메뉴 건너뛰기




Volumn 22, Issue 1, 2014, Pages 66-79

Asymptotic analysis on secrecy capacity in large-scale wireless networks

Author keywords

Scaling law; Secrecy capacity

Indexed keywords


EID: 84894743905     PISSN: 10636692     EISSN: None     Source Type: Journal    
DOI: 10.1109/TNET.2013.2244230     Document Type: Article
Times cited : (41)

References (33)
  • 1
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C. E. Shanon, "Communication theory of secrecy systems," J. Bell Syst. Tech., vol. 28, pp. 656-715, 1948.
    • (1948) J. Bell Syst. Tech , vol.28 , pp. 656-715
    • Shanon, C.E.1
  • 2
    • 0016562514 scopus 로고
    • The wire-tap channel
    • Oct
    • A. D. Wyner, "The wire-tap channel," J. Bell Sys. Tech., vol. 54, no. 8, pp. 1355-1367, Oct. 1975.
    • (1975) J. Bell Sys. Tech , vol.54 , Issue.8 , pp. 1355-1367
    • Wyner, A.D.1
  • 3
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • Jul
    • I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. IT-24, no. 3, pp. 339-348, Jul. 1978.
    • (1978) IEEE Trans. Inf. Theory , vol.IT-24 , Issue.3 , pp. 339-348
    • Csiszár, I.1    Körner, J.2
  • 4
    • 52349086199 scopus 로고    scopus 로고
    • The secrecy graph and some of its properties
    • Toronto, ON, Canada, Jul
    • M. Haenggi, "The secrecy graph and some of its properties," in Proc. IEEE ISIT, Toronto, ON, Canada, Jul. 2008, pp. 539-543.
    • (2008) Proc. IEEE ISIT , pp. 539-543
    • Haenggi, M.1
  • 5
    • 85015762550 scopus 로고    scopus 로고
    • Wireless secrecy in large-scale networks
    • Feb
    • P. C. Pinto, J. Barros, and M. Z. Win, "Wireless secrecy in large-scale networks," in Proc. IEEE ITA, Feb. 2011, pp. 1-10.
    • (2011) Proc. IEEE ITA , pp. 1-10
    • Pinto, P.C.1    Barros, J.2    Win, M.Z.3
  • 6
    • 45849133457 scopus 로고    scopus 로고
    • Guaranteeing secrecy using artificial noise
    • Jun
    • S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, Jun. 2008.
    • (2008) IEEE Trans. Wireless Commun , vol.7 , Issue.6 , pp. 2180-2189
    • Goel, S.1    Negi, R.2
  • 7
    • 70349668660 scopus 로고    scopus 로고
    • On cooperativewireless network secrecy
    • Rio de Janeiro, Brazil, Apr
    • E. Perron, S. Diggavi, and E. Telatar, "On cooperativewireless network secrecy," in Proc. IEEE INFOCOM, Rio de Janeiro, Brazil, Apr. 2009, pp. 1935-1943.
    • (2009) Proc. IEEE INFOCOM , pp. 1935-1943
    • Perron, E.1    Diggavi, S.2    Telatar, E.3
  • 8
    • 66949180834 scopus 로고    scopus 로고
    • A note on the secrecy capacity of the multiple antenna wiretap channel
    • Jun
    • T. Liu and S. Shamai, "A note on the secrecy capacity of the multiple antenna wiretap channel," IEEE Trans. Inf. Theory, vol. 55, no. 6, pp. 2547-2553, Jun. 2009.
    • (2009) IEEE Trans. Inf. Theory , vol.55 , Issue.6 , pp. 2547-2553
    • Liu, T.1    Shamai, S.2
  • 9
    • 77958560746 scopus 로고    scopus 로고
    • Secure transmission with multiple antennas- Part II: The MIMOME wiretap channel
    • Nov
    • A. Khist and G. W. Wornell, "Secure transmission with multiple antennas- Part II: The MIMOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515-5532, Nov. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.11 , pp. 5515-5532
