Secrecy Throughput in Inhomogeneous Wireless Networks with Nonuniform Traffic

We investigate the secrecy throughput of inhomogeneous wireless network, especially in cases of independent and uniform eavesdropper with single antenna and multiple antennas. Towards the inhomogeneous distribution of legitimate nodes, we novelly construct a circular percolation model under the idea...

Full description

Saved in:
Bibliographic Details
Main Authors: Qiuming Liu, Li Yu, Peng Yang, Zuhao Liu
Format: Article
Language:English
Published: Wiley 2014-10-01
Series:International Journal of Distributed Sensor Networks
Online Access:https://doi.org/10.1155/2014/460196
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832553131971444736
author Qiuming Liu
Li Yu
Peng Yang
Zuhao Liu
author_facet Qiuming Liu
Li Yu
Peng Yang
Zuhao Liu
author_sort Qiuming Liu
collection DOAJ
description We investigate the secrecy throughput of inhomogeneous wireless network, especially in cases of independent and uniform eavesdropper with single antenna and multiple antennas. Towards the inhomogeneous distribution of legitimate nodes, we novelly construct a circular percolation model under the idea of transforming “inhomogeneous” to “homogeneous.” Correspondingly, the information is transmitted by two ways: intracluster transmission and intercluster transmission. For intracluster transmission, a per-node secrecy throughput of Ω ( 1 / n 1 - v ( 1 - v ) log n ) is derived by circular percolation model, where n and n v represent the number of nodes and clusters in the network, respectively. As for intercluster case, a connection called “information pipelines” is built. Then the per-node secrecy throughput of Ω Φ _ / n can be obtained, where Φ _ denotes the minimum node density in the network. Moreover, when the eavesdropper is equipped with Ψ ( n ) antennas, the per-node secrecy throughput of Ω ( 1 / n 1 - v ( 1 - v ) log n Ψ - 2 / α ( n ) ) and Ω ( ( Φ _ / n ) Ψ - 2 / α ( n ) ) is achieved for intracluster and intercluster transmission, respectively.
format Article
id doaj-art-7668e726b39a446db94db11587c948fe
institution Kabale University
issn 1550-1477
language English
publishDate 2014-10-01
publisher Wiley
record_format Article
series International Journal of Distributed Sensor Networks
spelling doaj-art-7668e726b39a446db94db11587c948fe2025-02-03T05:55:22ZengWileyInternational Journal of Distributed Sensor Networks1550-14772014-10-011010.1155/2014/460196460196Secrecy Throughput in Inhomogeneous Wireless Networks with Nonuniform TrafficQiuming Liu0Li Yu1Peng Yang2Zuhao Liu3 Nanchang of Jiangxi University of Science and Technology (JXUST), Nanchang 330013, China The Department of Electronics and Information Engineering, Huazhong University of Science and Technology (HUST), Wuhan 430074, China The Department of Electronics and Information Engineering, Huazhong University of Science and Technology (HUST), Wuhan 430074, China China Yangtze Power Co., Ltd., Yichang 443002, ChinaWe investigate the secrecy throughput of inhomogeneous wireless network, especially in cases of independent and uniform eavesdropper with single antenna and multiple antennas. Towards the inhomogeneous distribution of legitimate nodes, we novelly construct a circular percolation model under the idea of transforming “inhomogeneous” to “homogeneous.” Correspondingly, the information is transmitted by two ways: intracluster transmission and intercluster transmission. For intracluster transmission, a per-node secrecy throughput of Ω ( 1 / n 1 - v ( 1 - v ) log n ) is derived by circular percolation model, where n and n v represent the number of nodes and clusters in the network, respectively. As for intercluster case, a connection called “information pipelines” is built. Then the per-node secrecy throughput of Ω Φ _ / n can be obtained, where Φ _ denotes the minimum node density in the network. Moreover, when the eavesdropper is equipped with Ψ ( n ) antennas, the per-node secrecy throughput of Ω ( 1 / n 1 - v ( 1 - v ) log n Ψ - 2 / α ( n ) ) and Ω ( ( Φ _ / n ) Ψ - 2 / α ( n ) ) is achieved for intracluster and intercluster transmission, respectively.https://doi.org/10.1155/2014/460196
spellingShingle Qiuming Liu
Li Yu
Peng Yang
Zuhao Liu
Secrecy Throughput in Inhomogeneous Wireless Networks with Nonuniform Traffic
International Journal of Distributed Sensor Networks
title Secrecy Throughput in Inhomogeneous Wireless Networks with Nonuniform Traffic
title_full Secrecy Throughput in Inhomogeneous Wireless Networks with Nonuniform Traffic
title_fullStr Secrecy Throughput in Inhomogeneous Wireless Networks with Nonuniform Traffic
title_full_unstemmed Secrecy Throughput in Inhomogeneous Wireless Networks with Nonuniform Traffic
title_short Secrecy Throughput in Inhomogeneous Wireless Networks with Nonuniform Traffic
title_sort secrecy throughput in inhomogeneous wireless networks with nonuniform traffic
url https://doi.org/10.1155/2014/460196
work_keys_str_mv AT qiumingliu secrecythroughputininhomogeneouswirelessnetworkswithnonuniformtraffic
AT liyu secrecythroughputininhomogeneouswirelessnetworkswithnonuniformtraffic
AT pengyang secrecythroughputininhomogeneouswirelessnetworkswithnonuniformtraffic
AT zuhaoliu secrecythroughputininhomogeneouswirelessnetworkswithnonuniformtraffic