Chorti, Arsenia and Perlaza, Samir M and Han, Zhu and Poor, H Vincent (2012) Physical layer security in wireless networks with passive and active eavesdroppers. In: GLOBECOM 2012 - 2012 IEEE Global Communications Conference, 2012-12-03 - 2012-12-07.
Chorti, Arsenia and Perlaza, Samir M and Han, Zhu and Poor, H Vincent (2012) Physical layer security in wireless networks with passive and active eavesdroppers. In: GLOBECOM 2012 - 2012 IEEE Global Communications Conference, 2012-12-03 - 2012-12-07.
Chorti, Arsenia and Perlaza, Samir M and Han, Zhu and Poor, H Vincent (2012) Physical layer security in wireless networks with passive and active eavesdroppers. In: GLOBECOM 2012 - 2012 IEEE Global Communications Conference, 2012-12-03 - 2012-12-07.
Abstract
Security is becoming an increasingly important issue in wireless communications, to which physical layer approaches can contribute by providing addition resources for securing confidential messages. In this paper, the resilience of multi-user networks to passive and active eavesdropping is investigated. In particular, average secrecy capacities are evaluated in scenarios involving a base station and several terminals, some of which constitute passive or active eavesdroppers. Network resources (e.g. power) are allocated by the base station based on the available channel state information. The average secrecy capacity of such a network is evaluated in the following cases: (i) in the presence of passive eavesdroppers when no side information is available to the base station; (ii) in the presence of passive eavesdroppers with side information available; and (iii) in the presence of a single active eavesdropper with side information available. This investigation demonstrates that substantial secrecy rates are attainable in the presence of passive eavesdroppers as long as minimal side information, e.g. a statistical characterization of the number of potential eavesdroppers, is available to the base station. On the other hand, it is further found that active eavesdroppers can potentially compromise such networks unless statistical inference is employed to restrict their ability to attack. © 2012 IEEE.
Item Type: | Conference or Workshop Item (Paper) |
---|---|
Additional Information: | Published proceedings: GLOBECOM - IEEE Global Telecommunications Conference |
Subjects: | Q Science > QA Mathematics > QA75 Electronic computers. Computer science |
Divisions: | Faculty of Science and Health Faculty of Science and Health > Computer Science and Electronic Engineering, School of |
SWORD Depositor: | Unnamed user with email elements@essex.ac.uk |
Depositing User: | Unnamed user with email elements@essex.ac.uk |
Date Deposited: | 12 Jan 2015 13:41 |
Last Modified: | 30 Oct 2024 16:40 |
URI: | http://repository.essex.ac.uk/id/eprint/9189 |