Slides PPT

advertisement

Impact of Secrecy on Capacity in Large-Scale

Wireless Networks

Jinbei Zhang, Luoyifu, Xinbing Wang

Department of Electronic Engineering

Shanghai Jiao Tong University

Mar 15, 2012

Outline

 Introduction

 Motivations

 Related works

 Objectives

 Network Model and Definition

 Secrecy Capacity for Independent Eavesdroppers

 Secrecy Capacity for Colluding Eavesdroppers

 Discussion

 Conclusion and Future Work

Impact of Secrecy on Capacity in Large-Scale Wireless Networks 2

Motivations

 Secrecy is a Major Concern in Wireless Networks.

 Mobile Phone Wallet

 Military networks

 …

Impact of Secrecy on Capacity in Large-Scale Wireless Networks 3

Related works – I/II

 Properties of Secrecy Graph

Cited From [5] Cited From [5]

[4] M. Haenggi

, “The Secrecy Graph and Some of Its Properties”, in Proc. IEEE ISIT,

Toronto, Canada, July 2008.

[5] P. C. Pinto, J. Barros, M. Z. Win, “Wireless Secrecy in Large-Scale Networks.” in Proc.

IEEE ITA’11, California, USA, Feb. 2011.

Impact of Secrecy on Capacity in Large-Scale Wireless Networks 4

Related works – II/II

 Secrecy Capacity in large-scale networks,

 Mobile Networks [16]

 Guard Zone [13]

 Artificial Noise+Fading Gain(CSI needed) [12]

Cited from [12]

[16] Y. Liang, H. V. Poor and L. Ying, “Secrecy Throughput of MANETs under Passive and

Active Attacks”, in IEEE Trans. Inform. Theory, Vol. 57, No. 10, Oct. 2011.

[13] O. Koyluoglu, E. Koksal, E. Gammel , “On Secrecy Capacity Scaling in Wireless

Networks”, submitted to IEEE Trans. Inform. Theory, Apr. 2010.

[12] S. Vasudevan, D. Goeckel and D. Towsley

, “Security-capacity Trade-off in Large

Wireless Networks using Keyless Secrecy”, in Proc. ACM MobiHoc, Chicago, Illinois, USA,

Sept. 2010.

Impact of Secrecy on Capacity in Large-Scale Wireless Networks 5

Objectives

 Several questions arise:

 CSI information is difficult to obtain

 Artificial noises also degrade legitimate receivers’ channels

 Cost on capacity is quite large to utilize fading gain

 What’s the upper bound of secrecy capacity?

 What’s the impact of other network models?

Impact of Secrecy on Capacity in Large-Scale Wireless Networks 6

Outline

 Introduction

 Network Model and Definition

 Secrecy Capacity for Independent Eavesdroppers

 Secrecy Capacity for Colluding Eavesdroppers

 Discussion

 Conclusion and Future Work

Impact of Secrecy on Capacity in Large-Scale Wireless Networks 7

Network Model and Definition – I/II

 Legitimate Nodes:

 Self-interference cancelation[16] adopted

 3 antennas per-node

 CSI information unknown

 Eavesdroppers:

 Location positions unknown

 CSI information unknown

Cited from [17]

[17] J. I. Choiy, M. Jainy, K. Srinivasany, P. Levis and S. Katti

, “Achieving Single Channel,

Full Duplex Wireless Communication”, in ACM Mobicom’10, Chicago, USA, Sept. 2010.

Impact of Secrecy on Capacity in Large-Scale Wireless Networks 8

Network Model and Definition – II/II

 Network Model:

 Extended networks

 Static

 Physical channel model

SINR ij

N

0

 

\{ }

Pl x x t

( , i j

)

Pl x x t

( , ) k j

 

SINR ie

N

0

 

\{ }

( , e

)

Pl x x t

( , k e

)

 

P l x x r

( , k e

)

P l x x r

( , k j

) where l x x i j

)

 min(1, d

  ij

)

 Definition of secrecy capacity

R s ij

R ij

R ie

 log (1

2

SINR ij where SINR ie

 max e

 

SINR ie

2

SINR ie

)

Impact of Secrecy on Capacity in Large-Scale Wireless Networks 9

Outline

 Introduction

 Network Model and Definition

 Secrecy Capacity for Independent Eavesdroppers

 Lower Bound

 Upper Bound

 Secrecy Capacity for Colluding Eavesdroppers

 Discussion

 Conclusion and Future Work

Impact of Secrecy on Capacity in Large-Scale Wireless Networks 10

Independent Eavesdroppers

 Capacity for Eavesdroppers

Lemma 1: When a legitimate node t is transmitting to a legitimate receiver r , the maximum rate that an independent eavesdropper e can obtain is upper-bounded by

R e

 min(

Pd

  t te ,

P

N P

0 r t (1

 d tr

) )

Received Power d is the Euclidean distance between legitimate node t and node r d t and eavesdropper e .

