On the security region of best source indices in random wireless networks

Satyanarayana Vuppala, Sudip Biswas, Tharmalingam Ratnarajah, Mathini Sellathurai

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Abstract

The secrecy characteristics of random wireless networks considering a generalized fading model, where the communication nodes are equipped with multiple antennas is analyzed. Using stochastic geometric tools, we investigate the secrecy outage probability of such networks from the perspective of the kth best source, which has still not been well characterized in the literature. In particular, we derive the received path gain distributions of the typical destination and the eavesdropper from the k-th best source. Using these results, we derive the secrecy outage probability for two scenarios with respect to the received path gain from any best source and the k-th best source. Furthermore, we introduce a novel concept of security-region based on the k-th best source index. This is pragmatic in creating a protected communication zone for the typical destination. Tractable numerical and simulation results are presented under various assumptions of fading, path loss exponents and antenna figures.

Original languageEnglish
Title of host publication2016 IEEE International Conference on Communications (ICC)
PublisherIEEE
ISBN (Electronic)9781479966646
DOIs
Publication statusPublished - 14 Jul 2016
Event2016 IEEE International Conference on Communications - Kuala Lumpur, Malaysia
Duration: 22 May 201627 May 2016

Publication series

NameIEEE International Conference on Communications
PublisherIEEE
ISSN (Print)1938-1883

Conference

Conference2016 IEEE International Conference on Communications
Abbreviated titleICC 2016
Country/TerritoryMalaysia
CityKuala Lumpur
Period22/05/1627/05/16

Keywords

  • Best source index
  • fading
  • random wireless networks
  • secrecy outage

ASJC Scopus subject areas

  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'On the security region of best source indices in random wireless networks'. Together they form a unique fingerprint.

Cite this