Secrecy Throughput in Inhomogeneous Wireless Networks with Nonuniform Traffic

We investigate the secrecy throughput of inhomogeneous wireless network, especially in cases of independent and uniform eavesdropper with single antenna and multiple antennas. Towards the inhomogeneous distribution of legitimate nodes, we novelly construct a circular percolation model under the idea of transforming “inhomogeneous” to “homogeneous.” Correspondingly, the information is transmitted by two ways: intracluster transmission and intercluster transmission. For intracluster transmission, a per-node secrecy throughput of Ω ( 1 / n 1 - v ( 1 - v ) log n ) is derived by circular percolation model, where n and n v represent the number of nodes and clusters in the network, respectively. As for intercluster case, a connection called “information pipelines” is built. Then the per-node secrecy throughput of Ω Φ _ / n can be obtained, where Φ _ denotes the minimum node density in the network. Moreover, when the eavesdropper is equipped with Ψ ( n ) antennas, the per-node secrecy throughput of Ω ( 1 / n 1 - v ( 1 - v ) log n Ψ - 2 / α ( n ) ) and Ω ( ( Φ _ / n ) Ψ - 2 / α ( n ) ) is achieved for intracluster and intercluster transmission, respectively.


Introduction
Security is an important issue in wireless ad hoc networks [1], especially in commercial, government, and military networks.Because of the broadcast nature of wireless channel in multihop wireless networks, it is vulnerable to eavesdroppers and malicious nodes.Traditional methods are based on cryptographic technology such as the well-known RSA public key cryptosystem.However, with the increasing of network size, especially in large-scale wireless networks, cryptosystem encounters some limitation, such as expensive key distribution and improvement on decoding technology, which induces more cost and complicated maintenance.In [2,3], the authors showed that the capacity of wireless ad hoc networks was Ω(√  / log ) (Given two functions () and (): () = (()) means lim  → ∞ ()/() = 0; () = (()) means lim  → ∞ ()/() =  < ∞; if () = (()), () = Ω(()) w.h.p.; if both () = Ω(()) and () = (()), () = Θ(()); () = Θ(()) means () = Θ(()) when logarithmic terms are ignored.),where   was the probability that a node shared a primary secure associations (SAs) with any other nodes and  was the number of nodes in the network.Hence, to avoid the degradation on the throughput caused by   , a method of information theoretic security was proposed by exploiting the difference between channels of legitimate nodes with that of eavesdroppers.In [4], Goel and Negi proposed an artificial noise generation method to suppress eavesdroppers' receiving signal.Different from [4], Choi II et al. [5] assumed a legitimate node was equipped with three antennas.The noise was generated by the receivers and can be eliminated using the technique of antennas cancelation.Consequently, it is urgent to reveal the effect of this technology on the network performance such as capacity and connectivity.In [6], Vasudevan et al. investigated the trade-off between capacity and security in large-scale wireless networks.To 2 International Journal of Distributed Sensor Networks degrade the channel of eavesdropper, the authors used helper nodes around the transmitters to generate artificial noise.Specifically, when a per-node throughput of Ω(√1/ log ) was desired, the network can tolerate up to Ω((log )  ) independent eavesdroppers or a single eavesdropper with Ω((loglog) 1− ) antennas, where  and  were constants.The impact of secrecy guard zone on the capacity was investigated by Koyluoglu et al. in [7] and Zhou et al. in [8].As mobility plays an important part in wireless networks, Liang et al. [9] extended the network topology to mobile ad hoc networks.The authors showed that there exists a critical threshold on the density   of malicious node.That was, when   = (√/), the per-node secrecy capacity was Θ(√/), and when   = Ω(√/ polylog), the per-node secrecy capacity was Θ(1/  ), where  was the delay constraint.Latter on, C ¸apar et al. [10] considered onedimensional and two-dimensional ad hoc networks, where the number of eavesdroppers was (/ log ) and the location information of eavesdroppers was unknown.To degrade the signal quality of eavesdroppers, they exploited legitimate nodes to generate artificial noise and concluded that the pernode secure throughput was Ω(1/) in one-dimensional and Ω(√1/ log ) in two-dimensional networks, respectively.This result was the same order with the ground-breaking work by Gupta and Kumar [11].More recently, Zhang et al. [12] constructed a highway system in the network and analyzed the cases of independent eavesdropper, eavesdropper with multiple antennas, and colluding eavesdroppers.The results showed that the secrecy capacity for independent eavesdropper was Ω(1/√), which was the same order with the result [13].Furthermore, they also obtained that the pernode secrecy capacity can keep the order of Θ(1/√) when the eavesdroppers colluded with each other and the density of eavesdropper was ( − ).
