We investigate the secrecy throughput of inhomogeneous wireless network, especially in cases of independent and uniform eavesdropper with single antenna and multiple antennas. Towards the inhomogeneous distribution of legitimate nodes, we novelly construct a circular percolation model under the idea of transforming “inhomogeneous” to “homogeneous.” Correspondingly, the information is transmitted by two ways: intracluster transmission and intercluster transmission. For intracluster transmission, a per-node secrecy throughput of is derived by circular percolation model, where n and represent the number of nodes and clusters in the network, respectively. As for intercluster case, a connection called “information pipelines” is built. Then the per-node secrecy throughput of can be obtained, where denotes the minimum node density in the network. Moreover, when the eavesdropper is equipped with antennas, the per-node secrecy throughput of and is achieved for intracluster and intercluster transmission, respectively.
1. Introduction
Security is an important issue in wireless ad hoc networks [1], especially in commercial, government, and military networks. Because of the broadcast nature of wireless channel in multihop wireless networks, it is vulnerable to eavesdroppers and malicious nodes. Traditional methods are based on cryptographic technology such as the well-known RSA public key cryptosystem. However, with the increasing of network size, especially in large-scale wireless networks, cryptosystem encounters some limitation, such as expensive key distribution and improvement on decoding technology, which induces more cost and complicated maintenance. In [2, 3], the authors showed that the capacity of wireless ad hoc networks was (Given two functions and : means ; means ; if , w.h.p.; if both and , ; means when logarithmic terms are ignored.), where was the probability that a node shared a primary secure associations (SAs) with any other nodes and n was the number of nodes in the network. Hence, to avoid the degradation on the throughput caused by , a method of information theoretic security was proposed by exploiting the difference between channels of legitimate nodes with that of eavesdroppers. In [4], Goel and Negi proposed an artificial noise generation method to suppress eavesdroppers' receiving signal. Different from [4], Choi II et al. [5] assumed a legitimate node was equipped with three antennas. The noise was generated by the receivers and can be eliminated using the technique of antennas cancelation. Consequently, it is urgent to reveal the effect of this technology on the network performance such as capacity and connectivity. In [6], Vasudevan et al. investigated the trade-off between capacity and security in large-scale wireless networks. To degrade the channel of eavesdropper, the authors used helper nodes around the transmitters to generate artificial noise. Specifically, when a per-node throughput of was desired, the network can tolerate up to independent eavesdroppers or a single eavesdropper with antennas, where c and ϵ were constants. The impact of secrecy guard zone on the capacity was investigated by Koyluoglu et al. in [7] and Zhou et al. in [8]. As mobility plays an important part in wireless networks, Liang et al. [9] extended the network topology to mobile ad hoc networks. The authors showed that there exists a critical threshold on the density of malicious node. That was, when , the per-node secrecy capacity was , and when , the per-node secrecy capacity was , where D was the delay constraint. Latter on, Çapar et al. [10] considered one-dimensional and two-dimensional ad hoc networks, where the number of eavesdroppers was and the location information of eavesdroppers was unknown. To degrade the signal quality of eavesdroppers, they exploited legitimate nodes to generate artificial noise and concluded that the per-node secure throughput was in one-dimensional and in two-dimensional networks, respectively. This result was the same order with the ground-breaking work by Gupta and Kumar [11]. More recently, Zhang et al. [12] constructed a highway system in the network and analyzed the cases of independent eavesdropper, eavesdropper with multiple antennas, and colluding eavesdroppers. The results showed that the secrecy capacity for independent eavesdropper was , which was the same order with the result [13]. Furthermore, they also obtained that the per-node secrecy capacity can keep the order of when the eavesdroppers colluded with each other and the density of eavesdropper was .