    • Khist, A.1    Wornell, G.W.2
  • 11
    • 80054124220 scopus 로고    scopus 로고
    • Delay and capacity tradeoff analysis for motioncast
    • Oct
    • X. Wang, W. Huang, S. Wang, J. Zhang, and C. Hu, "Delay and capacity tradeoff analysis for motioncast," IEEE/ACM Trans. Netw., vol. 19, no. 5, pp. 1354-1367, Oct. 2011.
    • (2011) IEEE/ACM Trans. Netw , vol.19 , Issue.5 , pp. 1354-1367
    • Wang, X.1    Huang, W.2    Wang, S.3    Zhang, J.4    Hu, C.5
  • 12
    • 78649282396 scopus 로고    scopus 로고
    • Security-capacity trade-off in large wireless networks using keyless secrecy
    • Chicago, IL, USA, Sep
    • S. Vasudevan, D. Goeckel, and D. Towsley, "Security-capacity trade-off in large wireless networks using keyless secrecy," in Proc. ACM MobiHoc, Chicago, IL, USA, Sep. 2010, pp. 21-30.
    • (2010) Proc. ACM MobiHoc , pp. 21-30
    • Vasudevan, S.1    Goeckel, D.2    Towsley, D.3
  • 13
    • 84860255627 scopus 로고    scopus 로고
    • On secrecy capacity scaling in wireless networks
    • May
    • O. Koyluoglu, E. Koksal, and E. Gammel, "On secrecy capacity scaling in wireless networks," IEEE Trans. Inf. Theory, vol. 58, no. 5, pp. 3000-3015, May 2012.
    • (2012) IEEE Trans. Inf. Theory , vol.58 , Issue.5 , pp. 3000-3015
    • Koyluoglu, O.1    Koksal, E.2    Gammel, E.3
  • 15
    • 84861585672 scopus 로고    scopus 로고
    • Impact of secrecy on capacity in largescale wireless networks
    • Orlando, FL, USA, Mar
    • J. Zhang, L. Fu, and X. Wang, "Impact of secrecy on capacity in largescale wireless networks," in Proc. IEEE INFOCOM Mini Conf., Orlando, FL, USA, Mar. 2012, pp. 3051-3055.
    • (2012) Proc. IEEE INFOCOM Mini Conf , pp. 3051-3055
    • Zhang, J.1    Fu, L.2    Wang, X.3
  • 16
    • 80053983111 scopus 로고    scopus 로고
    • Secrecy throughput of MANETs under passive and active attacks
    • Oct
    • Y. Liang, H. V. Poor, and L. Ying, "Secrecy throughput of MANETs under passive and active attacks," IEEE Trans. Inf. Theory, vol. 57, no. 10, pp. 6692-6702, Oct. 2011.
    • (2011) IEEE Trans. Inf. Theory , vol.57 , Issue.10 , pp. 6692-6702
    • Liang, Y.1    Poor, H.V.2    Ying, L.3
  • 17
    • 78649281129 scopus 로고    scopus 로고
    • Achieving single channel, full duplex wireless communication
    • Chicago, IL, USA, Sep
    • J. I. Choiy,M. Jainy, K. Srinivasany, P. Levis, and S. Katti, "Achieving single channel, full duplex wireless communication," in Proc. ACM MobiCom, Chicago, IL, USA, Sep. 2010, pp. 1-12.
    • (2010) Proc. ACM MobiCom , pp. 1-12
    • Choiy, J.I.1    Jainy, M.2    Srinivasany, K.3    Levis, P.4    Katti, S.5
  • 18
    • 33747142749 scopus 로고    scopus 로고
    • The capacity of wireless networks
    • Mar
    • P. Gupta and P. Kumar, "The capacity of wireless networks," IEEE Trans. Inf. Theory, vol. 46, no. 2, pp. 388-404, Mar. 2000.
    • (2000) IEEE Trans. Inf. Theory , vol.46 , Issue.2 , pp. 388-404
    • Gupta, P.1    Kumar, P.2
  • 19
    • 20544449224 scopus 로고    scopus 로고
    • Capacity and delay tradeoffs for ad hoc mobile networks