However, all the works on the scaling law of secrecy capacity were based on homogeneous ad hoc networks; for instance, nodes were distributed uniformly or according to the homogeneous Poisson process, and the destination was randomly selected.In most realistic case, nodes may form into some different clusters and the traffic may be usually occurred at local area, such as the traffic established over heterogeneous wireless networks (Wi-Fi, WLAN, WiMAX, etc.) which is particular inhomogeneous [14].In [15], the authors considered the capacity property of clustered wireless network, where the node density did not show significant inhomogeneity.Later on, Perevalov et al. [16] used a Matern cluster process to achieve inhomogeneity.The node density inside the cluster was the same, whereas outside the cluster was the sea area.In their work, the bottleneck of the capacity was in the sea area.After that, Alfano et al. [17,18] considered a more general inhomogeneous node process-SNCP [19], in which the node density was also scaled with the number of nodes.Besides, in [20], Martina et al. extended the inhomogeneous network model to different cluster size and investigated the scaling law of the capacity.
In this paper, we investigate the secrecy throughput capacity of wireless networks with inhomogeneous node density and nonuniform traffic.The node distribution is an inhomogeneous Poisson node process named as shot noise cox process (SNCP).Specifically, we assume  legitimate nodes uniformly located in  = Θ( V ) clusters within the area of  and followed SNCP in each cluster.Meanwhile, the eavesdroppers are uniformly distributed in the network area with density of   .We study the independent eavesdropper with single antenna and multiple antennas, respectively.To elaborate the nonuniform traffic, we partition the transmission into two parts: intracluster transmission and intercluster transmission.For intracluster transmission, we construct a novel circular percolation model in each cluster and derive that the per-node secrecy throughput is For the case of intercluster, we build "information pipelines" among each cluster according to minimum node density Φ in the network.Then we achieve a secrecy rate of Ω(√Φ/√) for each legitimate node among clusters.As for eavesdropper equipped with Ψ() antennas, and Ω((√Φ/√)Ψ −2/ ()) for intracluster and intercluster transmission, respectively.Finally, we prove that the bottleneck of secrecy throughput is located in the area with minimum node density.
Since we firstly use percolation theory in inhomogeneous network model and propose a circular percolation model for the SNCP distributed network model, we will give a glance at the percolation theory.Percolation theory [21,22] is a field of mathematics and statistic physics that provides models of phase transition phenomena.Assume that water is poured on top of a porous stone, will the water be able to make its way from hole to hole and reach the bottom?By modeling the stone as a square grid, each edge can be open and traversed by water with probability , or closed with probability 1 − , and they are assumed to be independent.For a given , what is the probability that an open path exists from the top to the bottom?That is, is there a path of connected points of infinite length through the network?In fact, there exists a critical   below which the probability is always 0 and above which the probability is always 1.In some cases   may be calculated explicitly; for example, in two dimensions square lattice Z 2 , when  > 1/2, water percolates through the stone with probability one.One can then ask at what rate the water percolates and how it depends on .In other words, how rich in disjoint paths are connected component of open edges?To maximize the information flow, we want to operate the network at  > 1/2, above the percolation threshold, so that we can guarantee the existence of many disjoint paths that traverse the network.
The rest of this paper is organized as follows.In Section 2, we present the network model.We give the transmission model in Section 3. The novel circular percolation model in each cluster is constructed in Section 4. Section 5 derives the secrecy throughput in intracluster transmission.In Section 6, we investigate the secrecy throughput of intercluster transmission.We extend the secrecy throughput to the case of eavesdropper with multiple antennas in Section 7 and conclude the paper in Section 8 with the discussion of some possible future works.