However, all the works on the scaling law of secrecy capacity were based on homogeneous ad hoc networks; for instance, nodes were distributed uniformly or according to the homogeneous Poisson process, and the destination was randomly selected. In most realistic case, nodes may form into some different clusters and the traffic may be usually occurred at local area, such as the traffic established over heterogeneous wireless networks (Wi-Fi, WLAN, WiMAX, etc.) which is particular inhomogeneous [14]. In [15], the authors considered the capacity property of clustered wireless network, where the node density did not show significant inhomogeneity. Later on, Perevalov et al. [16] used a Matern cluster process to achieve inhomogeneity. The node density inside the cluster was the same, whereas outside the cluster was the sea area. In their work, the bottleneck of the capacity was in the sea area. After that, Alfano et al. [17, 18] considered a more general inhomogeneous node process—SNCP [19], in which the node density was also scaled with the number of nodes. Besides, in [20], Martina et al. extended the inhomogeneous network model to different cluster size and investigated the scaling law of the capacity.
In this paper, we investigate the secrecy throughput capacity of wireless networks with inhomogeneous node density and nonuniform traffic. The node distribution is an inhomogeneous Poisson node process named as shot noise cox process (SNCP). Specifically, we assume n legitimate nodes uniformly located in clusters within the area of A and followed SNCP in each cluster. Meanwhile, the eavesdroppers are uniformly distributed in the network area with density of . We study the independent eavesdropper with single antenna and multiple antennas, respectively. To elaborate the nonuniform traffic, we partition the transmission into two parts: intracluster transmission and intercluster transmission. For intracluster transmission, we construct a novel circular percolation model in each cluster and derive that the per-node secrecy throughput is . For the case of intercluster, we build “information pipelines” among each cluster according to minimum node density in the network. Then we achieve a secrecy rate of for each legitimate node among clusters. As for eavesdropper equipped with antennas, the secrecy throughput is and for intracluster and intercluster transmission, respectively. Finally, we prove that the bottleneck of secrecy throughput is located in the area with minimum node density.
Since we firstly use percolation theory in inhomogeneous network model and propose a circular percolation model for the SNCP distributed network model, we will give a glance at the percolation theory. Percolation theory [21, 22] is a field of mathematics and statistic physics that provides models of phase transition phenomena. Assume that water is poured on top of a porous stone, will the water be able to make its way from hole to hole and reach the bottom? By modeling the stone as a square grid, each edge can be open and traversed by water with probability p, or closed with probability , and they are assumed to be independent. For a given p, what is the probability that an open path exists from the top to the bottom? That is, is there a path of connected points of infinite length through the network? In fact, there exists a critical below which the probability is always 0 and above which the probability is always 1. In some cases may be calculated explicitly; for example, in two dimensions square lattice , when , water percolates through the stone with probability one. One can then ask at what rate the water percolates and how it depends on p. In other words, how rich in disjoint paths are connected component of open edges? To maximize the information flow, we want to operate the network at , above the percolation threshold, so that we can guarantee the existence of many disjoint paths that traverse the network.
The rest of this paper is organized as follows. In Section 2, we present the network model. We give the transmission model in Section 3. The novel circular percolation model in each cluster is constructed in Section 4. Section 5 derives the secrecy throughput in intracluster transmission. In Section 6, we investigate the secrecy throughput of intercluster transmission. We extend the secrecy throughput to the case of eavesdropper with multiple antennas in Section 7 and conclude the paper in Section 8 with the discussion of some possible future works.
2. Network Model
We consider a network with n legitimate nodes in a two-dimensional torus , where . All legitimate nodes follow an inhomogeneous Poisson process which is called shot noise cox process (SNCP). The SNCP can be simply described by the following construction. There are M clusters randomly placed in the network and these cluster centers can be denoted by , where . The center point is also called mother point. For each , it generates a point process with an intensity of at point ξ, where is a dispersion density function and the quantity equals the number of nodes generated by cluster center . We assume that all cluster centers generate the same number of legitimate nodes; that is, . Moreover, according to SNCP, the density function F at point ξ can be written as follows:
where depends only on the Euclidean distance between point ξ and the cluster center , and the integral over the entire network is finite. To simplify the model, we employ function to replace the density function , where . In order to gain finite integral over increasing network area, the function is given below:
In addition, we define m scales as , δ as degradation factor, and . Then we can get that the number of nodes in each cluster is , that is, for , since is finite.
