2 f(n)ψ(n) ≤ Ni ≤ 2f(n)ψ(n), ∀i = 1 when f(n)ψ(n) ≥ log4/e n and f(n) = Ω(1). Proof: The number of nodes inside each region Ni is a poisson variable and denote its expectation as ψ. Hence, we have ψ = E(Ni) = f(n)ψ(n). Letting N be the maximum number of Ni, for all i. Under similar derivation of Lemma 3, we can get that P(N ≥ 2f(n)ψ(n)) ≤ n f(n) P(Ni ≥ 2f(n)ψ(n)) ≤ n f(n) e−ψ eψ 2ψ 2ψ = n f(n) e 4 f(n)ψ(n) ≤ 1 f(n) → 0 (7) when f(n)ψ(n) ≥ log4/e n and f(n) = Ω(1). Similarly, we can show that mini Ni is greater than 1 2 f(n)ψ(n) w.h.p. when conditions hold. Theorem 2: With n legitimate nodes randomly distributed in B, the achievable per-node secrecy throughput under the existence of independent eavesdroppers is Ω( √ 1 n ). Proof: As is shown in the routing scheme, the maximum distance between source and relay on the highway is no larger than κ log m + 2c in the first step. Applying Theorem 1, we obtain that one node in the cell can transmit securely at rate Ω(log−α−4 n) to the relay. Since there may be multiple nodes inside the cell, they should share the transmission chances. The number of nodes inside each cell can be bounded as O(log n) according to Lemma 3. Hence, the achievable secrecy capacity is Ω(log−α−5 n) in the draining phase. Note that since the delivery phase is a reverse process of the draining phase, the secrecy capacity of the delivery phase is the same as that of draining phase. In the highway phase, the transmission range between T-R pairs is at most 2 √2c. Hence each node on the highway can transmit securely at rate Ω(1) to the next relay by applying Theorem 1. According to the routing scheme, each source in the i-th slice transmit packets to the i-th highway in the same rectangle. Since the density of legitimate nodes is 1 and the size of each slice is w√n, which satisfy the conditions given by Lemma 4, we obtain that the maximum number of legitimate nodes inside each slice is no larger than 2w√n. Hence, the traffic load on each relay node in the highway is at most 2w√n nodes. Therefore, the secrecy capacity of the highway phase is Ω( √ 1 n ). Based on the results above, we conclude that per-node secrecy capacity is Ω( √ 1 n ). C. The Optimality of Our Scheme We first consider the case where no eavesdropper exists in the network. Due to the broadcast nature of wireless channel, every concurrent transmission will incure interference to other transmissions. The following lemma shows that there is a constraint on the total network throughput underlying this fundamental physical model. Lemma 5: When n nodes are identically and randomly located in a wireless network and source-destination pairs are randomly chosen, the per-node throughput λ(n) is upper bounded by O( √ 1 n ). Proof: Let L be the expected distance between all sourcedestination pairs. Hence L = Θ(√n) [18]. Denote r and T(r) as the average transmission range and rate of each hop respectively. Let l be the average distance that simultaneous transmissions can occure. Since the expected number of hops that a packet should travel is L/r, the total traffic load the network should carry is nλ(n)L/r. And the total traffic that the network can carry is n l2 T(r). Hence, we obtain that nλ(n)L/r ≤ n l2 T(r), which means λ(n) ≤ rT(r) l2√n . Substituting T(r) into the equation, we have λ(n) ≤ rT(r) l2√n = Pt min(1, r−α) N0 + k∈T \{i} Ptl(xk, xj ) r l2√n where T denotes the set of concurrent transmission nodes and l(xk, xr) denotes the path loss gain. It is easily verified that min(r, r1−α) = O(1). Next We show that (N0 + k∈T \{i} Ptl(xk, xr))l 2 = Ω(1). If l = Ω(1), the result is straightforward. If l = o(1), there would be Θ( 1 l2 ) concurrent transmission nodes inside unit area around the receiver and the path loss gain between these nodes and the intended receiver is Θ(1). Therefore, the result holds. Since the per-node throughput without the secrecy constraint is O( √ 1 n ), the per-node secrecy capacity can also be bounded by O( √ 1 n ) which indicates the optimality of our scheme. IV. COLLUDING EAVESDROPPERS In previous section, the maximum SINR received by an independent eavesdropper can be suppressed by artificial noise generation. And it has already been shown that the per-node throughput does not entail lost, regardless of how many eavesdroppers are present in the network. However, if eavesdroppers are equipped with multiple antennas or multiple eavesdroppers can collude to decode the messages, is it still possible to
6 ensure secrecy transmission and what is the network secrecy B.Secrecy Capacity for Colluding Eavesdroppers performance?We will focus on these problems in this section. To get a fundamental insight on how the colluding eaves- droppers will affect the secrecy transmission,we assume that A.Eavesdroppers with Multiple Antennas all eavesdroppers in the network can collaborate to decode the messages and maximum ratio combining is adopted to We start from the special case where every eavesdropper maximize the SINR eavesdroppers obtained.Hence we can is equipped with A(n)antennas but eavesdroppers do not collaborate with each other. regard all eavesdroppers as a super-eavesdropper. Assume that eavesdroppers are poisson distributed with To get an intuitive insight,we assume that the eavesdrop- parameter e(n)in the network.For a given transmitter- per can employ maximum ratio combining to maximize the SINR which means that the correlation across the antennas is receiver pair,we partition the network into disjoint rings with a same size of f(n).The transmitter is at the center of all these ignored. Theorem 3:If eavesdroppers are equipped with A(n)an- rings.Let ri be the external diameter of the ith ring.Since tennas,the per-node secrecy capacity(n)is ((n)). f(n)=rr=π(r径-r-)for any i>l,we have ri=Vir1 for any i>1.Denote e as the set of eavesdroppers located Proof:Since eavesdroppers are equipped with A(n) inside the i-th ring.Hence the number of eavesdropper Nei in