Network Model
We consider a network with  legitimate nodes in a twodimensional torus ℵ = [0, √ ], where  = Θ().All legitimate nodes follow an inhomogeneous Poisson process which is called shot noise cox process (SNCP).The SNCP can be simply described by the following construction.There are  clusters randomly placed in the network and these cluster centers can be denoted by  = {  }  =1 , where () = .The center point   is also called mother point.For each   , it generates a point process with an intensity of   (  , ) at point , where (  , ) is a dispersion density function and the quantity   equals the number of nodes generated by cluster center   .We assume that all cluster centers generate the same number of legitimate nodes; that is,   = /.Moreover, according to SNCP, the density function  at point  can be written as follows: where (  , ) = (‖ −   ‖) depends only on the Euclidean distance ‖ −   ‖ between point  and the cluster center   , and the integral ∫  (  , )  over the entire network is finite.To simplify the model, we employ function () to replace the density function (  , ), where  = ‖ −   ‖.In order to gain finite integral over increasing network area, the function () is given below: In addition, we define  scales as Θ( V ),  as degradation factor, and V ∈ (0, 1).Then we can get that the number of nodes in each cluster is Θ( 1−V ), that is,   = Θ( 1−V ) for  = 1, 2, . . ., , since ∫  (  , ) is finite.
Other than legitimate nodes, the eavesdroppers are uniformly and independently distributed in the network with density   .We assume eavesdroppers always keep silent since they will be easily detected if they are active.In order to have an insight on the fundamental information theoretical secrecy throughput, we also assume eavesdroppers have infinite computation ability which means that traditional cryptography method cannot be applied here.In addition, we assume that both channel state information (CSI) and location of eavesdropper are unknown to legitimate nodes.
Similar to [6,12], we assume that each legitimate node is equipped with three antennas.When a legitimate node receives packets, one of the antennas is used for message reception, while the other two are applied to generate artificial noise to suppress the eavesdropper's channel simultaneously.As depicted in [5], the distance between the receiving antenna and the other two artificial noise generation antennas should satisfy a different of half the wavelength.Thus the interference can be eliminated using the technique of self-interference cancelation.
We define   as the average distance between neighboring cluster centers.Then we can get Notice that V < 1,   → ∞ as  tends to infinity, the network is a cluster-sparse network.When V = 1, the network is transformed to homogeneous model and its secrecy throughput is similar to that in the homogeneous Poisson process (HPP) network [12].In this paper, we focus on the cluster-sparse network in which the density of the whole network is not identical.We use Φ to denote the maximum node density and Φ for the minimum node density in the network.

Transmission Model
Let  and  denote the subsets of legitimate nodes simultaneously transmitting and receiving in a given time slot, and Γ is the set of eavesdroppers.
We consider the Shannon capacity as the channel capacity between two nodes, and we define SINR  as the signal to interference and noise ratio (SINR) from legitimate transmission node  to legitimate destination node  over a channel of unit bandwidth, which is given as follows: where (, ) = min{1, 1/   } with  > 2 and represents the path loss in the transmission between the node  and node .  and   denote the power of transmitting node  and artificial noise generation, respectively. 0 stands for noise power of the channel at the receive node , and the  means the set of nodes which can transmit simultaneously with node .
Similarly, we denote the SINR received by eavesdropper  as follows: According to the definition of secrecy throughput in [23], the secure rate between any legitimate nodes can be presented by where SINR  = max ∈Γ SINR  .
In our strategy, we employ different power for different nodes.We define rate   () the secrecy throughput which is the guaranteed rate that can be supported uniformly for source-destination pairs and it is also the average secrecy rate which can simultaneously be achieved by legitimate nodes with high probability (w.h.p.).