Other than legitimate nodes, the eavesdroppers are uniformly and independently distributed in the network with density . We assume eavesdroppers always keep silent since they will be easily detected if they are active. In order to have an insight on the fundamental information theoretical secrecy throughput, we also assume eavesdroppers have infinite computation ability which means that traditional cryptography method cannot be applied here. In addition, we assume that both channel state information (CSI) and location of eavesdropper are unknown to legitimate nodes.
Similar to [6, 12], we assume that each legitimate node is equipped with three antennas. When a legitimate node receives packets, one of the antennas is used for message reception, while the other two are applied to generate artificial noise to suppress the eavesdropper's channel simultaneously. As depicted in [5], the distance between the receiving antenna and the other two artificial noise generation antennas should satisfy a different of half the wavelength. Thus the interference can be eliminated using the technique of self-interference cancelation.
We define as the average distance between neighboring cluster centers. Then we can get
Notice that , as n tends to infinity, the network is a cluster-sparse network. When , the network is transformed to homogeneous model and its secrecy throughput is similar to that in the homogeneous Poisson process (HPP) network [12]. In this paper, we focus on the cluster-sparse network in which the density of the whole network is not identical. We use to denote the maximum node density and for the minimum node density in the network.
3. Transmission Model
Let T and R denote the subsets of legitimate nodes simultaneously transmitting and receiving in a given time slot, and Γ is the set of eavesdroppers.
We consider the Shannon capacity as the channel capacity between two nodes, and we define as the signal to interference and noise ratio (SINR) from legitimate transmission node i to legitimate destination node j over a channel of unit bandwidth, which is given as follows:
where with and represents the path loss in the transmission between the node i and node j. and denote the power of transmitting node i and artificial noise generation, respectively. stands for noise power of the channel at the receive node j, and the ζ means the set of nodes which can transmit simultaneously with node i.
Similarly, we denote the SINR received by eavesdropper e as follows:
According to the definition of secrecy throughput in [23], the secure rate between any legitimate nodes can be presented by
where .
In our strategy, we employ different power for different nodes. We define rate the secrecy throughput which is the guaranteed rate that can be supported uniformly for source-destination pairs and it is also the average secrecy rate which can simultaneously be achieved by legitimate nodes with high probability (w.h.p.).
4. The Circular Percolation Model for Each Cluster
Following the roadmap of [12], we first construct routing scheme for the network. As the legitimate nodes are distributed according to SNCP, we divide the transmission into two parts: intracluster traffic and intercluster traffic. For each part of transmission, we use percolation theory to construct the routing scheme. In intracluster traffic, we propose a circle percolation model, which is novel and different from the former percolation model. As for intercluster case, we build information pipelines to connect the clusters.
In our model, based on the idea that transform “inhomogeneous” to “homogeneous,” we demonstrate a circular percolation model and build highway system for legitimate nodes in each cluster. Different from the previous highway construction [13], the highways based on our mode are not from bottom to top or left to right, but from inner cluster to external or around the cluster center. In addition, we adopt different transmission range for legitimate nodes while the transmission rate could stay the same.
Lemma 1.
Assume that there is a minimum positive separation distance between the center and any nodes for each cluster. Then each cluster can build a highway system within a radius of for .
Proof.
We first divide a given cluster into circular lattices, where x denotes the number of radius, and the arc between each neighboring radius is equal, that is, . is the number of concentric circles where the distance between each two neighboring circles is different.
Since SNCP is an inhomogeneous Poisson point process, the intensity at different circular sector area is different, so as to the area of each square. The external circular sectors are larger than the inner ones. From inner circle to external circle, we set the radius of the ith concentric circle is as follows:
Thus, from the circular lattice described above, we can find that small circular area can be viewed as a square when n approaches to infinite.
Lemma 2.
To satisfy the cluster-sparse network in our model, the parameter x should meet the condition that .
Proof.
From Lemma 1, we know the radius of the entire lattice is
The distance between each two neighboring cluster is . Taking (3) and (8) into consideration together, we can derive the following equation:
Finally, we can get .
Lemma 3.