Impact of Secrecy on Capacity in Large-Scale Wireless Networks 11

Independent Eavesdroppers

SINR e

N

0

 

\{ } r

( ,

P d t te

) P

P t

( , t e

)

P r

( d rt

 d te

)

 

Pl x x t

( , t e

)

Pl x x t

( , k e

) d   t te

  r d re

P

P t r

(1

 d

 tr

)

P l x x r

( , k e

)

Impact of Secrecy on Capacity in Large-Scale Wireless Networks 12

Independent Eavesdroppers

 Capacity for Legitimate Nodes

Lemma 2: When a legitimate node t is transmitting to a legitimate receiver which is located d cells apart, the minimum rate that the c Pd

  c is a constant.

( )

 log(1

N

0

I d

)

( (

1)) t

  log(1

' c P c d

2 t

( (

1))

  c Pd

2 t

N

0

 c P

 t

P r

)( kc )

 

)

 

( P r

1

) c

Impact of Secrecy on Capacity in Large-Scale Wireless Networks 13

Independent Eavesdroppers

 Secrecy Capacity for Each Cell

Theorem 1: For any legitimate transmitter-receiver pair which is

( )

 

( d

4 so that the receiver can receive at a rate of securely from s the transmitter.

s

1

( k

 d )

2

1

( k

 d ) 2

( ( )

R e

)

( c Pd

2 t

   c

3

P

P r t d

)

Choose

P r

2 c

3 c

2 d

2

 s

( )

 

( d k P r

1

 

( )

 

( d

2

)

4 )

Impact of Secrecy on Capacity in Large-Scale Wireless Networks 14

Independent Eavesdroppers

 Highway System

 Draining Phase

 Highway Phase

 Delivery Phase s

( )

 

( d

4

)

Theorem 2: With n legitimate nodes poisson distributed, the achievable per-node secrecy throughput under the existence of

(

1 independent eavesdroppers is .

n

)

Impact of Secrecy on Capacity in Large-Scale Wireless Networks 15

Independent Eavesdroppers

 Optimality of Our Scheme

Theorem 2 : When n nodes is identically and randomly located in a wireless network and source-destination pairs are randomly chosen, the pernode throughput λ(n) is upper bounded by .

n

)

[18] P. Gupta and P. Kumar, “The Capacity of Wireless Networks”, in IEEE Trans. Inform.

Theory, Vol. 46, No. 2, pp. 388-404, Mar. 2000.

Impact of Secrecy on Capacity in Large-Scale Wireless Networks 16

Outline

 Introduction

 Network Model and Definition

 Secrecy Capacity for Independent Eavesdroppers

 Secrecy Capacity for Colluding Eavesdroppers

 Lower Bound

 Upper Bound

 Discussion

 Conclusion and Future Work

Impact of Secrecy on Capacity in Large-Scale Wireless Networks 17

Colluding Eavesdroppers

 Eavesdroppers Collude

 Assume that the eavesdropper can employ maximum ratio combining to maximize the SINR which means that the correlation across the antennas is ignored.

Theorem 4: If eavesdroppers are equipped with A(n) antennas, the

 s n

( )

2 per-node secrecy capacity is .

n

Impact of Secrecy on Capacity in Large-Scale Wireless Networks 18

Colluding Eavesdroppers

 Eavesdroppers Collude

 Assume that each eavesdropper equipped with one antenna and different eavesdroppers can collude to decode the message.

SI NR e

SI NR ei

R e

 min(

Pd

  t te ,

P

N P

0 r t (1

 d tr

) ) j

 e 1

SI NR

1 j



  i

2 j

 ei

SI NR i j

 e e 1

 i



2

 e ei f n

 e n

P

P r t (1

2

 e n r

1

2

P t

P r

(1

 d r t

)

 d r t

)

 i



2

P t

N

0 f n

 e n r

1

2

  i



1 i

Pr t i

 

1

2 )

N

0

Impact of Secrecy on Capacity in Large-Scale Wireless Networks 19

Colluding Eavesdroppers

 Lower Bound

Theorem 5: Consider the wireless network B where legitimate nodes and eavesdroppers are independent poisson distributed with parameter 1 and

 e n respectively, the per-node secrecy capacity is

 s n

(

1

 e n

2

2 ) ,

 e n

 