antennas,following the same argument of Lemma 1,the ei is a poisson variable with parameter e(n)f(n).Recalling maximum rate that eavesdroppers can get is bounded as Lemma 4.we have Re caA(n)B(1+drt)a.Because eavesdroppers don't transmit any noise,the rate that legitimate receivers can get P(5fn)we(n)≤Nei≤2fn)we(n,=l remains the same as the following R(d≥c2P(c(d+1)-a when f(n)ve(n)>logale n and f(n)=(1). (8) Notice that the distance between the transmitter and eaves- Because of Ra(d)=R(d)-Re,it is obvious that there droppers is at least ri-1,the signal power received by eaves- exists a constant ca.such that when Pr equals to cA(n)d2, droppers in the i-th ring is at most Pr for any i>2.For R(d)can be greater thanR(d).Hence the secrecy rate is each ve(n),we choose f(n)such that f(n)ve(n)>log4len (d-).To hold equation (6).k should be in the order of and f(n)=(1).Denote SINRei as the SINR received by (P)which is equal to (A(n)d2).So the secrecy rate in eavesdroppers in the i-th ring.Taking the summation of the each cell should be (d--4A(n)).When the transmission SINR received by the eavesdroppers in all the rings up,we is on the highway phase,the per-node secrecy capacity is have (A(n)).When the transmission is on the delivery SINRe≤∑SINRer phase,the per-node secrecy capacity is (log-5nA(n)). Hence.the per-node secrecy capacity is(A(n)).From this result,we can see that there is a tradeoff between the =∑SNR+ number of a eavesdropper'antennas and the capacity of jeΦe1 i=2je项ed legitimate nodes. ◆ +o ≤2f(m)4e(n)SINRet+∑2f(n)4e(m)SINRe (9) =2 ≤2f(n)pe(m) +d)°+∑2f4e(m)后 Piri =2 =2πbe(n)】 +d)°+ i=1 where the third row of this inequality follows from Lemma 1 and note that∑tir号converges since>2. Case 1:When the transmission is on the highway phase which means drt=e(1),substituted into Equation (8). it is obvious that there is a constant c4 satisfying Re cave(n)(r/P+r).As is shown in Lemma 2,the rate R(d)received by the intended receiver can be (1).Note that there are two constraints in the derivation of Equation (9),ie,fn)we(n)≥loga/en and f(n)=(1).with rn1=max(2(1),Θ(e(n)a)andP,=Θ(e(n)r),the secure transmission can be guaranteed and secure rate each Fig.2:An illustration of network partition to bound the upper node in the highway can transmit is ()where k=(P) bound of SINR received by eavesdroppers. is the concurrent transmission range. Hence if ve(n)=Q(logn),P.ve(n)r?=
6 ensure secrecy transmission and what is the network secrecy performance? We will focus on these problems in this section. A. Eavesdroppers with Multiple Antennas We start from the special case where every eavesdropper is equipped with A(n) antennas but eavesdroppers do not collaborate with each other. To get an intuitive insight, we assume that the eavesdropper can employ maximum ratio combining to maximize the SINR which means that the correlation across the antennas is ignored. Theorem 3: If eavesdroppers are equipped with A(n) antennas, the per-node secrecy capacity λs(n) is Ω( √ 1 nA(n)− 2 α ). Proof: Since eavesdroppers are equipped with A(n) antennas, following the same argument of Lemma 1, the maximum rate that eavesdroppers can get is bounded as Re ≤ c3A(n) Pt Pr (1 + drt)α. Because eavesdroppers don’t transmit any noise, the rate that legitimate receivers can get remains the same as the following R(d) ≥ c2Pt(c(d + 1))−α. (8) Because of Rs(d) = R(d) − Re, it is obvious that there exists a constant c 3, such that when Pr equals to c 3A(n)d2α, Rs(d) can be greater than 1 2R(d). Hence the secrecy rate is Ω(d−α). To hold equation (6), k should be in the order of Θ(Pr 1 α ) which is equal to (A(n) 1 α d2). So the secrecy rate in each cell should be Ω(d−α−4A(n)− 2 α ). When the transmission is on the highway phase, the per-node secrecy capacity is Ω( √ 1 nA(n)− 2 α ). When the transmission is on the delivery phase, the per-node secrecy capacity is Ω(log−α−5 nA(n)− 2 α ). Hence, the per-node secrecy capacity is Ω( √ 1 nA(n)− 2 α ). From this result, we can see that there is a tradeoff between the number of a eavesdropper’ antennas and the capacity of legitimate nodes. Fig. 2: An illustration of network partition to bound the upper bound of SINR received by eavesdroppers. B. Secrecy Capacity for Colluding Eavesdroppers To get a fundamental insight on how the colluding eavesdroppers will affect the secrecy transmission, we assume that all eavesdroppers in the network can collaborate to decode the messages and maximum ratio combining is adopted to maximize the SINR eavesdroppers obtained. Hence we can regard all eavesdroppers as a super-eavesdropper. Assume that eavesdroppers are poisson distributed with parameter ψe(n) in the network. For a given transmitterreceiver pair, we partition the network into disjoint rings with a same size of f(n). The transmitter is at the center of all these rings. Let ri be the external diameter of the ith ring. Since f(n) = πr2 1 = π(r2 i −r2 i−1) for any i > 1, we have ri = √ ir1 for any i ≥ 1. Denote Φei as the set of eavesdroppers located inside the i-th ring. Hence the number of eavesdropper Nei in Φei is a poisson variable with parameter ψe(n)f(n). Recalling Lemma 4, we have P( 1 2 f(n)ψe(n) ≤ Nei ≤ 2f(n)ψe(n), ∀i)=1, when f(n)ψe(n) ≥ log4/e n and f(n) = Ω(1). Notice that the distance between the transmitter and eavesdroppers is at least ri−1, the signal power received by eavesdroppers in the i-th ring is at most Ptr−α i−1 for any i ≥ 2. For each ψe(n), we choose f(n) such that f(n)ψe(n) ≥ log4/e n and f(n) = Ω(1). Denote SINRei as the SINR received by eavesdroppers in the i-th ring. Taking the summation of the SINR received by the eavesdroppers in all the rings up, we have SINRe ≤ i SINRei = j∈Φe1 SINR1j + +∞ i=2 j∈Φei SINRij ≤ 2f(n)ψe(n)SINRe1 + +∞ i=2 2f(n)ψe(n)SINRei ≤ 2f(n)ψe(n) Pt Pr (1 + drt) α + +∞ i=2 2f(n)ψe(n) Ptr−α i−1 N0 = 2πψe(n) r2 1 Pt Pr (1 + drt) α + Pt N0 r2−α 1 +∞ i=1 i − α 2 , (9) where the third row of this inequality follows from Lemma 1 and note that +∞ i=1 i − α 2 converges since α > 2. Case 1: When the transmission is on the highway phase which means drt = Θ(1), substituted into Equation (8), it is obvious that there is a constant c4 satisfying Re ≤ c4ψe(n)(r2 1/Pr + r2−α 1 ). As is shown in Lemma 2, the rate R(d) received by the intended receiver can be Θ(1). Note that there are two constraints in the derivation of Equation (9), i.e., f(n)ψe(n) ≥ log4/e n and f(n) = Ω(1). With r1 = max (Ω(1), Θ(ψe(n) 1 α−2 )) and Pr = Θ(ψe(n)r2 1), the secure transmission can be guaranteed and secure rate each node in the highway can transmit is Ω( 1 k2 ) where k = Θ(P 1 α r ) is the concurrent transmission range. Hence if ψe(n) = Ω(log α−2 α n), Pr = ψe(n)r2 1 =