Consider a square between the ith and th concentric circles; let denote the number of nodes distributed in ; then we can get for .
Proof.
Specifically, we say is open if there exists at least one node in square , and close otherwise. According to Appendix A in [18], the probability that a square is open can be denoted by
From (10), we can get that decreases for increasing values of i on the precondition of .
As the probability is decreased with the parameter i, we will calculate the critical value , within which the probability can satisfy the condition of .
Lemma 4.
There exists a critical value , within which each cluster can build a highway system for the degradation factor .
Proof.
According to percolation theory, there exists a critical probability , when , the probability of the existence of many disjoint paths that traverse the network is going to one. Therefore, we can set the following equation by Lemma 3:
where is the probability which denotes the square is open, and .
Following this equation, we can derive that
where . Substituting into (12), we can achieve that .
According to Lemma 4 and (7), we can derive the critical value . Specifically, we can construct concentric circle within the radius .
Till now, we have established a percolation model for the intracluster transmission. The cluster is divided into a grid . We consider a path of is open if any two adjacent squares are open. Figure 1 is a part of one cluster lattice. Based on Appendix I in [13], we can obtain that there are disjoint paths crossing a rectangle of size . Therefore, within the radius of , there exists disjoint paths from inner circle to external circle, and disjoint paths around the disk. With these two kinds of paths, the highway system of legitimate nodes is established. Although our model is a circular grid, it can be analyzed similarly as a rectangle grid, which will be proved in the following section.
Section of circular lattice and a schematic representation of the routing scheme. In each phase we use point-to-point coding and decoding on each Gaussian channel between transmitters and receivers and design an appropriate time schedule for transmission. The crosses denote the eavesdroppers.
As shown in Figure 1, in each cluster, the routing scheme within the area of radius proceeds in four phases.
Phase 1 (Draining Phase). Source node S drains the packets to an access point on the highway of radial direction, using direct transmission and multiple time slots. Note that each highway may not be fully contained in its corresponding sector, but it may deviate from it. However, a highway is never farther than from its corresponding sector.
Phase 2 (Radial Highway Phase). Information is carried across the cluster along the highway in the radial direction, using multiple hops and multiple time slots, and there exist disjoint paths from inner circle to external circle.
Phase 3 (Encircling Highway Phase). Information is transported clockwise on the highway around the cluster center, and there exist disjoint paths around the circle.
Phase 4 (Delivering Phase). In this phase, information is delivered from the exit point located on the encircling highway to the destination node D.
Comparing the rate in each phase, we find that the communication bottleneck is in the radial highway phase.
5. The Secrecy Transmission Rate of Intracluster Traffic
The routing protocol of intracluster communication uses four separate phases to deliver the packets and it can be found that the bottleneck occurs on the transmission along the highways. After setting different transmission power for different nodes, we can transform the inhomogeneous circular lattice into homogenous regular square lattice. In this section, we derive the secrecy rate in intracluster transmission via the circular percolation model. In addition, the TDMA scheme is adopted and the packet is delivered hop by hop; then a constant rate along the highway is achieved. However, there are still some differences between circular lattice and the regular one, such as not all the highways sever the same quantity of nodes and the power in each lattice is not equal. Based on these differences, we give the per-node secrecy rate for the circular lattice specifically.
Lemma 5.
For a given square, to make the interference from the two opposite directions be equal, the transmission and artificial generated noise power of legitimate nodes in square is
where and are the unit power for legitimate transmitter and artificial noise generation node, respectively.
Proof.
For a given square , let denote the interference from the direction of outside the square, and for that from the direction of inside the square. if d is the distance between two nodes, which is not Euclidean distance but the number of d squares away, then we can compute the interference from different directions as follows:
We can also get that
As , when , we can get .
Similarly, we also can obtain , if , where and are the interference caused by artificial generated noise.
Next, we refer to Lemma 1 in [12] and give the upper bound rate that an eavesdropper e can obtain.
Lemma 6.
Let denote the maximum rate that an independent eavesdropper e can obtain; then we can get that
where is the Euclidean distance between legitimate transmitter i and receiver j, and is the Euclidean distance between node i and eavesdropper e.
