Koyluoglu et al., 2012 - Google Patents
On secrecy capacity scaling in wireless networksKoyluoglu et al., 2012
View PDF- Document ID
- 15671459110390779648
- Author
- Koyluoglu O
- Koksal C
- El Gamal H
- Publication year
- Publication venue
- IEEE Transactions on Information Theory
External Links
Snippet
This paper studies the achievable secure rate per source-destination pair in wireless networks. First, a path loss model is considered, where the legitimate and eavesdropper nodes are assumed to be placed according to Poisson point processes with intensities λ and …
- 238000005562 fading 0 abstract description 38
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/04—Large scale networks; Deep hierarchical networks
- H04W84/042—Public Land Mobile systems, e.g. cellular systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/065—Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organizing networks, e.g. ad-hoc networks or sensor networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/14—Relay systems
- H04B7/15—Active relay systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
- H04W4/06—Selective distribution or broadcast application services; Mobile application services to user groups; One-way selective calling services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W72/00—Local resource management, e.g. wireless traffic scheduling or selection or allocation of wireless resources
- H04W72/04—Wireless resource allocation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L5/00—Arrangements affording multiple use of the transmission path
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W16/00—Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04J—MULTIPLEX COMMUNICATION
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Koyluoglu et al. | On secrecy capacity scaling in wireless networks | |
| Naeem et al. | Network coding in cognitive radio networks: A comprehensive survey | |
| Garcia-Luna-Aceves et al. | Challenges: Towards truly scalable ad hoc networks | |
| Çapar et al. | Secret communication in large wireless networks without eavesdropper location information | |
| Yu et al. | Secrecy outage performance analysis for cooperative NOMA over Nakagami-$ m $ channel | |
| Kim et al. | Performance analysis of cooperative systems with unreliable backhauls and selection combining | |
| Koyluoglu et al. | Cooperative encoding for secrecy in interference channels | |
| Ong et al. | On the equal-rate capacity of the AWGN multiway relay channel | |
| Duy et al. | Performance Enhancement for Multihop Cognitive DF and AF Relaying Protocols under Joint Impact of Interference and Hardware Noises: NOMA for Primary Network and Best‐Path Selection for Secondary Network | |
| Koksal et al. | Control of wireless networks with secrecy | |
| Wyrembelski et al. | Physical layer integration of private, common, and confidential messages in bidirectional relay networks | |
| Liang et al. | Secrecy throughput of MANETs under passive and active attacks | |
| Yao et al. | Secure transmission in linear multihop relaying networks | |
| Chen et al. | Secure routing for multihop ad hoc networks with inhomogeneous eavesdropper clusters | |
| Ryu et al. | Confidential cooperative communication with trust degree of potential eavesdroppers | |
| He et al. | User-pair selection in multiuser cooperative networks with an untrusted relay | |
| Jaiswal et al. | Performance evaluation of non-orthogonal multiple access in V2V communications over double-Rayleigh fading channels | |
| Xu et al. | Opportunistic relay selection improves reliability–reliability tradeoff and security–reliability tradeoff in random cognitive radio networks | |
| He et al. | Cooperative jamming: The tale of friendly interference for secrecy | |
| Kuhestani et al. | Optimal power allocation to improve secrecy performance of non‐regenerative cooperative systems using an untrusted relay | |
| Awad et al. | Secrecy enhancement of cooperative NOMA networks with two-way untrusted relaying | |
| Yao et al. | Secrecy rate maximization with outage constraint in multihop relaying networks | |
| Hong et al. | Beyond scaling laws: On the rate performance of dense device-to-device wireless networks | |
| Cao et al. | Optimal secrecy capacity-delay tradeoff in large-scale mobile ad hoc networks | |
| Sarma et al. | Joint scheduling & jamming for data secrecy in wireless networks |