Throughput maximization in multi-hop wireless networks under a secrecy constraint

PHJ Nardelli, H Alves, CHM De Lima, M Latva-Aho - Computer Networks, 2016 - Elsevier
This paper analyzes the achievable throughput of multi-hop sensor networks for industrial
applications under a secrecy constraint and malicious jamming. The evaluation scenario …

Asymptotic analysis on secrecy capacity in large-scale wireless networks

J Zhang, L Fu, X Wang - IEEE/ACM Transactions on …, 2013 - ieeexplore.ieee.org
Since wireless channel is vulnerable to eavesdroppers, the secrecy during message
delivery is a major concern in many applications such as commercial, governmental, and …

Impact of secrecy on capacity in large-scale wireless networks

J Zhang, L Fu, X Wang - 2012 Proceedings IEEE INFOCOM, 2012 - ieeexplore.ieee.org
Since wireless channel is vulnerable to eavesdroppers, the secrecy during message
delivery is a major concern in many applications such as commercial, governmental and …

Cooperation for secrecy in wireless networks

F Gabry - 2012 - diva-portal.org
The growth of wireless networks has been considerable over the last decades. Due to the
broadcast nature of these networks, security issues have taken a critical role in today's …

[PDF][PDF] Secrecy on the physical layer in wireless networks

EA Jorswieck, A Wolf, S Gerbracht - Trends in …, 2010 - researchgate.net
This chapter provides a comprehensive state-of-the-art description of the emerging field of
physical layer security. We will consider wireless security from an information theoretic view …

On secrecy capacity scaling in wireless networks

OO Koyluoglu, CE Koksal… - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
This paper studies the achievable secure rate per source-destination pair in wireless
networks. First, a path loss model is considered, where the legitimate and eavesdropper …

On rate, secrecy, and network connectivity tradeoffs for wireless networks

R Zhang, C Comaniciu, HV Poor - IEEE Communications …, 2016 - ieeexplore.ieee.org
A new approach to the characterization of network connectivity under transmission rate and
secrecy constraints is proposed, based on a rate-secrecy graph model. The proposed model …

Optimal secrecy capacity-delay tradeoff in large-scale mobile ad hoc networks

X Cao, J Zhang, L Fu, W Wu… - IEEE/ACM Transactions …, 2015 - ieeexplore.ieee.org
In this paper, we investigate the impact of information-theoretic secrecy constraint on the
capacity and delay of mobile ad hoc networks (MANETs) with mobile legitimate nodes and …

Tradeoff between delay and physical layer security in wireless networks

Y Zhong, X Ge, T Han, Q Li… - IEEE Journal on Selected …, 2018 - ieeexplore.ieee.org
Exchange of crucial and confidential information leads to the unprecedented attention on the
security problem in wireless networks. Even though the security has been studied in a …

Control of wireless networks with secrecy

CE Koksal, O Ercetin, Y Sarikaya - IEEE/ACM Transactions on …, 2012 - ieeexplore.ieee.org
We consider the problem of cross-layer resource allocation in time-varying cellular wireless
networks and incorporate information theoretic secrecy as a quality-of-service constraint …