Proof.
The proof is similar to that of Lemma 1 in [12]. In [12], the authors assumed that each legitimate node used identical power for transmission and noise generation, while we assign different power for different nodes, as shown in Lemma 5. Despite difference in the power, the proof goes along the same line as [12]. For concision, we omit details.
Theorem 7.
In each square, the rate that legitimate source-destination pair can be achieved in the “highway system” is , where d denotes the transmission range. For special, the distance d is not Euclidean distance but the number of d squares away.
Proof.
First we compute the interference at a given destination node. We can prove that the interference from different directions is equal with the same interference distance d. Then we will treat the cluster network as a square network. In addition, we adopt TDMA scheme and divide time into successive time slots, where k is an important parameter. Every square in each subsquare takes turn to transmit, and in one given time slot, squares can transmit simultaneously in accordance with Kumar's interference region [11]. Assuming that the transmitter in a square transmits toward a destination located in a square at distance of d squares away, the eight closest transmitters and receivers are located at distance at least k and from the receiver. The sixteen next closest transmitters and receivers are at distance at least and away from the receivers and so on. Considering the interference in the network, the upper bound of the interference caused by simultaneous transmitter nodes and artificial noise could be given as follows:
Notice that this sum will converge if and the proof is shown in Appendix A.
According to the interference model, we will derive a lower bound of received power of legitimate node. We notice that the distance between the transmitter and the receiver is at most . Then the signal at the receiver can be bounded by
Finally, combining (17) and (18), we can obtain an asymptotic lower bound of the rate for :
when choosing , and are constants.
As shown in Lemma 6 and according to (6), the secrecy rate which each square can obtain is as follows:
where is the time utilization factor.
Let . To bound the interference incurred to intended receiver, we can get according to (19). Therefore, the secrecy rate which each square can obtain is .
Theorem 7 shows that the secrecy rate is achievable even under the worst attack. In order to calculate the secrecy rate per-node, we will derive the rate in each phase.
Lemma 8.
If one divides a given cluster into w sectors with arc of , then there are no more than legitimate nodes located in each sector .
Proof.
Let denote the probability that there exists a sector having more than nodes. As the number of nodes in each sector according to Poisson distribution of , following the Chernoff bound (see Appendix C), when , then
Therefore, we can conclude that there is no sector containing more than nodes.
Lemma 9.
Each legitimate node within the radius of can obtain a secrecy access rate with a node on the highway of radial direction.
Proof.
According to Theorem 5 in [13], by choosing ϵ and κ appropriately, there are at least highways in the direction of radial within a given sector of arc . Note that each highway may not be fully contained in its corresponding sector; it may deviate it. However, it never deviates an arc of from its corresponding sector; that is, it will not father than squares, as it is shown in Figure 1.
Then, according to Theorem 7, let ; we can obtain that the transmission rate between a legitimate node in a square and an access node on the radial highway is
As there are many nodes in a square, they need to share the bandwidth. According to Lemma 8, we conclude that the rate of legitimate nodes in the first phase is
Lemma 10.
Every legitimate node in the radial direction highway can achieve a per-node secrecy rate w.h.p.
Proof.
According to the construction of highway system, the delivering strategy is hop-by-hop and information is transmitted from one square to a neighboring square. Therefore, by applying Theorem 7, we can obtain that the rate in the highway phase is . Since , there will be distinct highways which span from inner circle to external circle. According to Chernoff bound, there are at most nodes w.h.p. in the arc of . It follows that each node can transmit at a rate of order in the radial direction.
Lemma 11.
The legitimate nodes in the highway which are around the cluster can achieve w.h.p. a per-node secrecy rate , where is the “inhomogeneous factor” which is only decided by the inhomogeneous characteristic of the node distribution.
Proof.
Compared with the highway in the radial direction, the condition in which data is transmitted around the cluster becomes more complicated since the number of nodes in different highways is not equal. If each highway around the cluster is identical, we can get a corresponding rate of order . Nevertheless, for the effect of inhomogeneous, the achievable rate can be written as , where is an inhomogeneous factor, and will be discussed in detail in Appendix B.
The delivery phase is a reverse process of the first phase. Therefore, we can get the secrecy rate directly, which is the same order with the draining phase.
Lemma 12.
Every legitimate node can receive information from the highway at rate w.h.p.
Comparing the secrecy rate in each phase, we can conclude that the secrecy rate of intracluster transmission is as follows.
Theorem 13.
For the intracluster traffic in each independent cluster, the legitimate nodes which are within the area of radius can achieve w.h.p. a per-node secrecy rate of .
Proof.
The routing strategy based on percolation theory has been deeply researched. The data transmission within the area of radius can be divided into four phases: draining information to the highway; transporting information on the highway of the radial direction; transporting information on the highway around the cluster; and delivering the information to the destination. We can find that the communication bottleneck is in the highway phase. In addition, for , we can get that w.h.p. (the proof is in Appendix B). Then the per-node secrecy rate in the intracluster transmission can be achieved as .
6. The Secrecy Transmission of Intercluster Traffic
As we consider cluster-sparse network, the node density between two neighboring clusters is much lower. These areas may be disjoint sets that we cannot utilize the highway system mentioned in the previous section. Using the properties of Poisson point process, we extract part of nodes which are distributed like homogeneous Poisson point process with the density of ϕ, which is smaller than . Then we can build information pipelines constructed by these nodes among clusters; see Figure 2 for details.
An illustration of information pipelines among cluster. As the minimum legitimate node density is , we can build pipelines among these clusters.
The network is divided into a regular lattice and the area of each small square is , where is a constant. Our strategy of delivering data among clusters is easy to understand and implement. For some special large value , we can extract part of nodes to form “information pipelines,” which is similar to the highways in the homogeneous network. However, due to the inhomogeneous distribution, the number of node in each square is not equal.
In the previous section, we have already derived the secrecy throughput in the cluster area through a circular highway system. In these cluster areas, data is transmitted according to strategy of circular highway system. Only if the information needs to be forwarded to the nodes located in different clusters, the data will be transmitted through the “information pipelines.” In light of this scheme, we can obtain the achievable secrecy rate of these pipelines in the network.
According to the percolation theory in [13], we can build pipelines among these clusters. All these pipelines need to serve clusters. Similar to Lemma 2 in [12], we can also obtain that the interference caused by intercluster transmission is converged, in which the square length is not c, but . Since we have computed the interference of intracluster transmission which is converged, we can conclude that the effect caused by interference will not change our results in order sense. Therefore, each cluster can be served by pipelines w.h.p. Under the analysis of secrecy capacity of homogeneous wireless network in [12], we can get that the rate between legitimate nodes on these pipelines is . Based on the analysis above, we can obtain the following theorem directly.
Theorem 14.
For the intercluster traffic, one can get that the achievable secrecy rate for legitimate node is , where is the minimum node density in the network area.
Specially, for the homogeneous network, we can get that and , which is the secrecy capacity in homogeneous wireless networks under the case of independent eavesdropper [12].
Comparing the results of intracluster and intercluster transmission, we can find that the bottleneck of the secrecy throughput is in the area with minimum node density. However, the communication traffic in real world always occurs in the local region which may communicate with the node in the same cluster. In other words, the traffic may be inhomogeneous. To deal with such situation, a remarkable contribution of our model is that we set independent transmission models in distinct clusters. Furthermore, the computing for the throughput may be convenient when the traffic is inhomogeneous. As to the inhomogeneous traffic, we can derive the following theorem.
Theorem 15.
If one considers the nonuniform traffic in the network, the per-node secrecy rate is in the interval of
7. Case of Eavesdroppers with Multiple Antennas
In the previous section, we have derived the secrecy throughput in the case of independent eavesdroppers suppressed by artificial noise generation. Regardless of the number and location of eavesdroppers, the results show that there is no loss in the throughput. However, if eavesdroppers are equipped with multiple antennas, what is the secrecy throughput between legitimate nodes?
Without loss of generality, we assume eavesdroppers do not collaborate with each other and the correlation across the antennas is ignored, so that the eavesdroppers can employ maximum ratio combining to maximize the SINR.