> (ve(n)).The secure rate each node in the highway can further get transmit is((n)).Since the traffic load at each node in the highway is at most O(vn),the per-node through- PW≥)=e- put should be (e(n)).If ve(n)=O(logn). with similar argument,the noise generation power can be yue-v e(logn)and we can obtain per-node secrecy capacity of 川一(1++2+3+) (11) 2(元log云n. ke- ≤ 1-/0e+→0. Case 2:When the transmission is on the draining and delivery phases where drt=e(logn),there exists a constant Using the union bound,we have cs such that SINRe csve(n)(riloga n/P +ri-a).The n dve-v rate that a legitimate receiver can obtained is logn.Similar P(e≥)≤五1-/@+ to case 1,choosing r1 max ((1),e(ve(n)=logn)) (12) n1-v8 hee- 1 and Pr=e(ve(n)rilog2an),the secure transmission could be guaranteed and secure rate Rs allocated at h以1-@+D→0 each cell is (gog).where k=().When 1 as n goes to infinity. 色 e(m)=2(1),卫,=日(e(n)log器m)andR。= Theorem 5:If eavesdroppers are poisson-distributed in the (ve(n)-log-nlog n).Since there are at most network with intensity ve(n)=O(n-5)for any constant B> logn legitimate nodes inside a cell,the per-node secrecy 0.the per-node secrecy capacity is( capacity is bounded by (ve(n)log--1nlog n). Proof:To compute the SINR of the eavesdropper system, When ve(n)=O(1),using similar technique,we can obtain we divide the network into two parts.One is the circle which that the per-node secrecy capacity is at least a polylog(n) factor.Therefore,the bottleneck lies in the highway phase. is at most r distance from the transmitter,the other is the rest of the network.There are at most vri eavesdroppers in the Combining these two cases,we present the following the- circle where v is a constant as is shown in Lemma 5 and the orem which demonstrates the tradeoff between the secrecy SINR received by each eavesdropper is upper bounded by the capacity and the tolerable eavesdroppers'density. results in Lemma 1.Thus.the cumulative SINR received by eavesdroppers can be calculated as Theorem 4:Consider the wireless networkwhere le- gitimate nodes and eavesdroppers are independent poisson u+d)°+ SINR.≤uarip. Pir- 2xrvdr No distributed with parameter 1 and ve(n)respectively,the per- (13) node secrecy capacity is P.2ruri-a =URTiD1+dt)°+Na-2 ve(n)).ve(n)=2(log"n) 入.(n)= (六logn,e(m)=0ogn) When packets are delivered along the highway,where the distance between T-R pairs is dt=e(1)and the rate R(d) (10) is a positive constant,there exists constants ce and c such Intuitively,when ve(n)=o(n-1),the number of eaves- that Re≤SINRe≤R(d)when r1=c6 and Pr=c7rf.As droppers will be at most 1 w.h.p.according to the weak shown in Equation(6).the concurrent transmission range k is law of large numbers.Hence,the secrecy capacity will be e(P5)and hence is (1).So the secrecy rate each node on (with Theorem 2 which is much higher than the the highway can transmit is (1).Since the node should relay results in Theorem 3.The main reason is that the inequality at most e(vn)nodes'traffic,the per-node secrecy capacity f(n)ve(n)>loga/en should be satisfied throughout the proof is ( of Theorem 3.Therefore,the noise generation power should be (logn)which will degrade the throughput performance. When the transmission is on the draining and deliv- We re-investigate this problem from another perspective in the ery cases where drt =e(logn),the rate each cell can transmit is (log-n)as shown in Lemma 2.By choos- following context. ing ri cs loga-n and P cor?log20 n where Lemma 6:When the intensity of the eavesdroppers is cs and co are both constants,we can obtain SINRe e(n)=O(n-B)for any constant B>0,partitioning the R(d).The concurrent transmission range k is e(P,)= network into disjoint regions with constant size h and denoting e(log-n).Hence the secrecy throughput each cell can by Nei the number of nodes inside region i.we have transmit isθlog-e号nlog-an).Since there are at most P(Nei≤v,i)=1, ellog n)nodes in the cell,the per-node secrecy capacity is log÷nloga-1n. where v=「al+l. Combining the results above,we conclude this theorem. Proof:Let Ne be the maximum number of Nei and be the expected number of Nei.Hence =hve(n)and we can With Theorem 4 and Theorem 5,the per-node secrecy
7 Θ(ψe(n) α α−2 ). The secure rate each node in the highway can transmit is Ω(ψe(n) − 2 α−2 ). Since the traffic load at each node in the highway is at most O( √n), the per-node throughput should be Ω( √ 1 n ψe(n) − 2 α−2 ). If ψe(n) = O(log α−2 α n), with similar argument, the noise generation power can be Θ(log n) and we can obtain per-node secrecy capacity of Ω( √ 1 n log− 2 α n). Case 2: When the transmission is on the draining and delivery phases where drt = Θ(log n), there exists a constant c5 such that SINRe ≤ c5ψe(n)(r2 1 logα n/Pr + r2−α 1 ). The rate that a legitimate receiver can obtained is log−α n. Similar to case 1, choosing r1 = max (Ω(1), Θ(ψe(n) 1 α−2 log α α−2 n)) and Pr = Θ(ψe(n)r2 1 log2α n), the secure transmission could be guaranteed and secure rate Rs allocated at each cell is Ω( 1 k2 logα n ), where k = Θ(P 1 α r ). When ψe(n) = Ω(1), Pr = Θ(ψe(n) α α−2 log 2α2 α−2 n) and Rs = Ω(ψe(n) − 2 α−2 log−α n log− 4α α−2 n). Since there are at most log n legitimate nodes inside a cell, the per-node secrecy