TY - GEN
T1 - Physical layer security in wireless networks with passive and active eavesdroppers
AU - Chorti, Arsenia
AU - Perlaza, Samir M.
AU - Han, Zhu
AU - Poor, H. Vincent
PY - 2012
Y1 - 2012
N2 - Security is becoming an increasingly important issue in wireless communications, to which physical layer approaches can contribute by providing addition resources for securing confidential messages. In this paper, the resilience of multi-user networks to passive and active eavesdropping is investigated. In particular, average secrecy capacities are evaluated in scenarios involving a base station and several terminals, some of which constitute passive or active eavesdroppers. Network resources (e.g. power) are allocated by the base station based on the available channel state information. The average secrecy capacity of such a network is evaluated in the following cases: (i) in the presence of passive eavesdroppers when no side information is available to the base station; (ii) in the presence of passive eavesdroppers with side information available; and (iii) in the presence of a single active eavesdropper with side information available. This investigation demonstrates that substantial secrecy rates are attainable in the presence of passive eavesdroppers as long as minimal side information, e.g. a statistical characterization of the number of potential eavesdroppers, is available to the base station. On the other hand, it is further found that active eavesdroppers can potentially compromise such networks unless statistical inference is employed to restrict their ability to attack.
AB - Security is becoming an increasingly important issue in wireless communications, to which physical layer approaches can contribute by providing addition resources for securing confidential messages. In this paper, the resilience of multi-user networks to passive and active eavesdropping is investigated. In particular, average secrecy capacities are evaluated in scenarios involving a base station and several terminals, some of which constitute passive or active eavesdroppers. Network resources (e.g. power) are allocated by the base station based on the available channel state information. The average secrecy capacity of such a network is evaluated in the following cases: (i) in the presence of passive eavesdroppers when no side information is available to the base station; (ii) in the presence of passive eavesdroppers with side information available; and (iii) in the presence of a single active eavesdropper with side information available. This investigation demonstrates that substantial secrecy rates are attainable in the presence of passive eavesdroppers as long as minimal side information, e.g. a statistical characterization of the number of potential eavesdroppers, is available to the base station. On the other hand, it is further found that active eavesdroppers can potentially compromise such networks unless statistical inference is employed to restrict their ability to attack.
UR - http://www.scopus.com/inward/record.url?scp=84877662582&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84877662582&partnerID=8YFLogxK
U2 - 10.1109/GLOCOM.2012.6503890
DO - 10.1109/GLOCOM.2012.6503890
M3 - Conference contribution
AN - SCOPUS:84877662582
SN - 9781467309219
T3 - Proceedings - IEEE Global Communications Conference, GLOBECOM
SP - 4868
EP - 4873
BT - 2012 IEEE Global Communications Conference, GLOBECOM 2012
T2 - 2012 IEEE Global Communications Conference, GLOBECOM 2012
Y2 - 3 December 2012 through 7 December 2012
ER -