Theorem 16.
If eavesdropper is equipped with antennas, the per-node secrecy throughput of intracluster transmission is and for intercluster transmission.
Proof.
According to Lemma 6, the maximum rate that eavesdroppers can get is bounded as . As eavesdroppers are always silent, the rate that legitimate can obtain remains the same; that is, . Since , we can find a constant , such that when , can be greater than , and the secrecy rate is . In addition, we need to choose , that is, , such that (20) can hold. Therefore, the secrecy throughput in each square is . Hence, when the transmission is occurred in the intracluster, the per-node secrecy throughput is . Similarly, for the intercluster transmission, according to Theorem 14, we can get the per-node secrecy throughput which is .
Comparing to the case of eavesdropper equipped with single antenna, there exists a degradation factor for secrecy throughput, which is . Moreover, when the traffic is nonuniform, the secrecy throughput is fallen into an interval, which can be denoted as follows:
8. Conclusion
In this paper, we analyze the secrecy throughput capacity of cluster-sparse network where the legitimate nodes are distributed according to the SNCP. In order to get the secrecy throughput capacity under the independent eavesdroppers with single antenna, the transmission is divided into two parts: the intracluster transmission and the intercluster transmission. For the first part, we novelly establish a circular percolation model and find the bottleneck of secrecy throughput capacity is in the highway phase, where per-node secrecy rate of order is achieved. For the second part, we employ the idea of “information pipelines” to obtain a per-node secrecy rate of . Taking both transmissions into consideration, the secrecy rate is fallen into an interval of . In Figure 3, we depict the order sense of secrecy rate of intracluster and intercluster transmission. Unexpectedly, we find the secrecy throughput in intracluster transmission is greater than that of homogeneous networks.
An illustration of secrecy throughput of intracluster transmission and intercluster transmission when the eavesdropper is equipped with single antenna, and we also give a comparison with that in [12]. The scales of the axes are in terms of the order in n.
We also investigate the scenario where eavesdropper is equipped with multiple antennas. If the eavesdropper is equipped with antennas and do not collaborate with each other, the secrecy throughput of intracluster transmission is and for intercluster transmission. Similarly, when the traffic is nonuniform, the secrecy throughput is fallen into an interval, which can be denoted as follows:
Finally, we do not consider the case of eavesdroppers collaborating with each other. What is more is that the secrecy throughput is strongly correlated to the distribution of nodes. Therefore, it is an interesting future work to study the scenario of colluding eavesdroppers, where the distribution of legitimate nodes and eavesdroppers will impact the secrecy throughput greatly.
Footnotes
Appendices
Conflict of Interests
The authors declare that there is no conflict of interests regarding the publication of this paper.
Acknowledgments
This work was supported in part by the Key project of National Natural Science Foundation of China (NSFC) (Grant no. 61231010) and the Specialized Research Fund for the Doctoral Program of Higher Education of China (Grant no. 20120142110015).
References
1.
PonniahJ.HuY.-C.KumarP.A system-theoretic clean slate approach to provably secure ad hoc wireless networkinghttp://arxiv.org/abs/1309.2904
2.
ZhangC.SongY.FangY.ZhangY.On the price of security in large-scale wireless ad hoc networksIEEE/ACM Transactions on Networking201119231933210.1109/TNET.2011.21061622-s2.0-79955482990
3.
BhandariV.VaidyaN. H.Secure capacity of multi-hop wireless networks with random key pre-distributionProceedings of the IEEE INFOCOM WorkshopsApril 2008Phoenix, Ariz, USA1610.1109/INFOCOM.2008.45446262-s2.0-51049085143
4.
GoelS.NegiR.Guaranteeing secrecy using artificial noiseIEEE Transactions on Wireless Communications2008762180218910.1109/TWC.2008.0608482-s2.0-45849133457
5.
ChoiJ.IIJainM.SrinivasanK.LevisP.KattiS.Achieving single channel, full duplex wireless communicationProceedings of the 16th Annual Conference on Mobile Computing and Networking (MobiCom ′10)September 2010ACM11210.1145/1859995.18599972-s2.0-78649281129
6.
