skip to main content
10.1145/1860093.1860097acmconferencesArticle/Chapter ViewAbstractPublication PagesmobihocConference Proceedingsconference-collections
research-article

Security-capacity trade-off in large wireless networks using keyless secrecy

Published:20 September 2010Publication History

ABSTRACT

We investigate the scalability of a class of algorithms that exploit the dynamics of wireless fading channels to achieve secret communication in a large wireless network of n randomly located nodes. We describe a construction in which nodes transmit artificial noise to suppress eavesdroppers whose locations are unknown and ensure secrecy of messages transported across the network. Under a model in which eavesdroppers operate independently and under appropriate conditions on the achievable per-node throughput Ψ(n), we show that the network can tolerate Ω((1⁄√n(n))2c) eavesdroppers while ensuring that the aggregate rate at which eavesdroppers intercept packets goes to 0, where c is a constant such that 0 < c < 1. The result clearly establishes a trade-off between the achievable throughput and the allowable number of eavesdroppers. Under a collaborating eavesdropper model and a similar constraint on the eavesdropper throughput, we show that the network can tolerate a single eavesdropper with Ω((ln 1⁄√n(n))1ε) antennas, ∀ε > 0. We also establish sufficient conditions on the number of eavesdroppers to achieve a non-zero throughput in our construction.

References

  1. }}V. Brik, S. Banerjee, M. Gruteser, and S. Oh. Wireless device identification with radiometric signatures. In ACM MOBICOM, pages 116--127, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. }}P. Embrechts, C. Kluppelberg, and T. Mikosch. Modelling extremal events for insurance and finance. Springer-Verlag, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. }}M. Franceschetti, O. Dousse, D. N. C. Tse, and P. Thiran. Closing the gap in the capacity of wireless networks via percolation theory. IEEE Transactions on Information Theory, 53:1009--1018, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. }}S. Goel and R. Negi. Guaranteeing secrecy using artificial noise. IEEE Transactions on Wireless Communications, 7(6):2180--2189, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. }}P. Gupta and P. Kumar. The capacity of wireless networks. IEEE Transactions on Information Theory, 46(2):388--404, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. }}M. Haenggi. The secrecy graph and some of its properties. In IEEE ISIT, 2008.Google ScholarGoogle ScholarCross RefCross Ref
  7. }}J. Hershey, A. Hassan, and R. Yarlagadda. Unconventional cryptographic keying variable management. IEEE Transactions on Communications, 43(1):3--6, 1995.Google ScholarGoogle ScholarCross RefCross Ref
  8. }}O. Koyluoglu, C. E. Koksal, and H. E. Gamal. On secrecy capacity scaling in wireless networks. Under submission, (eprint arXiv:0908.0898), 2009.Google ScholarGoogle Scholar
  9. }}Y. Liang, H. Poor, and L. Ying. Secrecy throughput of manets with malicious nodes. In International Symposium on Information Theory, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. }}M. Mitzenmacher and E. Upfal. Probability and Computing: Randomized Algorithms and Probabilistic Analysis. Cambridge University Press, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. }}Y. Nebat. A lower bound for the achievable throughput in large wireless networks under fixed multipath fading. In IEEE SpaSWiN, 2006.Google ScholarGoogle ScholarCross RefCross Ref
  12. }}E. Perron, S. N. Diggavi, and E. Telatar. On cooperative wireless network secrecy. In IEEE INFOCOM, 2009.Google ScholarGoogle ScholarCross RefCross Ref
  13. }}S. Toumpis. Capacity and Cross-Layer Design of Wireless Ad Hoc Networks. PhD thesis, Stanford University, 2003.Google ScholarGoogle Scholar
  14. }}D. Tse and P. Viswanath. Fundamentals of Wireless Communication. Cambridge University Press, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. }}S. Vasudevan, S. Adams, D. Goeckel, Z. Ding, D. Towsley, and K. Leung. Multi-user diversity for secrecy in wireless networks. In Information Theory and Applications Workshop, 2009.Google ScholarGoogle Scholar
  16. }}S. Vasudevan, D. Goeckel, and D. Towsley. Security-capacity trade-off in large wireless networks using keyless secrecy. Technical Report UM-CS-2010-042, UMass Computer Science, 2010.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. }}A. D. Wyner. The wire-tap channel. Bell Syst. Tech. Journal, 54:1355--1387, 1975.Google ScholarGoogle Scholar
  18. }}S. Xiao, H. Pishro-Nik, and W. Gong. Dense parity check based secrecy sharing in wireless communications. In IEEE GLOBECOM, 2007.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Security-capacity trade-off in large wireless networks using keyless secrecy

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        MobiHoc '10: Proceedings of the eleventh ACM international symposium on Mobile ad hoc networking and computing
        September 2010
        272 pages
        ISBN:9781450301831
        DOI:10.1145/1860093

        Copyright © 2010 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 20 September 2010

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate296of1,843submissions,16%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader