The Secrecy Outage Probability for the th Closest Legitimate User in Stochastic Networks

J Bai, X Tao, J Xu, Q Cui - IEEE communications letters, 2014 - ieeexplore.ieee.org
Motivated by information-theoretic security, the Poisson model for secure connectivity in
stochastic networks has recently received great attention. Although several expressions for …

Asymptotic secrecy analysis of random networks with colluding eavesdroppers

S Vuppala, G Abreu - IEEE Systems Journal, 2016 - ieeexplore.ieee.org
We perform an analysis of the secrecy outage and transmission capacity of random
networks under Nakagami-m fading with colluding eavesdroppers, in the asymptotic case of …

Secrecy outage in correlated Nakagami-m fading channels

W Liu, S Vuppala, G Abreu… - 2014 IEEE 25th Annual …, 2014 - ieeexplore.ieee.org
Correlation between the legitimate receiver and the eavesdropper has been seldom
considered in the literature when evaluating secrecy metrics in stochastic wireless networks …

Secure communication in stochastic wireless networks

PC Pinto, J Barros, MZ Win - arXiv preprint arXiv:1001.3697, 2010 - arxiv.org
Information-theoretic security--widely accepted as the strictest notion of security--relies on
channel coding techniques that exploit the inherent randomness of the propagation …

Secure communication in stochastic wireless networks—Part I: Connectivity

PC Pinto, J Barros, MZ Win - IEEE Transactions on Information …, 2011 - ieeexplore.ieee.org
The ability to exchange secret information is critical to many commercial, governmental, and
military networks. Information-theoretic security-widely accepted as the strictest notion of …

On ergodic secrecy capacity of random wireless networks with protected zones

W Liu, Z Ding, T Ratnarajah… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
In this paper, we investigate physical-layer security in a random wireless network where
both legitimate and eavesdropping nodes are randomly deployed. In the first scenario, we …

Secrecy outage in random wireless networks subjected to fading

S Vuppala, G Abreu - … on Personal, Indoor, and Mobile Radio …, 2013 - ieeexplore.ieee.org
We investigated the secrecy outage of unicast channels in random networks exposed to
unknown numbers of randomly located eavesdroppers, obtaining original expressions …

On secrecy capacity scaling in wireless networks

OO Koyluoglu, CE Koksal… - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
This paper studies the achievable secure rate per source-destination pair in wireless
networks. First, a path loss model is considered, where the legitimate and eavesdropper …

Secrecy transmission capacity in noisy wireless ad hoc networks

J Zhu, Y Chen, Y Shen, O Takahashi, X Jiang… - Ad hoc networks, 2014 - Elsevier
This paper considers the transmission of confidential messages over noisy wireless ad hoc
networks, where both background noise and interference from concurrent transmitters affect …

Secrecy transmission capacity of random networks

S Vuppala, G Abreu - 2013 Asilomar Conference on Signals …, 2013 - ieeexplore.ieee.org
We investigate the secrecy transmission capacity of random networks with Nakagami-m
fading. Using a model that accounts for uncertainties both in node locations (distances) and …