capacity is bounded by Ω(ψe(n) − 2 α−2 log−α−1 n log− 4α α−2 n). When ψe(n) = O(1), using similar technique, we can obtain that the per-node secrecy capacity is at least a polylog(n) factor. Therefore, the bottleneck lies in the highway phase. Combining these two cases, we present the following theorem which demonstrates the tradeoff between the secrecy capacity and the tolerable eavesdroppers’ density. Theorem 4: Consider the wireless network B where legitimate nodes and eavesdroppers are independent poisson distributed with parameter 1 and ψe(n) respectively, the pernode secrecy capacity is λs(n) = Ω( √ 1 n ψe(n) − 2 α−2 ), ψe(n) = Ω(log α−2 α n) Ω( √ 1 n log− 2 α n), ψe(n) = O(log α−2 α n) . (10) Intuitively, when ψe(n) = o(n−1), the number of eavesdroppers will be at most 1 w.h.p. according to the weak law of large numbers. Hence, the secrecy capacity will be Ω( √ 1 n ) with Theorem 2 which is much higher than the results in Theorem 3. The main reason is that the inequality f(n)ψe(n) ≥ log4/e n should be satisfied throughout the proof of Theorem 3. Therefore, the noise generation power should be Θ(log n) which will degrade the throughput performance. We re-investigate this problem from another perspective in the following context. Lemma 6: When the intensity of the eavesdroppers is ψe(n) = O(n−β) for any constant β > 0, partitioning the network into disjoint regions with constant size h and denoting by Nei the number of nodes inside region i, we have P(Nei ≤ v, ∀i)=1, where v = 1 β + 1. Proof: Let Ne be the maximum number of Nei and ψ be the expected number of Nei. Hence ψ = hψe(n) and we can further get P(Nei ≥ v) = ∞ i=v ψi e−ψ i! ≤ ψve−ψ v! (1 + ψ + ψ2 + ψ3 + ...) ≤ ψke−ψ v! 1 1 − ψ/(v + 1) → 0. (11) Using the union bound, we have P(Ne ≥ v) ≤ n h ψve−ψ v! 1 1 − ψ/(v + 1) ≤ n1−vβ h hve−ψ v! 1 1 − ψ/(v + 1) → 0 (12) as n goes to infinity. Theorem 5: If eavesdroppers are poisson-distributed in the network with intensity ψe(n) = O(n−β) for any constant β > 0, the per-node secrecy capacity is Ω( √ 1 n ). Proof: To compute the SINR of the eavesdropper system, we divide the network into two parts. One is the circle which is at most r1 distance from the transmitter, the other is the rest of the network. There are at most vπr2 1 eavesdroppers in the circle where v is a constant as is shown in Lemma 5 and the SINR received by each eavesdropper is upper bounded by the results in Lemma 1. Thus, the cumulative SINR received by eavesdroppers can be calculated as SINRe ≤ vπr2 1 Pt Pr (1 + drt) α + ∞ r1 Ptr−α N0 2πrvdr = vπr2 1 Pt Pr (1 + drt) α + Pt2πvr2−α 1 N0(α − 2) . (13) When packets are delivered along the highway, where the distance between T-R pairs is drt = Θ(1) and the rate R(d) is a positive constant, there exists constants c6 and c7 such that Re ≤ SINRe ≤ 1 2R(d) when r1 = c6 and Pr = c7r2 1. As shown in Equation (6), the concurrent transmission range k is Θ(P 1 α r ) and hence is Θ(1). So the secrecy rate each node on the highway can transmit is Θ(1). Since the node should relay at most Θ(√n) nodes’ traffic, the per-node secrecy capacity is Ω( √ 1 n ). When the transmission is on the draining and delivery cases where drt = Θ(log n), the rate each cell can transmit is Θ(log−α n) as shown in Lemma 2. By choosing r1 = c8 log α α−2 n and Pr = c9r2 1 log2α n where c8 and c9 are both constants, we can obtain SINRe ≤ 1 2R(d). The concurrent transmission range k is Θ(P 1 α r ) = Θ(log 2α−2 α−2 n). Hence the secrecy throughput each cell can transmit is Θ(log− 4α−4 α−2 n log−α n). Since there are at most Θ(log n) nodes in the cell, the per-node secrecy capacity is Ω(log− 4α−4 α−2 n log−α−1 n). Combining the results above, we conclude this theorem. With Theorem 4 and Theorem 5, the per-node secrecy
(n Upper Bound Lower Bound Gap Optimal Capacity 0 1 logm ".(n) Fig.3:An illustration of both upper bound and lower bound of secrecy capacity in large-scale networks.The scales of the axes are in terms of the orders in n. Fig.4:An illustration of network partition to bound the lower bound of SINR received by eavesdroppers. capacity can be summarized as follows. v(n))ve(n)=2(log"n) sixteen is at least,the interference eavesdropperj suffers 入.(n)= n(hlog舌n)).()=n(n-9,0og学nl from can be bounded as follows. () (n)=O(n-) (14) 马≤∑8(B+B,+(c--a for any constant B>0. (16) =(P+P))-a8c(c- C.The Optimality of Our Scheme c=1 ≤c1oPnk-a In previous subsection,we have derived the lower bounds of the network secrecy capacity in collaborating case.However. where cio is a constant. the upper bound of the network secrecy capacity still remains As is shown in Theorem 1.k should be (P).Therefore, unknown.We will focus on the upper bound in this subsection. the interference eavesdropper j suffers from can be bounded It is also assumed that legitimate nodes do not cooperate to by a constant.The maximum distance between eavesdropper generate artificial noise here while the cooperative mode will jand the closest transmitter is at most.Hence,the SINR be discussed in the next subsection. received by all the eavesdroppers in region Ai can be lower Theorem 6:Consider the wireless network where le- bounded by gitimate nodes and eavesdroppers are independent poisson distributed with parameter 1 and ve(n)respectively,the per- SNR≥∑G node secrecy capacity is ()a (17) 0(()a)(m=(1) 2 Nei No+T 入(n)= (15) 0(a) 中e(m)=O(1) ≥c11e(n)k2-a Proof:When the transmission is on the highway,we as- when c is a constant. sume that the concurrent transmission range isk and partition Since the rate at which each T-R pair can transmit is (1). the network into disjoint subsquares with size k x k.Denote we should choose k =(ve(n))to ensure the secrecy of the two squares with length and length whose centers transmission.Note that there are k2 cells in each subsquare are both at node i as A and A2i respectively.Let the region taking turn to transmit and each node in the highway should A-A2;be A:.Denote the number of eavesdroppers