Physical-layer security in stochastic wireless networks

PC Pinto, J Barros, MZ Win - 2008 11th IEEE Singapore …, 2008 - ieeexplore.ieee.org
Motivated by recent developments in physical-layer security and stochastic geometry, we
aim to characterize the fundamental limits of secure communication in wireless networks …

Secure communication in stochastic wireless networks

PC Pinto, J Barros, MZ Win - arXiv preprint arXiv:1001.3697, 2010 - arxiv.org
Information-theoretic security--widely accepted as the strictest notion of security--relies on
channel coding techniques that exploit the inherent randomness of the propagation …

Secure communication in stochastic wireless networks—Part II: Maximum rate and collusion

PC Pinto, J Barros, MZ Win - IEEE Transactions on Information …, 2011 - ieeexplore.ieee.org
In Part I of this paper, we introduced the intrinsically secure communications graph (iS-
graph)-a random graph which describes the connections that can be established with strong …

Secure communication in stochastic wireless networks—Part I: Connectivity

PC Pinto, J Barros, MZ Win - IEEE Transactions on Information …, 2011 - ieeexplore.ieee.org
The ability to exchange secret information is critical to many commercial, governmental, and
military networks. Information-theoretic security-widely accepted as the strictest notion of …

[HTML][HTML] Percolation in the secrecy graph

A Sarkar, M Haenggi - Discrete Applied Mathematics, 2013 - Elsevier
The secrecy graph is a random geometric graph which is intended to model the connectivity
of wireless networks under secrecy constraints. Directed edges in the graph are present …

The secrecy graph and some of its properties

M Haenggi - 2008 IEEE International Symposium on …, 2008 - ieeexplore.ieee.org
A new random geometric graph model, the so-called secrecy graph, is introduced and
studied. The graph represents a wireless network and includes only edges over which …

Wireless physical-layer security: The case of colluding eavesdroppers

PC Pinto, J Barros, MZ Win - 2009 IEEE international …, 2009 - ieeexplore.ieee.org
We consider the fundamental security limits of stochastic wireless networks in the presence
of colluding eavesdroppers. By establishing a direct connection with the single-input …

The Secrecy Outage Probability for the th Closest Legitimate User in Stochastic Networks

J Bai, X Tao, J Xu, Q Cui - IEEE communications letters, 2014 - ieeexplore.ieee.org
Motivated by information-theoretic security, the Poisson model for secure connectivity in
stochastic networks has recently received great attention. Although several expressions for …

Modeling location uncertainty for eavesdroppers: A secrecy graph approach

S Goel, V Aggarwal, A Yener… - 2010 IEEE International …, 2010 - ieeexplore.ieee.org
In this paper, we consider end-to-end secure communication in a large wireless network,
where the locations of eavesdroppers are uncertain. Our framework attempts to bridge the …

Percolation and connectivity in the intrinsically secure communications graph

PC Pinto, MZ Win - IEEE Transactions on Information Theory, 2012 - ieeexplore.ieee.org
The ability to exchange secret information is critical to many commercial, governmental, and
military networks. The intrinsically secure communications graph (iS-graph) is a random …