Secrecy Throughput in Inhomogeneous Wireless Networks with Nonuniform Traffic
We investigate the secrecy throughput of inhomogeneous wireless network, especially in cases of independent and uniform eavesdropper with single antenna and multiple antennas. Towards the inhomogeneous distribution of legitimate nodes, we novelly construct a circular percolation model under the idea...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2014-10-01
|
Series: | International Journal of Distributed Sensor Networks |
Online Access: | https://doi.org/10.1155/2014/460196 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1832553131971444736 |
---|---|
author | Qiuming Liu Li Yu Peng Yang Zuhao Liu |
author_facet | Qiuming Liu Li Yu Peng Yang Zuhao Liu |
author_sort | Qiuming Liu |
collection | DOAJ |
description | We investigate the secrecy throughput of inhomogeneous wireless network, especially in cases of independent and uniform eavesdropper with single antenna and multiple antennas. Towards the inhomogeneous distribution of legitimate nodes, we novelly construct a circular percolation model under the idea of transforming “inhomogeneous” to “homogeneous.” Correspondingly, the information is transmitted by two ways: intracluster transmission and intercluster transmission. For intracluster transmission, a per-node secrecy throughput of Ω ( 1 / n 1 - v ( 1 - v ) log n ) is derived by circular percolation model, where n and n v represent the number of nodes and clusters in the network, respectively. As for intercluster case, a connection called “information pipelines” is built. Then the per-node secrecy throughput of Ω Φ _ / n can be obtained, where Φ _ denotes the minimum node density in the network. Moreover, when the eavesdropper is equipped with Ψ ( n ) antennas, the per-node secrecy throughput of Ω ( 1 / n 1 - v ( 1 - v ) log n Ψ - 2 / α ( n ) ) and Ω ( ( Φ _ / n ) Ψ - 2 / α ( n ) ) is achieved for intracluster and intercluster transmission, respectively. |
format | Article |
id | doaj-art-7668e726b39a446db94db11587c948fe |
institution | Kabale University |
issn | 1550-1477 |
language | English |
publishDate | 2014-10-01 |
publisher | Wiley |
record_format | Article |
series | International Journal of Distributed Sensor Networks |
spelling | doaj-art-7668e726b39a446db94db11587c948fe2025-02-03T05:55:22ZengWileyInternational Journal of Distributed Sensor Networks1550-14772014-10-011010.1155/2014/460196460196Secrecy Throughput in Inhomogeneous Wireless Networks with Nonuniform TrafficQiuming Liu0Li Yu1Peng Yang2Zuhao Liu3 Nanchang of Jiangxi University of Science and Technology (JXUST), Nanchang 330013, China The Department of Electronics and Information Engineering, Huazhong University of Science and Technology (HUST), Wuhan 430074, China The Department of Electronics and Information Engineering, Huazhong University of Science and Technology (HUST), Wuhan 430074, China China Yangtze Power Co., Ltd., Yichang 443002, ChinaWe investigate the secrecy throughput of inhomogeneous wireless network, especially in cases of independent and uniform eavesdropper with single antenna and multiple antennas. Towards the inhomogeneous distribution of legitimate nodes, we novelly construct a circular percolation model under the idea of transforming “inhomogeneous” to “homogeneous.” Correspondingly, the information is transmitted by two ways: intracluster transmission and intercluster transmission. For intracluster transmission, a per-node secrecy throughput of Ω ( 1 / n 1 - v ( 1 - v ) log n ) is derived by circular percolation model, where n and n v represent the number of nodes and clusters in the network, respectively. As for intercluster case, a connection called “information pipelines” is built. Then the per-node secrecy throughput of Ω Φ _ / n can be obtained, where Φ _ denotes the minimum node density in the network. Moreover, when the eavesdropper is equipped with Ψ ( n ) antennas, the per-node secrecy throughput of Ω ( 1 / n 1 - v ( 1 - v ) log n Ψ - 2 / α ( n ) ) and Ω ( ( Φ _ / n ) Ψ - 2 / α ( n ) ) is achieved for intracluster and intercluster transmission, respectively.https://doi.org/10.1155/2014/460196 |
spellingShingle | Qiuming Liu Li Yu Peng Yang Zuhao Liu Secrecy Throughput in Inhomogeneous Wireless Networks with Nonuniform Traffic International Journal of Distributed Sensor Networks |
title | Secrecy Throughput in Inhomogeneous Wireless Networks with Nonuniform Traffic |
title_full | Secrecy Throughput in Inhomogeneous Wireless Networks with Nonuniform Traffic |
title_fullStr | Secrecy Throughput in Inhomogeneous Wireless Networks with Nonuniform Traffic |
title_full_unstemmed | Secrecy Throughput in Inhomogeneous Wireless Networks with Nonuniform Traffic |
title_short | Secrecy Throughput in Inhomogeneous Wireless Networks with Nonuniform Traffic |
title_sort | secrecy throughput in inhomogeneous wireless networks with nonuniform traffic |
url | https://doi.org/10.1155/2014/460196 |
work_keys_str_mv | AT qiumingliu secrecythroughputininhomogeneouswirelessnetworkswithnonuniformtraffic AT liyu secrecythroughputininhomogeneouswirelessnetworkswithnonuniformtraffic AT pengyang secrecythroughputininhomogeneouswirelessnetworkswithnonuniformtraffic AT zuhaoliu secrecythroughputininhomogeneouswirelessnetworkswithnonuniformtraffic |