located carry the traffic load of e(vn)nodes.Hence the per-node in Ai as Nei where i ranges from 1 to.Since the expectation secrecy capacity is at most O()=0((n)). of the number of eavesdroppers located in all the regions A; Note that according to Theorem 3,the per-node secrecy is e(n),there are at least e(n)eavesdroppers in all the capacity is at most O().Therefore.the upper bound of regions A:when ve(n)≥ og according to Lemma 4. secrecy capacity is min((),O((n))). Hence there exists a i such that Nei will be greater than From the above analysis,we can obtain some intuitive 号e(n). insight on the main constraint of secrecy capacity.While the Consider a specific eavesdropper j in region A;.Since legitimate receivers can generate artificial noise to affect the the minimum distance between eavesdropper j and the eight near-by eavesdroppers'channels,eavesdroppers which lie in closest concurrent transmission is at least and the next the middle of two concurrent transmission T-R pairs may not
8 Fig. 3: An illustration of both upper bound and lower bound of secrecy capacity in large-scale networks. The scales of the axes are in terms of the orders in n. capacity can be summarized as follows. λs(n) = Ω( √1 n ψe(n) − 2 α−2 ) ψe(n) = Ω(log α−2 α n) Ω( √1 n log− 2 α n) ψe(n) = [Ω(n−β), O(log α−2 α n)] Ω( √1 n ) ψe(n) = O(n−β) (14) for any constant β > 0. C. The Optimality of Our Scheme In previous subsection, we have derived the lower bounds of the network secrecy capacity in collaborating case. However, the upper bound of the network secrecy capacity still remains unknown. We will focus on the upper bound in this subsection. It is also assumed that legitimate nodes do not cooperate to generate artificial noise here while the cooperative mode will be discussed in the next subsection. Theorem 6: Consider the wireless network B where legitimate nodes and eavesdroppers are independent poisson distributed with parameter 1 and ψe(n) respectively, the pernode secrecy capacity is λs(n) = O( √ 1 n ψe(n) − 2 α−2 ) ψe(n) = Ω(1) O( √ 1 n ) ψe(n) = O(1) . (15) Proof: When the transmission is on the highway, we assume that the concurrent transmission range is k and partition the network into disjoint subsquares with size k × k. Denote the two squares with length 3k 4 and length k 4 whose centers are both at node i as A1i and A2i respectively. Let the region A1i−A2i be Ai . Denote the number of eavesdroppers located in Ai as Nei where i ranges from 1 to n k2 . Since the expectation of the number of eavesdroppers located in all the regions Ai is n 2 ψe(n), there are at least n 4 ψe(n) eavesdroppers in all the regions Ai when ψe(n) ≥ log4/e n n according to Lemma 4. Hence there exists a i such that Nei will be greater than k2 4 ψe(n). Consider a specific eavesdropper j in region Ai. Since the minimum distance between eavesdropper j and the eight closest concurrent transmission is at least k 4 and the next Fig. 4: An illustration of network partition to bound the lower bound of SINR received by eavesdroppers. sixteen is at least 5k 4 , the interference eavesdropper j suffers from can be bounded as follows. Ij ≤ ∞ c=1 8c(Pt + Pr)(k 4 + (c − 1)k) −α = (Pt + Pr)(k) −α∞ c=1 8c(c − 3 4 ) −α ≤ c10Prk−α (16) where c10 is a constant. As is shown in Theorem 1, k should be Ω(P 1 α r ). Therefore, the interference eavesdropper j suffers from can be bounded by a constant. The maximum distance between eavesdropper j and the closest transmitter is at most 3k 4 . Hence, the SINR received by all the eavesdroppers in region Ai can be lower bounded by SINRe ≥ j Sj N0 + Ij ≥ Nei ( 3k 4 )−α N0 + Ij ≥ c11ψe(n)k2−α, (17) when c11 is a constant. Since the rate at which each T-R pair can transmit is Θ(1), we should choose k = Ω(ψe(n) 1 α−2 ) to ensure the secrecy of transmission. Note that there are k2 cells in each subsquare taking turn to transmit and each node in the highway should carry the traffic load of Θ(√n) nodes. Hence the per-node secrecy capacity is at most O( 1 k2√n ) = O( √ 1 n ψe(n) − 2 α−2 ). Note that according to Theorem 3, the per-node secrecy capacity is at most O( √ 1 n ). Therefore, the upper bound of secrecy capacity is min(O( √ 1 n ), O( √ 1 n ψe(n) − 2 α−2 )). From the above analysis, we can obtain some intuitive insight on the main constraint of secrecy capacity. While the legitimate receivers can generate artificial noise to affect the near-by eavesdroppers’ channels, eavesdroppers which lie in the middle of two concurrent transmission T-R pairs may not
be affected in order sense by the generated noise.Therefore, According to the main idea of the upper bound,we can there is a clear tradeoff between the density of eavesdroppers design a corresponding scheme to achieve the upper bound and the concurrent transmission opportunities. except a polylog(n)factor. Compared with Theorem 4,our scheme achieves optimal Since the network is divided into rings with di=2, secrecy capacity when ve(n)=(logn)and ve(n)= there are at most e(log n)rings in the network.Therefore, O(n-8)for any constant B>0.And when ve(n)=the cumulative noise suffered by the intended receiver is at O(logn),our scheme is close to the optimal one.A more most e(logn).To ensure the rate that legitimate receiver clear picture of such optimality is illustrated in Fig.3.And can obtain is larger than that of eavesdroppers',there are we leave it as our future work to further close this gap. two possible solutions.The artificial noise generated by the cooperative nodes can be scaled down by a (logn)factor. D.Discussion on the Upper Bound On the other hand,we may also increase the P to further Since the overhead to coordinate the generation of artificial decrease the eavesdroppers'signals.After delicate compu- tation.it can be shown that the first solution has a better noise between legitimate nodes maybe too large,we don't consider the scenario when legitimate nodes cooperate to performance and therefore we only present