    • DOI 10.1109/TIT.2005.847717
    • M. J. Neely and E. Modiano, "Capacity and delay tradeoffs for ad hoc mobile networks," IEEE Trans. Inf. Theory, vol. 51, no. 6, pp. 1917-1937, Jun. 2005. (Pubitemid 40843617)
    • (2005) IEEE Transactions on Information Theory , vol.51 , Issue.6 , pp. 1917-1937
    • Neely, M.J.1    Modiano, E.2
  • 20
    • 33947689700 scopus 로고    scopus 로고
    • Closing the gap in the capacity of wireless networks via percolation theory
    • DOI 10.1109/TIT.2006.890791
    • M. Franceschetti, O. Dousse, D. N. Tse, and P. Thiran, "Closing the gap in the capacity of wireless networks via percolation theory," IEEE Trans. Inf. Theory, vol. 53, no. 3, pp. 1009-1018, Mar. 2007. (Pubitemid 46487788)
    • (2007) IEEE Transactions on Information Theory , vol.53 , Issue.3 , pp. 1009-1018
    • Franceschetti, M.1    Dousse, O.2    Tse, D.N.C.3    Thiran, P.4
  • 21
    • 70350528794 scopus 로고    scopus 로고
    • Capacity scaling in ad hoc networks with heterogeneous mobile nodes: The super-critical regime
    • Oct
    • M. Garetto, P. Giaccone, and E. Leonardi, "Capacity scaling in ad hoc networks with heterogeneous mobile nodes: The super-critical regime," IEEE/ACM Trans. Netw., vol. 17, no. 5, pp. 1522-1535, Oct. 2009.
    • (2009) IEEE/ACM Trans. Netw , vol.17 , Issue.5 , pp. 1522-1535
    • Garetto, M.1    Giaccone, P.2    Leonardi, E.3
  • 22
    • 79955482990 scopus 로고    scopus 로고
    • On the price of security in large-scale wireless ad hoc networks
    • Apr
    • C. Zhang, Y. Song, Y. Fang, and Y. Zhang, "On the price of security in large-scale wireless ad hoc networks," IEEE/ACM Trans. Netw., vol. 19, no. 2, pp. 319-332, Apr. 2011.
    • (2011) IEEE/ACM Trans. Netw , vol.19 , Issue.2 , pp. 319-332
    • Zhang, C.1    Song, Y.2    Fang, Y.3    Zhang, Y.4
  • 23
    • 0036670170 scopus 로고    scopus 로고
    • Mobility increases the capacity of ad hoc wireless networks
    • DOI 10.1109/TNET.2002.801403, PII 1011092002801403
    • M. Grossglauser and D. N. C. Tse, "Mobility increases the capacity of ad hoc wireless networks," IEEE/ACM Trans. Netw., vol. 10, no. 4, pp. 477-486, Aug. 2002. (Pubitemid 35000391)
    • (2002) IEEE/ACM Transactions on Networking , vol.10 , Issue.4 , pp. 477-486
    • Grossglauser, M.1    Tse, D.N.C.2
  • 24
    • 67650114837 scopus 로고    scopus 로고
    • Multicast capacity of wireless ad hoc networks
    • Jun
    • X. Li, "Multicast capacity of wireless ad hoc networks," IEEE/ACM Trans. Netw., vol. 17, no. 3, pp. 950-961, Jun. 2009.
    • (2009) IEEE/ACM Trans. Netw , vol.17 , Issue.3 , pp. 950-961
    • Li, X.1
  • 25
    • 79955458079 scopus 로고    scopus 로고
    • Multicast throughput for hybrid wireless networks under Gaussian channel model
    • Jun
    • C. Wang, X. Li, C. Jiang, S. Tang, and Y. Liu, "Multicast throughput for hybrid wireless networks under Gaussian channel model," IEEE Trans. Mobile Comput., vol. 10, no. 6, pp. 839-852, Jun. 2011.
    • (2011) IEEE Trans. Mobile Comput , vol.10 , Issue.6 , pp. 839-852
    • Wang, C.1    Li, X.2    Jiang, C.3    Tang, S.4    Liu, Y.5
  • 26
    • 84863555856 scopus 로고    scopus 로고