The Circular Percolation Model for Each Cluster
Following the roadmap of [12], we first construct routing scheme for the network.As the legitimate nodes are distributed according to SNCP, we divide the transmission into two parts: intracluster traffic and intercluster traffic.For each part of transmission, we use percolation theory to construct the routing scheme.In intracluster traffic, we propose a circle percolation model, which is novel and different from the former percolation model.As for intercluster case, we build information pipelines to connect the clusters.
In our model, based on the idea that transform "inhomogeneous" to "homogeneous, " we demonstrate a circular percolation model and build highway system for legitimate nodes in each cluster.Different from the previous highway construction [13], the highways based on our mode are not from bottom to top or left to right, but from inner cluster to external or around the cluster center.In addition, we adopt different transmission range for legitimate nodes while the transmission rate could stay the same.Lemma 1. Assume that there is a minimum positive separation distance  min between the center and any nodes for each cluster.Then each cluster can build a highway system within a radius of  max for  > 2.
Proof.We first divide a given cluster into  × (/)/ circular lattices, where  denotes the number of radius, and the arc between each neighboring radius is equal, that is, 2/.(/)/ is the number of concentric circles where the distance between each two neighboring circles is different.
Since SNCP is an inhomogeneous Poisson point process, the intensity at different circular sector area is different, so as to the area of each square.The external circular sectors are larger than the inner ones.From inner circle to external circle, we set the radius of the th concentric circle is as follows: Thus, from the circular lattice described above, we can find that small circular area can be viewed as a square when  approaches to infinite.
Lemma 2. To satisfy the cluster-sparse network in our model, the parameter  should meet the condition that  = Θ(√ Proof.From Lemma 1, we know the radius of the entire lattice is The distance between each two neighboring cluster is   .Taking (3) and ( 8) into consideration together, we can derive the following equation: Finally, we can get  = Θ(√  [18], the probability that a square is open can be denoted by From (10), we can get that   decreases for increasing values of  on the precondition of  > 2.
As the probability   is decreased with the parameter , we will calculate the critical value  max , within which the probability   can satisfy the condition of   >   .

Lemma 4. There exists a critical value
), within which each cluster can build a highway system for the degradation factor  > 2.
Proof.According to percolation theory, there exists a critical probability   , when  >   , the probability of the existence of many disjoint paths that traverse the network is going to one.Therefore, we can set the following equation by Lemma 3: where   is the probability which denotes the square   is open, and   <   < 1.
Following this equation, we can derive that where 12), we can achieve that According to Lemma 4 and ( 7), we can derive the critical value  max = Θ((log (log )/(−2))√ 1−V / log ).Specifically, we can construct Θ((log (log )/(−2))√ 1−V / log ) concentric circle within the radius  max .Till now, we have established a percolation model for the intracluster transmission.The cluster is divided into a  1 √ 1−V /(1 − V) log  ×  2 ((log(log )/( − 2))√ 1−V / log ) grid   .We consider a path of   is open if any two adjacent squares are open.Figure 1 is a part of one cluster lattice.Based on Appendix I in [13], we can obtain that there are ⌈ log ⌉ disjoint paths crossing a rectangle of size  × ( log  −   ).Therefore, within the radius of  max , there exists Ω(√ 1−V /(1 − V) log ) disjoint paths from inner circle to external circle, and Ω((log(log )/(−2))√ 1−V / log ) disjoint paths around the disk.With these two kinds of paths, the highway system of legitimate nodes is established.Although our model is a circular grid, it can be analyzed similarly as a  1 √ 1−V /(1 − V) log  ×  2 ((log(log )/( − 2))√ 1−V / log ) rectangle grid, which will be proved in the following section.
As shown in Figure 1, in each cluster, the routing scheme within the area of radius  max proceeds in four phases.
Phase 1 (Draining Phase).Source node  drains the packets to an access point on the highway of radial direction, using direct transmission and multiple time slots.Note that each highway may not be fully contained in its corresponding sector, but it may deviate from it.However, a highway is never farther than  log(((/)/)−) from its corresponding sector.
Phase 2 (Radial Highway Phase).Information is carried across the cluster along the highway in the radial direction, using multiple hops and multiple time slots, and there exist Ω(√ 1−V /(1 − V) log ) disjoint paths from inner circle to external circle.
Phase 4 (Delivering Phase).In this phase, information is delivered from the exit point located on the encircling highway to the destination node .
Comparing the rate in each phase, we find that the communication bottleneck is in the radial highway phase.

