Visible to the public Analysis of Local Secure Connectivity of Legitimate User in Stochastic Wireless Networks

TitleAnalysis of Local Secure Connectivity of Legitimate User in Stochastic Wireless Networks
Publication TypeConference Paper
Year of Publication2019
AuthorsDung, L. T., Tran, H. T. K., Hoa, N. T. T., Choi, S.
Conference Name2019 3rd International Conference on Recent Advances in Signal Processing, Telecommunications Computing (SigTelCom)
KeywordsCommunication system security, corresponding isolated secure probability, density ratio, eavesdropper collusion, fading channels, isolated security probability, legitimate user, local secure connectivity, Monte Carlo methods, Monte-Carlo simulation, physical layer security, probability, pubcrawl, radio networks, Rayleigh channels, Rayleigh fading, Receivers, resilience, Resiliency, Scalability, secure connection probability, secure wireless communication, secure wireless connection, security, Stochastic Computing Security, stochastic networks, Stochastic processes, stochastic wireless networks, telecommunication security, Transmitters, wireless channel conditions, wireless channel fading, wireless channels, wireless networks
AbstractIn this paper, we investigate the local secure connectivity in terms of the probability of existing a secure wireless connection between two legitimate users and the isolated security probability of a legitimate user in stochastic wireless networks. Specifically, the closed-form expressions of the probability that there is a secure wireless communication between two legitimate users are derived first. Then, based on these equations, the corresponding isolated secure probability are given. The characteristics of local secure connectivity are examined in four scenarios combined from two wireless channel conditions (deterministic/Rayleigh fading) and two eavesdropper configurations (non-colluding/colluding). All the derived mathematical equations are validated by the Monte-Carlo simulation. The obtained numerical results in this paper reveal some interesting features of the impact of eavesdropper collusion, wireless channel fading, and density ratio on the secure connection probability and the isolated security probability of legitimate user in stochastic networks.
Citation Keydung_analysis_2019