    • Closing the gap in the multicast capacity of hybrid wireless networks
    • S. Tang, X. Mao, T. Jung, J. Han, X. Li, B. Xu, and C. Ma, "Closing the gap in the multicast capacity of hybrid wireless networks," in Proc. ACM MobiHoc, 2012, pp. 135-144.
    • (2012) Proc. ACM MobiHoc , pp. 135-144
    • Tang, S.1    Mao, X.2    Jung, T.3    Han, J.4    Li, X.5    Xu, B.6    Ma, C.7
  • 27
    • 37849009714 scopus 로고    scopus 로고
    • Capacity of a wireless ad hoc network with infrastructure
    • B. Liu, P. Thiran, and D. Towsley, "Capacity of a wireless ad hoc network with infrastructure," in Proc. ACM MobiHoc, 2007, pp. 239-246.
    • (2007) Proc. ACM MobiHoc , pp. 239-246
    • Liu, B.1    Thiran, P.2    Towsley, D.3
  • 28
    • 35148893949 scopus 로고    scopus 로고
    • Hierarchical cooperation achieves optimal capacity scaling in Ad Hoc networks
    • DOI 10.1109/TIT.2007.905002, Special issue on Models, Theory, and Codes for Relaying and Cooperation in Communication Network
    • A. Özgür, O. Lévêque, and D. N. C. Tse, "Hierarchical cooperation achieves optimal capacity scaling in ad hoc networks," IEEE Trans. Inf. Theory, vol. 53, no. 10, pp. 3549-3572, Oct. 2007. (Pubitemid 47534513)
    • (2007) IEEE Transactions on Information Theory , vol.53 , Issue.10 , pp. 3549-3572
    • Ozgur, A.1    Leveque, O.2    Tse, D.N.C.3
  • 30
    • 33745136745 scopus 로고    scopus 로고
    • Degenerate delay-capacity tradeoffs in Ad-Hoc networks with Brownian mobility
    • DOI 10.1109/TIT.2006.874544
    • X. Lin, G. Sharma, R. R. Mazumdar, and N. B. Shroff, "Degenerate delay-capacity trade-offs in ad hoc networks with Brownian mobility," IEEE Trans. Inf. Theory, vol. 52, no. 6, pp. 2777-2784, Jun. 2006. (Pubitemid 43898925)
    • (2006) IEEE Transactions on Information Theory , vol.52 , Issue.6 , pp. 2777-2784
    • Lin, X.1    Sharma, G.2    Mazumdar, R.R.3    Shroff, N.B.4
  • 31
    • 0025383763 scopus 로고
    • A guided tour of Chernoff bounds
    • Feb
    • T. Hagerup and C. Rüb, "A guided tour of Chernoff bounds," Inf. Process. Lett., vol. 33, no. 6, pp. 305-308, Feb. 1990.
    • (1990) Inf. Process. Lett , vol.33 , Issue.6 , pp. 305-308
    • Hagerup, T.1    Rüb, C.2
  • 32
    • 4143112460 scopus 로고    scopus 로고
    • Throughput-delay trade-off inwireless networks
    • Hong Kong, China, Mar
    • A. Gamal, J. Mammen, B. Prabhakar, and D. Shah, "Throughput-delay trade-off inwireless networks," in Proc. IEEE INFOCOM,Hong Kong, China, Mar. 2004, pp. 464-475.
    • (2004) Proc. IEEE INFOCOM , pp. 464-475
    • Gamal, A.1    Mammen, J.2    Prabhakar, B.3    Shah, D.4
  • 33
    • 33947698356 scopus 로고    scopus 로고
    • Throughput and delay in random wireless networks with restricted mobility
    • DOI 10.1109/TIT.2006.890720
    • J. Mammen and D. Shah, "Throughput and delay in random wireless networks with restricted mobility," IEEE Trans. Inf. Theory, vol. 53, no. 3, pp. 1108-1116, Mar. 2007. (Pubitemid 46487795)
    • (2007) IEEE Transactions on Information Theory , vol.53 , Issue.3 , pp. 1108-1116
    • Mammen, J.1    Shah, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.