Tradeoff between delay and physical layer security in wireless networks

Y Zhong, X Ge, T Han, Q Li… - IEEE Journal on Selected …, 2018 - ieeexplore.ieee.org
Exchange of crucial and confidential information leads to the unprecedented attention on the
security problem in wireless networks. Even though the security has been studied in a …

Asymptotic analysis on secrecy capacity in large-scale wireless networks

J Zhang, L Fu, X Wang - IEEE/ACM Transactions on …, 2013 - ieeexplore.ieee.org
Since wireless channel is vulnerable to eavesdroppers, the secrecy during message
delivery is a major concern in many applications such as commercial, governmental, and …

Throughput maximization in multi-hop wireless networks under a secrecy constraint

PHJ Nardelli, H Alves, CHM De Lima, M Latva-Aho - Computer Networks, 2016 - Elsevier
This paper analyzes the achievable throughput of multi-hop sensor networks for industrial
applications under a secrecy constraint and malicious jamming. The evaluation scenario …

Impact of channel-dependent variation of path loss exponent on wireless information-theoretic security

T Chrysikos, S Kotsopoulos - 2009 Wireless …, 2009 - ieeexplore.ieee.org
Recent published works have manifested a renewed interest in the impact of the wireless
channel itself on the achievable level of secure information exchange between two or more …

On ergodic secrecy capacity of random wireless networks with protected zones

W Liu, Z Ding, T Ratnarajah… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
In this paper, we investigate physical-layer security in a random wireless network where
both legitimate and eavesdropping nodes are randomly deployed. In the first scenario, we …

Impact of secrecy on capacity in large-scale wireless networks

J Zhang, L Fu, X Wang - 2012 Proceedings IEEE INFOCOM, 2012 - ieeexplore.ieee.org
Since wireless channel is vulnerable to eavesdroppers, the secrecy during message
delivery is a major concern in many applications such as commercial, governmental and …

Optimal secrecy capacity-delay tradeoff in large-scale mobile ad hoc networks

X Cao, J Zhang, L Fu, W Wu… - IEEE/ACM Transactions …, 2015 - ieeexplore.ieee.org
In this paper, we investigate the impact of information-theoretic secrecy constraint on the
capacity and delay of mobile ad hoc networks (MANETs) with mobile legitimate nodes and …

On the delay/throughput-security tradeoff in wiretap TDMA networks with buffered nodes

A El Shafie, N Al-Dhahir, Z Ding… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In this paper, we investigate the tradeoff between security and throughput and between
security and queuing delay in wiretap time-division multiple access (TDMA) networks. We …

On secrecy capacity scaling in wireless networks

OO Koyluoglu, CE Koksal… - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
This paper studies the achievable secure rate per source-destination pair in wireless
networks. First, a path loss model is considered, where the legitimate and eavesdropper …

Enhanced secrecy in stochastic wireless networks: Artificial noise with secrecy protected zone

SH Chae, W Choi, JH Lee… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Recently, the use of artificial noise has attracted considerable attention in enhancing the
physical-layer security of wireless systems. However, the interaction between artificially …