Objectives 上游充通大学 SHANGHAI JIAO TONG UNIVERSITY Several questions arise: CSI information is difficult to obtain Artificial noises also degrade legitimate receivers'channels >Cost on capacity is quite large to utilize fading gain How to effectively improve the secrecy capacity? Asymptotic Analysis on Secrecy Capacity in Large-Scale Wireless Networks 6
6 Objectives ❑ Several questions arise: ➢ CSI information is difficult to obtain ➢ Artificial noises also degrade legitimate receivers’ channels ➢ Cost on capacity is quite large to utilize fading gain How to effectively improve the secrecy capacity? Asymptotic Analysis on Secrecy Capacity in Large-Scale Wireless Networks
Outline 上浒充通大学 SHANGHAI JIAO TONG UNIVERSITY ▣Introduction QNetwork Model and Definition QSecrecy Capacity for Independent Eavesdroppers QSecrecy Capacity for Colluding Eavesdroppers ▣Discussion Conclusion and Future Work Asymptotic Analysis on Secrecy Capacity in Large-Scale Wireless Networks 7
7 Outline ❑ Introduction ❑ Network Model and Definition ❑ Secrecy Capacity for Independent Eavesdroppers ❑ Secrecy Capacity for Colluding Eavesdroppers ❑ Discussion ❑ Conclusion and Future Work Asymptotic Analysis on Secrecy Capacity in Large-Scale Wireless Networks
Network Model and Definition l/ll 上浒充通大 SHANGHAI JIAO TONG UNIVERSITY ▣Legitimate Nodes. >Self-interference cancelation[16]adopted >3 antennas per-node Antenna Cancellation TX RX d+λ/2 CSI information unknown Power Splitter ▣Eavesdroppers. OHx220 RF Input RF Analog Interference 个 Location positions unknown Reference Output! RF Analog Baseband→RF RF Interference Cancellation 个 CSI information unknown Digital Interference Cancellation ADC RF>Baseband DAC Digital Decoder Interference Encoder Reference TX Signal Path 一RX Signal Path Cited from [17] [17]J.I.Choiy,M.Jainy,K.Srinivasany,P.Levis and S.Katti,"Achieving Single Channel, Full Duplex Wireless Communication",in ACM Mobicom'10,Chicago,USA,Sept.2010. Asymptotic Analysis on Secrecy Capacity in Large-Scale Wireless Networks 8
8 Network Model and Definition – I/II ❑ Legitimate Nodes: ➢ Self-interference cancelation[16] adopted ➢ 3 antennas per-node ➢ CSI information unknown ❑ Eavesdroppers: ➢ Location positions unknown ➢ CSI information unknown Cited from [17] [17] J. I. Choiy, M. Jainy, K. Srinivasany, P. Levis and S. Katti, “Achieving Single Channel, Full Duplex Wireless Communication”, in ACM Mobicom’10, Chicago, USA, Sept. 2010. Asymptotic Analysis on Secrecy Capacity in Large-Scale Wireless Networks
Network Model and Definition ll/ll 上洋充通大学 SHANGHAI JIAO TONG UNIVERSITY ▣Network Model: Extended networks: n nodes randomly distributed in a network with size n. Static >Physical channel model Pl(;x;) SNR,+∑rP4(x,+2P】 PI(xx) SINR.N+∑nP)+2x,) where I(xx)=min(1,d) Definition of secrecy capacity Ri=Ry-Re log2 (1+SINR )-log2 (1+SINRie) where SINR=maxce:SINR Asymptotic Analysis on Secrecy Capacity in Large-Scale Wireless Networks 9
9 Network Model and Definition – II/II ❑ Network Model: ➢ Extended networks: n nodes randomly distributed in a network with size n. ➢ Static ➢ Physical channel model where ➢ Definition of secrecy capacity 0 \{ } \{ } ( , ) ( , ) ( , ) t i j ij t k j r k j k T i k R i Pl x x SINR N Pl x x Pl x x = + + 0 \{ } ( , ) ( , ) ( , ) t i e ie t k e r k e k T i k R Pl x x SINR N Pl x x Pl x x = + + ( , ) min(1, ) i j ij l x x d − = 2 2 log (1 ) log (1 ) s R R R SINR SINR ij ij ie ij ie = − = + − + max ie e ie SINR SINR = where Asymptotic Analysis on Secrecy Capacity in Large-Scale Wireless Networks
Outline 上浒充通大¥ SHANGHAI JIAO TONG UNIVERSITY ▣Introduction Q Network Modeland Definition ▣ Secrecy Capacity for Independent Eavesdroppers >Lower Bound >Upper Bound QSecrecy Capacity for Colluding Eavesdroppers ▣Discussion Q Conclusion and Future Work Asymptotic Analysis on Secrecy Capacity in Large-Scale Wireless Networks 10
10 Outline ❑ Introduction ❑ Network Model and Definition ❑ Secrecy Capacity for Independent Eavesdroppers ➢ Lower Bound ➢ Upper Bound ❑ Secrecy Capacity for Colluding Eavesdroppers ❑ Discussion ❑ Conclusion and Future Work Asymptotic Analysis on Secrecy Capacity in Large-Scale Wireless Networks