Go to:
Logótipo
Comuta visibilidade da coluna esquerda
Você está em: Start > Publications > View > Secure Communication in Stochastic Wireless Networks - Part I: Connectivity
Publication

Publications

Secure Communication in Stochastic Wireless Networks - Part I: Connectivity

Title
Secure Communication in Stochastic Wireless Networks - Part I: Connectivity
Type
Article in International Scientific Journal
Year
2012
Authors
P. Pinto
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
M. Win
(Author)
FEUP
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
Journal
Vol. 7 No. 1
Pages: 125-138
ISSN: 1556-6013
Publisher: IEEE
Indexing
Publicação em ISI Web of Science ISI Web of Science
Scientific classification
FOS: Engineering and technology > Other engineering and technologies
Other information
Abstract (EN): The ability to exchange secret information is critical to many commercial, governmental, and military networks. Information-theoretic security-widely accepted as the strictest notion of security-relies on channel coding techniques that exploit the inherent randomness of the propagation channels to strengthen the security of digital communications systems. Motivated by recent developments in the field, we aim to characterize the fundamental secrecy limits of wireless networks. The paper is comprised of two separate parts. In Part I, we define the intrinsically secure communications graph (iS-graph), a random graph which describes the connections that can be securely established over a large-scale network. We provide conclusive results for the local connectivity of the Poisson iS-graph, in terms of node degrees and isolation probabilities. We show how the secure connectivity of the network varies with the wireless propagation effects, the secrecy rate threshold of each link, and the noise powers of legitimate nodes and eavesdroppers. We then propose sectorized transmission and eavesdropper neutralization as viable strategies for improving the secure connectivity. Our results help clarify how the spatial density of eavesdroppers can compromise the intrinsic security of wireless networks. In Part II of the paper, we study the achievable secrecy rates and the effect of eavesdropper collusion.
Language: English
Type (Professor's evaluation): Scientific
Documents
We could not find any documents associated to the publication.
Related Publications

Of the same authors

Secure Communication in Stochastic Wireless Networks - Part II: Maximum Rate and Collusion (2012)
Article in International Scientific Journal
P. Pinto; J. Barros; M. Win

Of the same journal

Wireless Secrecy Regions With Friendly Jamming (2011)
Article in International Scientific Journal
J. P. Vilela; M. Bloch; J. Barros; S. W. McLaughlin
Uncoordinated Frequency Hopping for Wireless Secrecy Against Non-Degraded Eavesdroppers (2018)
Article in International Scientific Journal
Sá Sousa, J; João P. Vilela
Secure Communication in Stochastic Wireless Networks - Part II: Maximum Rate and Collusion (2012)
Article in International Scientific Journal
P. Pinto; J. Barros; M. Win
Secrecy Transmission on Parallel Channels: Theoretical Limits and Performance of Practical Codes (2014)
Article in International Scientific Journal
Baldi, M; Chiaraluce, F; Laurenti, N; Tomasin, S; Renna, F
Position-Based Jamming for Enhanced Wireless Secrecy (2011)
Article in International Scientific Journal
J. P. Vilela; Pedro Pinto; J. Barros

See all (11)

Recommend this page Top
Copyright 1996-2025 © Faculdade de Direito da Universidade do Porto  I Terms and Conditions  I Acessibility  I Index A-Z
Page created on: 2025-07-28 at 08:36:59 | Privacy Policy | Personal Data Protection Policy | Whistleblowing