Secrecy Capacity Scaling of Large-Scale Cognitive Networks Yitao Chen 1, Jinbei Zhang 1, Xinbing Wang 1, Xiaohua Tian 1, Weijie Wu 1, Fan Fu 2, Chee Wei.

Slides:



Advertisements
Similar presentations
International Technology Alliance In Network & Information Sciences International Technology Alliance In Network & Information Sciences 1 Interference.
Advertisements

Fundamental Relationship between Node Density and Delay in Wireless Ad Hoc Networks with Unreliable Links Shizhen Zhao, Luoyi Fu, Xinbing Wang Department.
Interference Cancellation in Two-Path Successive Relay System with Network Coding Chunbo Luo, Dr. Yu Gong & Prof. Fuchun Zheng School of Systems Engineering.
1 Capacity analysis of mesh networks with omni or directional antennas Jun Zhang and Xiaohua Jia City University of Hong Kong.
The Capacity of Wireless Networks
Mobility Increase the Capacity of Ad-hoc Wireless Network Matthias Gossglauser / David Tse Infocom 2001.
Cognitive Radio in a Frequency-Planned Environment: Can it Work? Erik Axell Erik G. Larsson and Mikael Skoglund, IEEE GLOBECOM, 2007.
* Distributed Algorithms in Multi-channel Wireless Ad Hoc Networks under the SINR Model Dongxiao Yu Department of Computer Science The University of Hong.
Chorus: Collision Resolution for Efficient Wireless Broadcast Xinyu Zhang, Kang G. Shin University of Michigan 1.
R2 R3 R4 R5 AP The throughput does not grow in the same way as wireless demands Limited wireless spectrum & unlimited user demands AP R1 R6.
Queuing Network Models for Delay Analysis of Multihop Wireless Ad Hoc Networks Nabhendra Bisnik and Alhussein Abouzeid Rensselaer Polytechnic Institute.
Enhancing Secrecy With Channel Knowledge
Impact of Mobility and Heterogeneity on Coverage and Energy Consumption in Wireless Sensor Networks Xiao Wang, Xinbing Wang, Jun Zhao Department of Electronic.
The Capacity of Wireless Ad Hoc Networks
MotionCast: On the Capacity and Delay Tradeoffs Chenhui Hu 1, Xinbing Wang 1, Feng Wu 2 1 Institute of Wireless Communication Technology (IWCT) Shanghai.
Researches in MACS Lab Prof. Xiaohua Jia Dept of Computer Science City University of Hong Kong.
DAC: Distributed Asynchronous Cooperation for Wireless Relay Networks 1 Xinyu Zhang, Kang G. Shin University of Michigan.
STOCHASTIC GEOMETRY AND RANDOM GRAPHS FOR THE ANALYSIS AND DESIGN OF WIRELESS NETWORKS Haenggi et al EE 360 : 19 th February 2014.
Optimal Multicast Capacity and Delay Tradeoffs in MANETs: A Global Perspective Yun Wang, Xiaoyu Chu, Xinbing Wang Department of Electronic Engineering.
Special Topics on Algorithmic Aspects of Wireless Networking Donghyun (David) Kim Department of Mathematics and Computer Science North Carolina Central.
Impact of Social Relation and Group Size in Multicast Ad Hoc Networks Yi Qin, Riheng Jia, Jinbei Zhang, Weijie Wu, Xinbing Wang Shanghai Jiao Tong University.
On the Coded Complex Field Network Coding Scheme for Multiuser Cooperative Communications with Regenerative Relays Caixi Key Lab of Information.
COGNITIVE RADIO FOR NEXT-GENERATION WIRELESS NETWORKS: AN APPROACH TO OPPORTUNISTIC CHANNEL SELECTION IN IEEE BASED WIRELESS MESH Dusit Niyato,
International Technology Alliance In Network & Information Sciences International Technology Alliance In Network & Information Sciences 1 Cooperative Wireless.
Fundamental Lower Bound for Node Buffer Size in Intermittently Connected Wireless Networks Yuanzhong Xu, Xinbing Wang Shanghai Jiao Tong University, China.
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
Mobility Increases the Connectivity of K-hop Clustered Wireless Networks Qingsi Wang, Xinbing Wang Department of Electronic Engineering Shanghai Jiao Tong.
Hongyu Gong, Lutian Zhao, Kainan Wang, Weijie Wu, Xinbing Wang
POWER CONTROL IN COGNITIVE RADIO SYSTEMS BASED ON SPECTRUM SENSING SIDE INFORMATION Karama Hamdi, Wei Zhang, and Khaled Ben Letaief The Hong Kong University.
When rate of interferer’s codebook small Does not place burden for destination to decode interference When rate of interferer’s codebook large Treating.
Mobility Weakens the Distinction between Multicast and Unicast Xinbing Wang Dept. of Electronic Engineering Shanghai Jiao Tong University Shanghai, China.
1 Optimal Power Allocation and AP Deployment in Green Wireless Cooperative Communications Xiaoxia Zhang Department of Electrical.
1 Core-PC: A Class of Correlative Power Control Algorithms for Single Channel Mobile Ad Hoc Networks Jun Zhang and Brahim Bensaou The Hong Kong University.
