Download Now Free registration required
Information-theoretic security constraints reduce the connectivity of wireless networks in the presence of eavesdroppers, which motivates better modeling of such networks and the development of techniques that are robust to eavesdropping. In this paper, the authors are concerned with the existence of secure connections from a typical transmitter to the legitimate receiver(s) over fading channels, where the legitimate nodes and eavesdroppers are all randomly located. They consider non-colluding and colluding eavesdroppers, and derive the network secure connectivity for both eavesdropper strategies.
- Format: PDF
- Size: 263.18 KB