The Secrecy Transmission Rate of Intracluster Traffic
The routing protocol of intracluster communication uses four separate phases to deliver the packets and it can be found that the bottleneck occurs on the transmission along the highways.After setting different transmission power for different nodes, we can transform the inhomogeneous circular lattice into homogenous regular square lattice.In this section, we derive the secrecy rate in intracluster transmission via the circular percolation model.In addition, the TDMA scheme is adopted and the packet is delivered hop by hop; then a constant rate along the highway is achieved.However, there are still some differences between circular lattice and the regular one, such as not all the highways sever the same quantity of nodes and the power in each lattice is not equal.
Based on these differences, we give the per-node secrecy rate for the circular lattice specifically.
Lemma 5.For a given square, to make the interference from the two opposite directions be equal, the transmission and artificial generated noise power of legitimate nodes in square   is where  0 and  0 are the unit power for legitimate transmitter and artificial noise generation node, respectively.
Proof.For a given square   , let  1 denote the interference from the direction of outside the square, and  2 for that from the direction of inside the square.if  is the distance between two nodes, which is not Euclidean distance but the number of  squares away, then we can compute the interference from different directions as follows: We can also get that International Journal of Distributed Sensor Networks Similarly, we also can obtain  1 ()/ 2 () → 1, if   =  0 (2  /)  , where  1 and  2 are the interference caused by artificial generated noise.
Next, we refer to Lemma 1 in [12] and give the upper bound rate that an eavesdropper  can obtain.Lemma 6.Let   denote the maximum rate that an independent eavesdropper  can obtain; then we can get that where   is the Euclidean distance between legitimate transmitter  and receiver , and   is the Euclidean distance between node  and eavesdropper .
Proof.The proof is similar to that of Lemma 1 in [12].In [12], the authors assumed that each legitimate node used identical power for transmission and noise generation, while we assign different power for different nodes, as shown in Lemma 5. Despite difference in the power, the proof goes along the same line as [12].For concision, we omit details.

Theorem 7.
In each square, the rate that legitimate sourcedestination pair can be achieved in the "highway system" is   () = Ω( −−4 ), where  denotes the transmission range.For special, the distance  is not Euclidean distance but the number of  squares away.
Proof.First we compute the interference at a given destination node.We can prove that the interference from different directions is equal with the same interference distance .Then we will treat the cluster network as a square network.In addition, we adopt TDMA scheme and divide time into ( + ) 2 successive time slots, where  is an important parameter.Every square in each subsquare takes turn to transmit, and in one given time slot, squares can transmit simultaneously in accordance with Kumar's interference region [11].Assuming that the transmitter in a square   transmits toward a destination located in a square at distance of  squares away, the eight closest transmitters and receivers are located at distance at least  and  −  from the receiver.The sixteen next closest transmitters and receivers are at distance at least 2 +  and 2 away from the receivers and so on.Considering the interference in the network, the upper bound of the interference () caused by simultaneous transmitter nodes and artificial noise could be given as follows: (using ( 13)) Notice that this sum will converge if  > 2 and the proof is shown in Appendix A.
According to the interference model, we will derive a lower bound of received power of legitimate node.We notice that the distance between the transmitter and the receiver is at most (2  /)( + 1).Then the signal at the receiver can be bounded by Finally, combining (17) and (18), we can obtain an asymptotic lower bound of the rate for  → ∞: when choosing  = Θ( 1/ 0 ),   and   are constants.As shown in Lemma 6 and according to (6), the secrecy rate   () which each square can obtain is as follows: where 1/( + ) 2 is the time utilization factor.Let  0 = (2/  ) 2 .To bound the interference incurred to intended receiver, we can get  = Θ( 1/ 0 ) = Θ( 2 ) according to (19).Therefore, the secrecy rate which each square can obtain is Ω( −−4 ).
Theorem 7 shows that the secrecy rate is achievable even under the worst attack.In order to calculate the secrecy rate per-node, we will derive the rate in each phase.
Lemma 8.If one divides a given cluster into  sectors with arc of 2/, then there are no more than (2/)/ legitimate nodes located in each sector   .
Proof.Let   denote the probability that there exists a sector having more than (2/)/ nodes.As the number of nodes in each sector according to Poisson distribution of (2/)/, following the Chernoff bound (see Appendix C), when  → ∞, then ≤  −(/)/ (  (/)/ (2/)/ ) Therefore, we can conclude that there is no sector containing more than (2/)/ nodes.