Evolution-cast: Temporal Evolution in Wireless Social Networks and Its Impact on Capacity Luoyi Fu, Jinbei Zhang, Xinbing Wang Department of Electronic.
Improving Capacity and Flexibility of Wireless Mesh Networks by Interface Switching Yunxia Feng, Minglu Li and Min-You Wu Presented by: Yunxia Feng Dept.
Function Computation over Heterogeneous Wireless Sensor Networks Xuanyu Cao, Xinbing Wang, Songwu Lu Department of Electronic Engineering Shanghai Jiao.
Delay-Throughput Tradeoff with Correlated Mobility in Ad-Hoc Networks Shuochao Yao*, Xinbing Wang*, Xiaohua Tian* ‡, Qian Zhang † *Department of Electronic.
1 Energy Efficiency of MIMO Transmissions in Wireless Sensor Networks with Diversity and Multiplexing Gains Wenyu Liu, Xiaohua (Edward) Li and Mo Chen.
MAC Protocols In Sensor Networks.  MAC allows multiple users to share a common channel.  Conflict-free protocols ensure successful transmission. Channel.
1 A Novel Capacity Analysis for Wireless Backhaul Mesh Networks Tein-Yaw David Chung, Kung-Chun Lee, and Hsiao-Chih George Lee Department of Computer Science.
Convergecast with MIMO Luoyi Fu, Yi Qin, Xinbing Wang Department of Electronic Engineering Shanghai Jiao Tong University, China Xue Liu Department of Computer.
JWITC 2013Jan. 19, On the Capacity of Distributed Antenna Systems Lin Dai City University of Hong Kong.
Scaling Laws for Cognitive Radio Network with Heterogeneous Mobile Secondary Users Yingzhe Li, Xinbing Wang, Xiaohua Tian Department of Electronic Engineering.
Xiaobing Wu, Guihai Chen
OFDMA Based Two-hop Cooperative Relay Network Resources Allocation Mohamad Khattar Awad, Xuemin (Sherman) Shen Student Member, IEEE Senior Member, IEEE.
/ 22 1 A Distributed and Efficient Flooding Scheme Using 1-hop Information in Mobile Ad Hoc Networks Hai Liu Xiaohua Jia Peng-Jun Wan Dept. of Comput.
Converge-Cast: On the Capacity and Delay Tradeoffs Xinbing Wang Luoyi Fu Xiaohua Tian Qiuyu Peng Xiaoying Gan Hui Yu Jing Liu Department of Electronic.
Multimedia Transmission Over Cognitive Radio Networks using Decode-and-Forward Multi-Relays and Rateless Coding Abdelaali Chaoub, Elhassane Ibn-Elhaj National.
Advanced Communication Network Joint Throughput Optimization for Wireless Mesh Networks R 戴智斌 R 蔡永斌 Xiang-Yang.
QoS-guaranteed Transmission Scheme Selection for OFDMA Multi-hop Cellular Networks Jemin Lee, Sungsoo Park, Hano Wang, and Daesik Hong, ICC 2007.
On the Topology of Wireless Sensor Networks Sen Yang, Xinbing Wang, Luoyi Fu Department of Electronic Engineering, Shanghai Jiao Tong University, China.
X. Li, W. LiuICC May 11, 2003A Joint Layer Design Smart Contention Resolution Random Access Wireless Networks With Unknown Multiple Users: A Joint.
TCP-Cognizant Adaptive Forward Error Correction in Wireless Networks
Zaid A. Shafeeq Mohammed N. Al-Damluji Al-Ahliyya Amman University Amman - Jordan September
Multiple Frequency Reuse Schemes in the Two-hop IEEE j Wireless Relay Networks with Asymmetrical Topology Weiwei Wang a, Zihua Guo b, Jun Cai c,
Complete Optimal Deployment Patterns for Full-Coverage and k-Connectivity (k ≦ 6) Wireless Sensor Networks Xiaole Bai, Dong Xuan, Ten H. Lai, Ziqiu Yun,
Multicast Scaling Laws with Hierarchical Cooperation Chenhui Hu, Xinbing Wang, Ding Nie, Jun Zhao Shanghai Jiao Tong University, China.
Chance Constrained Robust Energy Efficiency in Cognitive Radio Networks with Channel Uncertainty Yongjun Xu and Xiaohui Zhao College of Communication Engineering,
Junchao Ma +, Wei Lou +, Yanwei Wu *, Xiang-Yang Li *, and Guihai Chen & Energy Efficient TDMA Sleep Scheduling in Wireless Sensor Networks + Department.
Cooperative Resource Management in Cognitive WiMAX with Femto Cells Jin Jin, Baochun Li Department of Electrical and Computer Engineering University of.
A Low Interference Channel Assignment Algorithm for Wireless Mesh Networks Can Que 1,2, Xinming Zhang 1, and Shifang Dai 1 1.Department of Computer Science.
Outline Introduction Type of Multiplexing FDMA TDMA CDMA Future Work
Near-Optimal Spectrum Allocation for Cognitive Radios: A Frequency-Time Auction Perspective Xinyu Wang Department of Electronic Engineering Shanghai.
Group Multicast Capacity in Large Scale Wireless Networks
Combining Dirty-Paper Coding and Artificial Noise for Secrecy
Distributed MIMO Patrick Maechler April 2, 2008.
Jinbei Zhang, Luoyifu, Xinbing Wang
Capacity of Ad Hoc Networks
Riheng Jia, Jinbei Zhang, Xinbing Wang, Xiaohua Tian
Presentation transcript:

