Date Added: May 2012
Upper layer wireless security relies on the computational intractability assumption for solving certain number theoretic problems. These methods can be complemented by techniques that exploit, at the physical layer, the intrinsic properties of the wireless channel and interference. This paper considers communications with intrinsic secrecy in the presence of spatially distributed nodes, namely legitimate users, eavesdroppers, and interferers. The authors characterize the role of aggregate interference on intrinsic network secrecy, providing insights into regimes in which interference is beneficial for network secrecy.