the proof of the generate artificial noise to enhance the secret transmission first solution in the following.Since we adopt the first solution, throughout this paper.The scheme proposed in previous Part Pa =da-2 logn and the rate that the legitimate T-R pair B and Part C has also shown its great potential to improve can transmit remains as a constant.Divide the network into k2 secrecy capacity.However,it is still of great interest to disjoint subsquares.The cumulative SINR that eavesdroppers see what is the secrecy capacity when legitimate nodes can can obtain inside the intended legitimate receiver's subsquare cooperate and how to achieve it.Therefore,we consider the can be bounded by cooperative mode here and only present the key analysis in SINR1≤c1a ve(n)d2- this part to avoid redundancy with previous sections. kad a+da-2 log-I n log-a n Theorem 7:Consider the wireless network where le- d gitimate nodes and eavesdroppers are independent poisson distributed with parameter 1 and e(n)respectively,the per- kota+qs∑、m)d-a ≤qa(n)d-a 29-21oga-1n node secrecy capacity is ≤4c13中e(m)log告n·k点-a O(ae(n)奇)e(n)=2(1) (20) 入(n)= (18) 0(a) e(n)=O(1)】 when ci3 is a constant and k2=(logn).Note that the main difference between Equation(19)and(20)is when legitimate nodes can cooperate to generate artificial a logan parameter.This is a path loss gain because the noise and a1=a- 1 maximum distance between an eavesdropper and a legitimate Proof:Artificial noise is helpful only when the eavesdrop- node generating noise is logn.It can also be shown that the pers'SINR is decreased more than the legitimate receivers'. cumulative SINR that eavesdroppers can obtain inside other Assume that a legitimate node which is d =(1)distance subsquares is smaller than SINRe.Therefore,using similar away from legitimate receivers can generate artificial noise approach in Part B,the secrecy capacity is with power Pa.Since there are e(d2)legitimate nodes which are e(d)distance away from legitimate receivers,the noise 问)=(后.m)音1og号n) (21) that the legitimate receiver will suffer is e(d2.Pad-).There- fore,when Pa is larger than (de-2).the SINR legitimate when ve(n)k号=2(logn). receiver obtained will suffer a same loss with eavesdroppers'. Divide the network into rings according to the distance(d;= V.SECRECY CAPACITY IN DENSE NETWORKS AND 2)to the legitimate receiver.Therefore,in the i-th ring, RANDOM NETWORKS there are about e(ve(n)d2)eavesdroppers.The noise each eavesdropper suffer is at most (do-2+Pd)where P A.Secrecy Capacity in Dense Networks is at most e(k)similar to previous subsection.Hence,the In previous section,we have considered secrecy trans- SINR received by all eavesdroppers can be lower bounded by missions in extended networks.Now we will extend it to dense networks where nodes are poisson distributed in a unit sR之2 square.On surface.the difference seems to be only a scale factor of vn and all the results can be applied to the dense networks directly.However,we note that this is not the case ≥号∑ —十” because the path loss gain in extended networks is bounded 2 d9-2 while it is unbounded in dense networks.Consider that an d4>k1 ≥号k六 eavesdropper is quite close to the transmitter,the SINR at the eavesdropper will be quite large.Hence we should first (19) consider the minimum distance between eavesdroppers and when ci2 is a constant and=.Following similar the transmitters which is denoted by b.Let Ne be the number argument in Part C,we conclude this theorem. of eavesdroppers in the dense network.When nmb-Ne =o(1)
9 be affected in order sense by the generated noise. Therefore, there is a clear tradeoff between the density of eavesdroppers and the concurrent transmission opportunities. Compared with Theorem 4, our scheme achieves optimal secrecy capacity when ψe(n) = Ω(log α−2 α n) and ψe(n) = O(n−β) for any constant β > 0. And when ψe(n) = O(log α−2 α n), our scheme is close to the optimal one. A more clear picture of such optimality is illustrated in Fig. 3. And we leave it as our future work to further close this gap. D. Discussion on the Upper Bound Since the overhead to coordinate the generation of artificial noise between legitimate nodes maybe too large, we don’t consider the scenario when legitimate nodes cooperate to generate artificial noise to enhance the secret transmission throughout this paper. The scheme proposed in previous Part B and Part C has also shown its great potential to improve secrecy capacity. However, it is still of great interest to see what is the secrecy capacity when legitimate nodes can cooperate and how to achieve it. Therefore, we consider the cooperative mode here and only present the key analysis in this part to avoid redundancy with previous sections. Theorem 7: Consider the wireless network B where legitimate nodes and eavesdroppers are independent poisson distributed with parameter 1 and ψe(n) respectively, the pernode secrecy capacity is λs(n) = O( √ 1 n ψe(n) − 2 α1 ) ψe(n) = Ω(1) O( √ 1 n ) ψe(n) = O(1) (18) when legitimate nodes can cooperate to generate artificial noise and α1 = α − α α−1 . Proof: Artificial noise is helpful only when the eavesdroppers’ SINR is decreased more than the legitimate receivers’. Assume that a legitimate node which is d = Ω(1) distance away from legitimate receivers can generate artificial noise with power Pd. Since there are Θ(d2) legitimate nodes which are Θ(d) distance away from legitimate receivers, the noise that the legitimate receiver will suffer is Θ(d2·Pd·d−α). Therefore, when Pd is larger than Θ(dα−2), the SINR legitimate receiver obtained will suffer a same loss with eavesdroppers’. Divide the network into rings according to the distance(di = 2i ) to the legitimate receiver. Therefore, in the i-th ring, there are about Θ(ψe(n)d2 i ) eavesdroppers. The noise each eavesdropper suffer is at most Θ(dα−2 i + Prd−α i ) where Pr is at most Θ(kα) similar to previous subsection. Hence, the SINR received by