VasudevanS.GoeckelD.TowsleyD. F.Security-capacity trade-off in large wireless networks using keyless secrecyProceedings of the 11th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc ′10)September 2010ACM213010.1145/1860093.18600972-s2.0-78649282396
7.
KoyluogluO. O.KoksalC. E.El GamalH.On secrecy capacity scaling in wireless networksIEEE Transactions on Information Theory20125853000301510.1109/TIT.2012.2184692MR29525292-s2.0-84860255627
8.
ZhouX.GantiR. K.AndrewsJ. G.HjørungnesA.On the throughput cost of physical layer security in decentralized wireless networksIEEE Transactions on Wireless Communications20111082764277510.1109/TWC.2011.061511.1022572-s2.0-84860402665
9.
LiangY.PoorH. V.YingL.Secrecy throughput of {MANET}s under passive and active attacksIEEE Transactions on Information Theory201157106692670210.1109/TIT.2011.2165800MR28822532-s2.0-80053983111
10.
ÇaparÇ.GoeckelD.LiuB.TowsleyD.Secret communication in large wireless networks without eavesdropper location informationProceedings of the IEEE Conference on Computer Communications (INFOCOM ′12)March 2012IEEE1152116010.1109/INFCOM.2012.61954742-s2.0-84861618493
11.
GuptaP.KumarP. R.The capacity of wireless networksIEEE Transactions on Information Theory200046238840410.1109/18.825799MR17489762-s2.0-33747142749
12.
ZhangJ.FuL.WangX.Asymptotic analysis on secrecy capacity in large-scale wireless networksIEEE/ACM Transactions on Networking2014221667910.1109/TNET.2013.22442302-s2.0-84894743905
13.
FranceschettiM.DousseO.TseD. N.ThiranP.Closing the gap in the capacity of wireless networks via percolation theoryIEEE Transactions on Information Theory20075331009101810.1109/TIT.2006.890791MR23028082-s2.0-33947689700
14.
VenkataramanH.KalyampudiP.MunteanG.-M.CASHeW: cluster-based adaptive scheme for multimedia delivery in heterogeneous wireless networksWireless Personal Communications201262351753610.1007/s11277-010-0067-82-s2.0-84856740750
15.
ToumpisS.Capacity bounds for three classes of wireless networks: asymmetric, cluster, and hybridProceedings of the 5th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MoBiHoc ′04)May 2004ACM1331442-s2.0-4444236383
16.
PerevalovE.BlumR. S.SafiD.Capacity of clustered ad hoc networks: how large is “large”?IEEE Transactions on Communications20065491672168110.1109/TCOMM.2006.8788362-s2.0-33749370702
17.
AlfanoG.GarettoM.LeonardiE.Capacity scaling of wireless networks with inhomogeneous node density: upper boundsIEEE Journal on Selected Areas in Communications20092771147115710.1109/JSAC.2009.0909112-s2.0-84055176815
18.
AlfanoG.GarettoM.LeonardiE.MartinaV.Capacity scaling of wireless networks with inhomogeneous node density: lower boundsIEEE/ACM Transactions on Networking20101851624163610.1109/TNET.2010.20487192-s2.0-77958154436
19.
MøllerJ.Shot noise cox processesAdvances in Applied Probability200335361464010.1239/aap/1059486821MR19906072-s2.0-0041878892
20.
MartinaV.GarettoM.LeonardiE.Capacity scaling of large wireless networks with heterogeneous clustersPerformance Evaluation201067111203121810.1016/j.peva.2010.08.0082-s2.0-77957715057
21.
GrimmettG.Percolation19993212ndNew York, NY, USASpringer10.1007/978-3-662-03981-6MR1707339
22.
MeesterR.RoyR.Continuum Percolation1996Cambridge University Press10.1017/CBO9780511895357MR1409145
23.
CsiszarI.KornerJ.Broadcast channels with confidential messagesIEEE Transactions on Information Theory197824333934810.1109/TIT.1978.1055892MR4936462-s2.0-0017973511