Secrecy outage in random wireless networks subjected to fading

@article{Vuppala2013SecrecyOI,
  title={Secrecy outage in random wireless networks subjected to fading},
  author={Satyanarayana Vuppala and Giuseppe Abreu},
  journal={2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)},
  year={2013},
  pages={446-450}
}
We investigated the secrecy outage of unicast channels in random networks exposed to unknown numbers of randomly located eavesdroppers, obtaining original expressions which include uncertainty in terms of the location of legitimate nodes relative to eavesdroppers, the number of eavesdroppers, and fading. Under such conditions, we derive the path gain distributions of legitimate and eavesdropper nodes, as well as the corresponding secrecy non-outage. Two interesting conclusions can be drawn from… CONTINUE READING

Figures and Topics from this paper.

Citations

Publications citing this paper.
SHOWING 1-8 OF 8 CITATIONS

Secure Transmission via Jamming in Wireless Networks with Possion Spatially Distributed Eavesdroppers

  • 2016 International Conference on Networking and Network Applications (NaNA)
  • 2016
VIEW 2 EXCERPTS
CITES METHODS

Secure transmission via jamming in cognitive radio networks with possion spatially distributed eavesdroppers

  • 2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)
  • 2016
VIEW 1 EXCERPT
CITES METHODS

Secrecy transmission capacity of random networks

  • 2013 Asilomar Conference on Signals, Systems and Computers
  • 2013
VIEW 1 EXCERPT
CITES BACKGROUND

References

Publications referenced by this paper.
SHOWING 1-10 OF 21 REFERENCES

A Geometric Interpretation of Fading in Wireless Networks: Theory and Applications

  • IEEE Transactions on Information Theory
  • 2007
VIEW 5 EXCERPTS
HIGHLY INFLUENTIAL

Wireless Information-Theoretic Security

  • IEEE Transactions on Information Theory
  • 2008
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

An introduction to the theory of point processes

D. Daley, D. V. Jones
  • NewYork: Springer
  • 1988
VIEW 3 EXCERPTS
HIGHLY INFLUENTIAL

and H

O. O. Koyluoglu, C. E. Koksal
  • E. Gamal, “On secrecy capacity scaling in wireless networks,” IEEE Trans. Inform. Theory, vol. 58, no. 5, pp. 3000 – 3015
  • 2012

Impact of interference on secrecy capacity in a cognitive radio network

Y. L. Yang Z. Shu, Y. Qian, R. Q. Hu
  • Proc . IEEE Global Telecommunications Conference ( Globecom ’ 11 )
  • 2011

and R

Z. Shu, Y. L. Yang, Y. Qian
  • Q. Hu, “Impact of interference on secrecy capacity in a cognitive radio network,” in Proc. IEEE Global Telecommunications Conference (Globecom’11)
  • 2011
VIEW 1 EXCERPT