Lemma 9. Each legitimate node within the radius of 𝜌 max can obtain a secrecy access rate 𝑅
) with a node on the highway of radial direction.
Proof.According to Theorem 5 in [13], by choosing  and  appropriately, there are at least Ω(log((/)/)) highways in the direction of radial within a given sector of arc (2/)[ log((/)/) − ].Note that each highway may not be fully contained in its corresponding sector; it may deviate it.However, it never deviates an arc of (2/)[ log((/)/) − ] from its corresponding sector; that is, it will not father than  log(((/)/) − ) squares, as it is shown in Figure 1.
Then, according to Theorem 7, let  =  log(((/)/) − ); we can obtain that the transmission rate between a legitimate node in a square and an access node on the radial highway is As there are many nodes in a square, they need to share the bandwidth.According to Lemma 8, we conclude that the rate of legitimate nodes in the first phase is Lemma 10.Every legitimate node in the radial direction highway can achieve a per-node secrecy rate Proof.According to the construction of highway system, the delivering strategy is hop-by-hop and information is transmitted from one square to a neighboring square.Therefore, by applying Theorem 7, we can obtain that the rate in the highway phase is Ω(1).Since  ≫ log(/), there will be Ω() distinct highways which span from inner circle to external circle.According to Chernoff bound, there are at most 2/ nodes w.h.p. in the arc of 2/.It follows that each node can transmit at a rate of order Ω(√1/( in the radial direction.
Lemma 11.The legitimate nodes in the highway which are around the cluster can achieve w.h.p. a per-node secrecy rate , where () is the "inhomogeneous factor" which is only decided by the inhomogeneous characteristic of the node distribution.
Proof.Compared with the highway in the radial direction, the condition in which data is transmitted around the cluster becomes more complicated since the number of nodes in different highways is not equal.If each highway around the cluster is identical, we can get a corresponding rate of order Ω(√(1 − V) log / 1−V ).Nevertheless, for the effect of inhomogeneous, the achievable rate can be written as , where () is an inhomogeneous factor, and will be discussed in detail in Appendix B.
The delivery phase is a reverse process of the first phase.Therefore, we can get the secrecy rate directly, which is the same order with the draining phase.