all eavesdroppers can be lower bounded by SINRe ≥ c12 di ψe(n)d2 i d−α i kαd−α i + dα−2 i ≥ c12 2 di≤k1 ψe(n)d2−α i kαd−α i + c12 2 di>k1 ψe(n)d2−α i dα−2 i ≥ c12 2 ψe(n)k α α−1 −α, (19) when c12 is a constant and k1 = k α 2α−2 . Following similar argument in Part C, we conclude this theorem. According to the main idea of the upper bound, we can design a corresponding scheme to achieve the upper bound except a polylog(n) factor. Since the network is divided into rings with di = 2i , there are at most Θ(log n) rings in the network. Therefore, the cumulative noise suffered by the intended receiver is at most Θ(log n). To ensure the rate that legitimate receiver can obtain is larger than that of eavesdroppers’, there are two possible solutions. The artificial noise generated by the cooperative nodes can be scaled down by a Θ(log n) factor. On the other hand, we may also increase the Pr to further decrease the eavesdroppers’ signals. After delicate computation, it can be shown that the first solution has a better performance and therefore we only present the proof of the first solution in the following. Since we adopt the first solution, Pd = dα−2 log−1 n and the rate that the legitimate T-R pair can transmit remains as a constant. Divide the network into k2 disjoint subsquares. The cumulative SINR that eavesdroppers can obtain inside the intended legitimate receiver’s subsquare can be bounded by SINRe1 ≤ c13 di ψe(n)d2−α i kαd−α i + dα−2 i log−1 n log−α n ≤ c13 di≤k2 ψe(n)d2−α i kαd−α i + c13 di>k2 ψe(n)d2−α i dα−2 i log−α−1 n ≤ 4c13ψe(n) log α+1 α−1 n · k α α−1 −α, (20) when c13 is a constant and k2 = k α 2α−2 (log n) α+1 2α−2 . Note that the main difference between Equation (19) and (20) is a logα n parameter. This is a path loss gain because the maximum distance between an eavesdropper and a legitimate node generating noise is log n. It can also be shown that the cumulative SINR that eavesdroppers can obtain inside other subsquares is smaller than SINRe1. Therefore, using similar approach in Part B, the secrecy capacity is λs(n)=Ω 1 √nψe(n) − 2 α1 log −2(α+1) α1(α−1) n (21) when ψe(n)k2 2 = Ω(log n). V. SECRECY CAPACITY IN DENSE NETWORKS AND RANDOM NETWORKS A. Secrecy Capacity in Dense Networks In previous section, we have considered secrecy transmissions in extended networks. Now we will extend it to dense networks where nodes are poisson distributed in a unit square. On surface, the difference seems to be only a scale factor of √n and all the results can be applied to the dense networks directly. However, we note that this is not the case because the path loss gain in extended networks is bounded while it is unbounded in dense networks. Consider that an eavesdropper is quite close to the transmitter, the SINR at the eavesdropper will be quite large. Hence we should first consider the minimum distance between eavesdroppers and the transmitters which is denoted by b. Let Ne be the number of eavesdroppers in the dense network. When nπb2Ne = o(1),
the region inside the circles centered at transmitters with Taking expectation of both sides,we have diameter b will be empty of eavesdroppers. Conducting similar derivation in Theorem 1,we can obtain T+1(0)=T(0)(1-1) that SINRe≤ce(a)eand SINR,≥c2P(VWm)o when Tk+1()=(1-)T()+T(位-1)· (26 the concurrent transmission range k is greater than P.To Tk+1(k+1)=Tx(k) assure the transmission is secret,we choose P=e(()). Note that To(0)=n,Ti(0)=n-1 and Ti(1)=1,using Hence.the concurent transmission range is)and the mathematical induction,we have per-node secrecy capacity is2)=). Compared with the results in extended networks,the secrecy 0=nc(2-- concern has a much larger impact on dense networks.There- Since n cells are the same,we conclude this lemma.When fore,it is a tempting future work to study how to improve n and k both goes to infinity,the probability converges to a secrecy capacity in dense networks,e.g.mobility may help. poisson variable with parameter ◆ B.Secrecy Capacity in Random Networks VI.SECRECY CAPACITY UNDER ACTIVE ATTACKS The difference between Poisson distributed network and We now consider the static ad hoc networks under jamming the random network lies in that with network divided into attacks in which jammers keep sending out radio waves to multiple regions,the numbers of nodes inside a specific region interrupt the legitimate nodes.This will cause additional inter- in the former one are mutually independent poisson variables ference and hence may degrade the performance of legitimate whereas it is not the case in the latter one.Hence it is often nodes.For simplicity,we assume the power utilized by all the computable in poisson networks due to this independence jammers is the same,denoted by Pm and Pm=e(1). property.In contrast,this does not necessarily hold in random Assume that jammers are poisson distributed with parameter networks since the total number of nodes in the network is m(n)in the network and the set of jammers is denoted by given.Thus,the number of nodes inside a given region may m.For a given transmitter-receiver pair,we partition the affect the distribution probability of that in other regions. network into disjoint rings with a same size of f(n).The However,it is shown in [29]that random networks will receiver is at the center of all these rings.Let ri be the external converge to Poisson scenarios as n goes to infinity which is diameter of the ith ring.Since f(n)==(r?