Secrecy Capacity Scaling of Large-Scale Cognitive Networks Yitao Chen 1, Jinbei Zhang 1, Xinbing Wang 1, Xiaohua Tian 1, Weijie Wu 1, Fan Fu 2, Chee Wei Tan 3 1 Dept. of Electronic Engineering, Shanghai Jiao Tong University 2 Dept. of Computer Science and Engineering, Shanghai Jiao Tong University 3 Dept. of Computer Science, City University of Hong Kong

2 Outline Introduction Network Model and Definition Independent Eavesdroppers Colluding Eavesdroppers Conclusion

Motivations  Security is a major concern in wireless networks 3 Mobile Payment Virtual Property Privacy Military Communication

4 Motivations  Physical Layer Security   Assume eavesdroppers have infinite computation power   Require the intended receiver should have a stronger channel than eavesdroppers   Provable security capacity  Cryptographic methods   Key distribution   Rapid growth of computation power   Improvement on decoding technology

5 Related works  Secrecy capacity in large-scale networks  Guard zone [9]  Artificial noise + Fading gain (CSI needed) [8]  Using artificial noise generated by receivers to suppress eavesdroppers’ channel quality [11] [9] O. Koyluoglu, E. Koksal, E. Gammel, “On Secrecy Capacity Scaling in Wireless Networks”, IEEE Trans. Inform. Theory, May [8] S. Vasudevan, D. Goeckel and D. Towsley, “Security-capacity Trade-off in Large Wireless Networks using Keyless Secrecy,” in Proc. ACM MobiHoc, Chicago, Illinois, USA, Sept [11] J. Zhang, L. Fu, X. Wang, “Asymptotic analysis on secrecy capacity in large-scale wireless networks,” in IEEE/ACM Trans. Netw., Feb Cited from [8]

6 Motivations  Limited spectrum resources and CR networks  Key questions:  What is the impact of security in cognitive networks?  What is the performance we can achieve?

7 Outline Introduction  Network Model and Definition Independent Eavesdroppers Colluding Eavesdroppers Conclusion

8 Network Model and Definition – I/III Cited from [17] [17] J. I. Choiy, M. Jainy, K. Srinivasany, P. Levis and S. Katti, “Achieving Single Channel, Full Duplex Wireless Communication”, in ACM Mobicom’10, Chicago, USA, Sept

9 Network Model and Definition – II/III  Random permutation traffic, no cross network traffic  Communication Model  Physical Model: Primary user i transmits to primary user j  Define the physical model for secondary users and eavesdroppers similarly. Interference from other primary TXs Interference from other primary RXs Interference from secondary TXs

10 Network Model and Definition – III/III  Definition of Per Hop Secrecy Throughput:  Independent eavesdropper  Colluding eavesdroppers  Definition of Asymptotic Capacity  Similarly, we can define the asymptotic per-node capacity for the secondary network

11 Outline Introduction Network Model and Definition  Independent Eavesdroppers Colluding Eavesdroppers Conclusion

12 Independent Eavesdroppers Successful transmission No eavesdropper can decode the message

13 Independent Eavesdroppers

14 Independent Eavesdroppers

15 Independent Eavesdroppers  Scheduling scheme   Cell Partition Round-Robin Scheduling: Tessellate the network into cells. Different cells take turn to transmit. Secondary users can transmit in non-occupied cells with the guarantee of affecting primary transmissions little. Figure: Simple 9-TDMA

16 Independent Eavesdroppers No order cost comparing to the scenario without security concern!

17 Outline Introduction Network Model and Definition Independent Eavesdroppers  Colluding Eavesdroppers  Difference with previous case Conclusion

 SINR of Colluding Eavesdroppers – maximum ratio combining of SINR Bound the SINR of eavesdroppers:   Disjoint rings with same size.   Eavesdroppers in the same ring has a similar SINR.   Artificial noise + Path loss gain + Cooperation 18 Colluding Eavesdroppers

19

20 Colluding Eavesdroppers  Result comparison Cooperation in cognitive networks helps to increase secrecy capacity, compared to stand-alone networks [11]. [11] J. Zhang, L. Fu, X. Wang, “Asymptotic analysis on secrecy capacity in large-scale wireless networks,” to appear in IEEE/ACM Trans. Netw., 2013.

21 Outline Introduction Network Model and Definition Independent Eavesdroppers’ Case Colluding Eavesdroppers’ Case  Conclusion

22 Conclusion   In this paper, we study physical layer security in cognitive networks.   Our scheme adopting self-interference cancellation is very efficient.   Cooperation between secondary network and primary network in CR networks can help to strengthen physical layer security.

Thank you !