Lemma 12.
Every legitimate node can receive information from the highway at rate Comparing the secrecy rate in each phase, we can conclude that the secrecy rate of intracluster transmission is as follows.
Theorem 13.For the intracluster traffic in each independent cluster, the legitimate nodes which are within the area of radius  max can achieve w.h.p. a per-node secrecy rate of Proof.The routing strategy based on percolation theory has been deeply researched.The data transmission within the area of radius  max can be divided into four phases: draining information to the highway; transporting information on the highway of the radial direction; transporting information on the highway around the cluster; and delivering the International Journal of Distributed Sensor Networks information to the destination.We can find that the communication bottleneck is in the highway phase.In addition, for 0 < V < 1, we can get that w.h.p.  2 <  3 (the proof is in Appendix B).Then the per-node secrecy rate in the intracluster transmission can be achieved as

The Secrecy Transmission of Intercluster Traffic
As we consider cluster-sparse network, the node density between two neighboring clusters is much lower.These areas may be disjoint sets that we cannot utilize the highway system mentioned in the previous section.Using the properties of Poisson point process, we extract part of nodes which are distributed like homogeneous Poisson point process with the density of , which is smaller than Φ.Then we can build information pipelines constructed by these nodes among clusters; see Figure 2 for details.The network is divided into a regular lattice and the area of each small square is  0 /Φ, where  0 is a constant.Our strategy of delivering data among clusters is easy to understand and implement.For some special large value  0 , we can extract part of nodes to form "information pipelines, " which is similar to the highways in the homogeneous network.However, due to the inhomogeneous distribution, the number of node in each square is not equal.
In the previous section, we have already derived the secrecy throughput in the cluster area through a circular highway system.In these cluster areas, data is transmitted according to strategy of circular highway system.Only if the information needs to be forwarded to the nodes located in different clusters, the data will be transmitted through the "information pipelines." In light of this scheme, we can obtain the achievable secrecy rate of these pipelines in the network.
According to the percolation theory in [13], we can build Ω(√Φ) pipelines among these clusters.All these pipelines need to serve Θ() clusters.Similar to Lemma 2 in [12], we can also obtain that the interference caused by intercluster transmission is converged, in which the square length is not , but √ 0 /Φ.Since we have computed the interference of intracluster transmission which is converged, we can conclude that the effect caused by interference will not change our results in order sense.Therefore, each cluster can be served by Ω(√Φ/) pipelines w.h.p.Under the analysis of secrecy capacity of homogeneous wireless network in [12], we can get that the rate between legitimate nodes on these pipelines is Ω(√Φ/).Based on the analysis above, we can obtain the following theorem directly.Theorem 14.For the intercluster traffic, one can get that the achievable secrecy rate for legitimate node is    = Ω(√Φ/) = Ω(√Φ/√), where Φ is the minimum node density in the network area.
Comparing the results of intracluster and intercluster transmission, we can find that the bottleneck of the secrecy throughput is in the area with minimum node density.However, the communication traffic in real world always occurs in the local region which may communicate with the node in the same cluster.In other words, the traffic may be inhomogeneous.To deal with such situation, a remarkable contribution of our model is that we set independent transmission models in distinct clusters.Furthermore, the computing for the throughput may be convenient when the traffic is inhomogeneous.As to the inhomogeneous traffic, we can derive the following theorem.
Theorem 15.If one considers the nonuniform traffic in the network, the per-node secrecy rate is in the interval of

Case of Eavesdroppers with Multiple Antennas
In the previous section, we have derived the secrecy throughput in the case of independent eavesdroppers suppressed by artificial noise generation.Regardless of the number and location of eavesdroppers, the results show that there is no loss in the throughput.However, if eavesdroppers are equipped with multiple antennas, what is the secrecy throughput between legitimate nodes?Without loss of generality, we assume eavesdroppers do not collaborate with each other and the correlation across the antennas is ignored, so that the eavesdroppers can employ maximum ratio combining to maximize the SINR.Theorem 16.If eavesdropper is equipped with Ψ() antennas, the per-node secrecy throughput of intracluster transmission is Ω(√1/ 1−V (1 − V) log Ψ −2/ ()) and Ω((√Φ/√)Ψ −2/ ()) for intercluster transmission.
Comparing to the case of eavesdropper equipped with single antenna, there exists a degradation factor for secrecy throughput, which is Ψ −2/ ().Moreover, when the traffic is nonuniform, the secrecy throughput    () is fallen into an interval, which can be denoted as follows:

Conclusion
In this paper, we analyze the secrecy throughput capacity of cluster-sparse network where the legitimate nodes are distributed according to the SNCP.In order to get the secrecy throughput capacity under the independent eavesdroppers with single antenna, the transmission is divided into two parts: the intracluster transmission and the intercluster transmission.For the first part, we novelly establish a circular percolation model and find the bottleneck of secrecy throughput capacity is in the highway phase, where per-node secrecy rate of order Ω(√1/ 1−V (1 − V) log ) is achieved.For the second part, we employ the idea of "information pipelines" to obtain a per-node secrecy rate of Ω(√Φ/√).Taking both transmissions into consideration, the secrecy rate    () is fallen into an interval of [Ω(√Φ/√), Ω(√1/ 1−V (1 − V) log )].
In Figure 3, we depict the order sense of secrecy rate of intracluster and intercluster transmission.Unexpectedly, we find the secrecy throughput in intracluster transmission is greater than that of homogeneous networks.
We also investigate the scenario where eavesdropper is equipped with multiple antennas.If the eavesdropper is equipped with Ψ() antennas and do not collaborate with each other, the secrecy throughput of intracluster transmission is Ω(√1/ 1−V (1 − V) log Ψ −2/ ()) and Ω((√Φ/√)Ψ −2/ ()) for intercluster transmission.Similarly, when the traffic is nonuniform, the secrecy throughput    () is fallen into an interval, which can be denoted as follows: Finally, we do not consider the case of eavesdroppers collaborating with each other.What is more is that the secrecy throughput is strongly correlated to the distribution of nodes.Therefore, it is an interesting future work to study the scenario of colluding eavesdroppers, where the distribution of legitimate nodes and eavesdroppers will impact the secrecy throughput greatly.

A. The Proof of Theorem 7
Proof.We show the convergence of the summation of (17).As we consider the asymptotic situation, we can simply this summation and just need to prove the convergence of summation ∑ ∞ =1  1− (1 + 2/) 2(+) .Firstly, we analyze (1 + 2/) 2(+) , and  is presented in Lemma 2. Thus we can get the following: is equipped with single antenna, and we also give a comparison with that in [12].The scales of the axes are in terms of the order in .
For  > 2, we can prove that the summation ( 17) is convergence.

B. The Proof of Theorem 13
Proof.Here we give a rigorous deduction of the achievable rate during the highway phase in the intracluster transmission.According to the circular percolation theory, we need to compare the rates on the highway of radial direction and around the cluster.The rate on radial direction is easy to get and has been proved in Lemma 10.We will calculate the rate of the highway around the cluster.As the number of nodes on different paths is not in the same level, the condition along the circular ring is more sophisticated with respect to the radial direction.According to the analysis above, we use (  ) which denotes the mathematical expectation number of nodes in each circular ring.Then we can achieve the expectation from our model and simplify it as follows: As for  > 2, we can find that (  ) decreases as increasing of parameter .Thus the circular highways near the cluster center need to service more nodes.Then we can get the achievable rate on the circular highway: ) .

(B.3)
In the end, comparing the  2 and  3 , we can find that  2 <  3 , for  > 2; that is, the secrecy rate bottleneck is on the highway phase of radial direction.

Figure 1 :
Figure1: Section of circular lattice and a schematic representation of the routing scheme.In each phase we use point-to-point coding and decoding on each Gaussian channel between transmitters and receivers and design an appropriate time schedule for transmission.The crosses denote the eavesdroppers.

Figure 2 :
Figure 2: An illustration of information pipelines among cluster.As the minimum legitimate node density is Φ, we can build Ω(√Φ) pipelines among these clusters.

√𝑛 1 −Figure 3 :
Figure3: An illustration of secrecy throughput of intracluster transmission and intercluster transmission when the eavesdropper is equipped with single antenna, and we also give a comparison with that in[12].The scales of the axes are in terms of the order in .
to substitute   , we can get  (  )