Home > Research > Publications & Outputs > On ergodic secrecy capacity of random wireless ...

Links

Text available via DOI:

View graph of relations

On ergodic secrecy capacity of random wireless networks with protected zones

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Published

Standard

On ergodic secrecy capacity of random wireless networks with protected zones. / Liu, Weigang; Ding, Zhiguo; Ratnarajah, T. et al.
In: IEEE Transactions on Vehicular Technology, Vol. 65, No. 8, 11.08.2016, p. 6146-6158.

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Harvard

Liu, W, Ding, Z, Ratnarajah, T & Xue, J 2016, 'On ergodic secrecy capacity of random wireless networks with protected zones', IEEE Transactions on Vehicular Technology, vol. 65, no. 8, pp. 6146-6158. https://doi.org/10.1109/TVT.2015.2477315

APA

Liu, W., Ding, Z., Ratnarajah, T., & Xue, J. (2016). On ergodic secrecy capacity of random wireless networks with protected zones. IEEE Transactions on Vehicular Technology, 65(8), 6146-6158. https://doi.org/10.1109/TVT.2015.2477315

Vancouver

Liu W, Ding Z, Ratnarajah T, Xue J. On ergodic secrecy capacity of random wireless networks with protected zones. IEEE Transactions on Vehicular Technology. 2016 Aug 11;65(8):6146-6158. Epub 2015 Sept 2. doi: 10.1109/TVT.2015.2477315

Author

Liu, Weigang ; Ding, Zhiguo ; Ratnarajah, T. et al. / On ergodic secrecy capacity of random wireless networks with protected zones. In: IEEE Transactions on Vehicular Technology. 2016 ; Vol. 65, No. 8. pp. 6146-6158.

Bibtex

@article{987f9affc69940009d325198a5a4b1bf,
title = "On ergodic secrecy capacity of random wireless networks with protected zones",
abstract = "In this paper, we investigate physical-layer security in a random wireless network where both legitimate and eavesdropping nodes are randomly deployed. In the first scenario, we study the basic random network without a protected zone around the source node. The probability density functions (pdfs) for the composite channel gain with both fading and path loss is derived and used to calculate the probability of secure connection and ergodic secrecy capacity. In the second scenario, we consider the use of secrecy protected zone around the source node to enhance the security in a noise-limited network. Here, we study the following two cases: 1) The eavesdroppers are aware of the secrecy protected zone, and 2) the eavesdroppers are unaware of the secrecy protected zone. Moreover, the distribution of the distances between the origin and random nodes outside the secrecy protected zone is derived. In the final scenario, the interferer protected zones around the legitimate receivers are used to improve the physical-layer security by restructuring the interference. The derived analytical results are verified by the Monte Carlo simulations. It is shown that the application of secrecy and interferer protected zones lead to significant improvement in security, depending on different system parameters. ",
author = "Weigang Liu and Zhiguo Ding and T. Ratnarajah and Jiang Xue",
year = "2016",
month = aug,
day = "11",
doi = "10.1109/TVT.2015.2477315",
language = "English",
volume = "65",
pages = "6146--6158",
journal = "IEEE Transactions on Vehicular Technology",
issn = "0018-9545",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
number = "8",

}

RIS

TY - JOUR

T1 - On ergodic secrecy capacity of random wireless networks with protected zones

AU - Liu, Weigang

AU - Ding, Zhiguo

AU - Ratnarajah, T.

AU - Xue, Jiang

PY - 2016/8/11

Y1 - 2016/8/11

N2 - In this paper, we investigate physical-layer security in a random wireless network where both legitimate and eavesdropping nodes are randomly deployed. In the first scenario, we study the basic random network without a protected zone around the source node. The probability density functions (pdfs) for the composite channel gain with both fading and path loss is derived and used to calculate the probability of secure connection and ergodic secrecy capacity. In the second scenario, we consider the use of secrecy protected zone around the source node to enhance the security in a noise-limited network. Here, we study the following two cases: 1) The eavesdroppers are aware of the secrecy protected zone, and 2) the eavesdroppers are unaware of the secrecy protected zone. Moreover, the distribution of the distances between the origin and random nodes outside the secrecy protected zone is derived. In the final scenario, the interferer protected zones around the legitimate receivers are used to improve the physical-layer security by restructuring the interference. The derived analytical results are verified by the Monte Carlo simulations. It is shown that the application of secrecy and interferer protected zones lead to significant improvement in security, depending on different system parameters.

AB - In this paper, we investigate physical-layer security in a random wireless network where both legitimate and eavesdropping nodes are randomly deployed. In the first scenario, we study the basic random network without a protected zone around the source node. The probability density functions (pdfs) for the composite channel gain with both fading and path loss is derived and used to calculate the probability of secure connection and ergodic secrecy capacity. In the second scenario, we consider the use of secrecy protected zone around the source node to enhance the security in a noise-limited network. Here, we study the following two cases: 1) The eavesdroppers are aware of the secrecy protected zone, and 2) the eavesdroppers are unaware of the secrecy protected zone. Moreover, the distribution of the distances between the origin and random nodes outside the secrecy protected zone is derived. In the final scenario, the interferer protected zones around the legitimate receivers are used to improve the physical-layer security by restructuring the interference. The derived analytical results are verified by the Monte Carlo simulations. It is shown that the application of secrecy and interferer protected zones lead to significant improvement in security, depending on different system parameters.

U2 - 10.1109/TVT.2015.2477315

DO - 10.1109/TVT.2015.2477315

M3 - Journal article

VL - 65

SP - 6146

EP - 6158

JO - IEEE Transactions on Vehicular Technology

JF - IEEE Transactions on Vehicular Technology

SN - 0018-9545

IS - 8

ER -