-r2) also proved in the following from another perspective.We note for any i>1,we have ri=Viri for any i>1.Denote mi that while the following result is straight forward at the first as the sets of eavesdroppers located inside ith ring.Hence the glance although it is not,the lemma given below has its own number of eavesdropper Nmi in mi is a poisson variable value and the proof here is different from that in [29].Hence. with parameter m(n)f(n).Recalling Lemma 4,we have our results still hold when applied to random networks. Lemma 7:Partition the network into disjoint cells with P(5f(n)4m(n)≤Nm≤2f(n)wm(n,闭)=l, equal size 1,if there are k nodes randomly distributed in the network,then the probability each cell has i nodes is when f(n)pm(n)≥log4/en and f(n)=2(1). Notice that the distance between the receiver and jammers is cr- (22) at least r_1,the interference at the receiver caused by jammers in the i-th ring is at most Pmri for any i>2.For each Proof:Denote the number of cells that has i nodes in it m(n),we choose f(n)such that f(n)vm(n)z logalen as T(i)and the expectation of T(i)as T(i).Consider there and f(n)=(1).Denote Imi as the interference caused by are k nodes in the network and a new node joins in.If the new jammers in the i-th ring.Taking the summation of interference node joins in a cell with i nodes,T(i)should be T(i)-1 caused by jammers in all the rings up,we have and T(i+1)should be T(i+1)+1.Hence,we have lm≤lmi T(0) n-7(0) T+1(0)= (23) +o9 T(0)-1T@ ∑h,+∑∑ jE项m =2jeΦm 句-1@ 2f(n)om(n)Imi Tk+1(= T() n-T)-T(i-1) (24) i=2 (27) 7 T()+1 T(i-1】 n ≤2fm)4n(n)Pm+∑2ftn)wn(m)Pnri =2 for all i>2 and i<k,where the latter part of the equations is the probability of given event. -2 P.f)6.)(1+艺 n-T(k) =1 0 T+1(k+1) (25) ≤C14Pmf(n)pm(n), where c14 is a constant
10 the region inside the circles centered at transmitters with diameter b will be empty of eavesdroppers. Conducting similar derivation in Theorem 1, we can obtain that SINRe ≤ c1 Pt Pr ( 1 b √n )α and SINRl ≥ c2Pt( √n)α when the concurrent transmission range k is greater than P 1 α r . To assure the transmission is secret, we choose Pr = Θ(( 1 bn )α). Hence, the concurrent transmission range is Θ( 1 bn ) and the per-node secrecy capacity is Ω( √ 1 n ( √ bn n )2) = Ω( √ 1 nNe ). Compared with the results in extended networks, the secrecy concern has a much larger impact on dense networks. Therefore, it is a tempting future work to study how to improve secrecy capacity in dense networks, e.g., mobility may help. B. Secrecy Capacity in Random Networks The difference between Poisson distributed network and the random network lies in that with network divided into multiple regions, the numbers of nodes inside a specific region in the former one are mutually independent poisson variables whereas it is not the case in the latter one. Hence it is often computable in poisson networks due to this independence property. In contrast, this does not necessarily hold in random networks since the total number of nodes in the network is given. Thus, the number of nodes inside a given region may affect the distribution probability of that in other regions. However, it is shown in [29] that random networks will converge to Poisson scenarios as n goes to infinity which is also proved in the following from another perspective. We note that while the following result is straight forward at the first glance although it is not, the lemma given below has its own value and the proof here is different from that in [29]. Hence, our results still hold when applied to random networks. Lemma 7: Partition the network into disjoint cells with equal size 1, if there are k nodes randomly distributed in the network, then the probability each cell has i nodes is Ci k( 1 n) i (1 − 1 n) k−i . (22) Proof: Denote the number of cells that has i nodes in it as T k(i) and the expectation of T k(i) as Tk(i). Consider there are k nodes in the network and a new node joins in. If the new node joins in a cell with i nodes, T k+1(i) should be T k(i)−1 and T k+1(i + 1) should be T k(i + 1) + 1. Hence, we have T k+1(0) = T k(0) n−T k(0) n T k(0) − 1 T k(0) n (23) T k+1(i) = T k(i) − 1 T k(i) n T k(i) n−T k(i)−T k(i−1) n T k(i)+1 T k(i−1) n (24) for all i ≥ 2 and i ≤ k, where the latter part of the equations is the probability of given event. T k+1(k + 1) = 0 n−T k(k) n 1 T k(k) n . (25) Taking expectation of both sides, we have Tk+1(0) = Tk(0)(1 − 1 n ) Tk+1(i) = (1 − 1 n )Tk(i) + 1 n Tk(i − 1) Tk+1(k + 1) = 1 n Tk(k) . (26) Note that T0(0) = n, T1(0) = n − 1 and T1(1) = 1, using mathematical induction, we have Tk(i) = nCi k( 1 n) i (1 − 1 n) k−i . Since n cells are the same, we conclude this lemma. When n and k both goes to infinity, the probability converges to a poisson variable with parameter k n . VI. SECRECY CAPACITY UNDER ACTIVE ATTACKS We now consider the static ad hoc networks under jamming attacks in which jammers keep sending out radio waves to interrupt the legitimate nodes. This will cause additional interference and hence may degrade the performance of legitimate nodes. For simplicity, we assume the power utilized by all the jammers is the same, denoted by Pm and Pm = Θ(1). Assume that jammers are poisson distributed with parameter ψm(n) in the network and the set of jammers is denoted by Φm. For a given transmitter-receiver pair, we partition the network into disjoint rings with a same size of f(n). The receiver is at the center of all these rings. Let ri be the external diameter of the ith ring. Since f(n) = πr2 1 = π(r2 i − r2 i−1) for any i > 1, we have ri = √ ir1 for any i ≥ 1. Denote Φmi as the sets of eavesdroppers located inside ith ring. Hence the number of eavesdropper Nmi in Φmi is a poisson variable with parameter ψm(n)f(n). Recalling Lemma 4, we have P( 1 2 f(n)ψm(n) ≤ Nm ≤ 2f(n)ψm(n), ∀i)=1, when f(n)ψm(n) ≥ log4/e n and f(n) = Ω(1). Notice that the distance between the receiver and jammers is at least ri−1, the interference at the receiver caused by jammers in the i-th ring is at most Pmr−α i−1 for any i ≥ 2. For each ψm(n), we choose f(n) such that f(n)ψm(n) ≥ log4/e n and f(n) = Ω(1). Denote Imi as the interference caused by jammers in the i-th ring. Taking the summation of interference caused by jammers in all the rings up, we have Im ≤ i Imi = j∈Φm1 I1j + +∞ i=2 j∈Φmi Iij ≤2f(n)ψm(n)Im1 + +∞ i=2 2f(n)ψm(n)Imi ≤2f(n)ψm(n)Pm + +∞ i=2 2f(n)ψm(n)Pmr−α i−1 =2Pmf(n)ψm(n) 1 + +∞ i=1 r−α i ≤c14Pmf(n)ψm(n), (27) where c14 is a constant.