( l og

 



 n

(

1 n l og

2

 n ) , e n

O ( l og

 

2

 n

2

) n )

Impact of Secrecy on Capacity in Large-Scale Wireless Networks 20

Colluding Eavesdroppers

 Lower Bound

 e

( )= (

 

) any constant β>0, partitioning the network into disjoint regions with

N constant size c and denoting by the number of nodes inside region i, e i we have

( ei

 v ,

 i )

1 where v

+1

Theorem 6: If eavesdroppers are poisson-distributed in the network with intensity for any constant β>0, the per-node secrecy e capacity is . n

Impact of Secrecy on Capacity in Large-Scale Wireless Networks 21

Colluding Eavesdroppers

 Upper Bound

N ei

1

2

 e n k 2

SI NR e

 

J

S j

N

0

I j

N ei

3 k

( )

4

 

N

0

I j c

11

 e n k

2

  k

  e n

1

2

Impact of Secrecy on Capacity in Large-Scale Wireless Networks

 s n

 

(

1

2 k n

)

22

Colluding Eavesdroppers

 Upper Bound

Theorem 7: Consider the wireless network B where legitimate nodes and eavesdroppers are independent poisson distributed with parameter 1 and respectively, the per-node secrecy capacity is

 s n

 O (

1

 e

 n

2

2 ) ,

 e

 

 O n

(

1

) , ( )

(1) e n O n n

 

(1)

Impact of Secrecy on Capacity in Large-Scale Wireless Networks 23

Outline

 Introduction

 Network Model and Definition

 Secrecy Capacity for Independent Eavesdroppers

 Secrecy Capacity for Colluding Eavesdroppers

 Discussion

 Conclusion and Future Work

Impact of Secrecy on Capacity in Large-Scale Wireless Networks 24

Discussions

 Secrecy Capacity in Random Networks

 Random networks: total node number is given

 Poisson networks: node numbers in different regions are independent

 When n goes to infinity, they are the same in the sense of probability

 Our results still hold in random networks

[27] M. Penrose, “Random Geometric Graphs”, Oxford Univ. Press, Oxford, U.K., 2003.

Impact of Secrecy on Capacity in Large-Scale Wireless Networks 25

Discussions

 Multicast Secrecy Capacity

[24] X. Li, “Multicast Capacity of Wireless Ad Hoc Networks”, in IEEE/ACM Trans.

Networking, Vol. 17, No. 3, pp. 950-961, 2009.

Impact of Secrecy on Capacity in Large-Scale Wireless Networks 26

Discussions

 Secrecy Capacity in i.i.d Mobility Networks

[19] M. J. Neely and E. Modiano

, “Capacity and Delay Tradeoffs for Ad Hoc Mobile

Networks”, in IEEE Trans. Inform. Theory, Vol. 51, No. 6, pp. 1917-1937, 2005..

Impact of Secrecy on Capacity in Large-Scale Wireless Networks 27

Discussions

 Secrecy Capacity under Random Walk Networks

[30] A. Gamal, J. Mammen, B. Prabhakar

, and D. Shah, “Throughput-delay trade-off in wireless networks”, In Proceeding of IEEE INFOCOM, Hong Kong, China, Mar. 2004.

Impact of Secrecy on Capacity in Large-Scale Wireless Networks 28

Outline

 Introduction

 Network Model and Definition

 Secrecy Capacity for Independent Eavesdroppers

 Secrecy Capacity for Colluding Eavesdroppers

 Discussion

 Conclusion and Future Work

Impact of Secrecy on Capacity in Large-Scale Wireless Networks 29

Conclusions

 In the non-colluding case, the optimal per-node secrecy capacity is achievable in the presence of eavesdroppers.

 In the colluding case, we establish the relationship between the secrecy capacity and the tolerable number of eavesdroppers. More importantly, we first derive the upper bound for secrecy capacity which is achievable.

 We identify the underlying interference model to capture the fundamental impact of secrecy constraints. This model relies weakly on the specific settings such as traffic pattern and mobility models of legitimate nodes. Hence, our study can be flexibly applied to more general cases and shed insights into the design and analysis of future wireless networks.

Impact of Secrecy on Capacity in Large-Scale Wireless Networks 30

Future Work

 Secrecy capacity under active attacks

 The impact of dense networks

 The impact of heterogeneity networks

 The impact of social networks

Impact of Secrecy on Capacity in Large-Scale Wireless Networks 31

Thank you !

Backup

 Details on the Models of Legitimate nodes

 Revolve on its own

 Using 4 antennas

Impact of Secrecy on Capacity in Large-Scale Wireless Networks 33

Download