{"id":"https://openalex.org/W2028974285","doi":"https://doi.org/10.1109/infcom.2012.6195757","title":"Impact of secrecy on capacity in large-scale wireless networks","display_name":"Impact of secrecy on capacity in large-scale wireless networks","publication_year":2012,"publication_date":"2012-03-01","ids":{"openalex":"https://openalex.org/W2028974285","doi":"https://doi.org/10.1109/infcom.2012.6195757","mag":"2028974285"},"language":"en","primary_location":{"id":"doi:10.1109/infcom.2012.6195757","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infcom.2012.6195757","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 Proceedings IEEE INFOCOM","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004595691","display_name":"Jinbei Zhang","orcid":"https://orcid.org/0000-0003-2348-1970"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jinbei Zhang","raw_affiliation_strings":["Dept. of Electronic Engineering, Shanghai Jiao Tong University, China","[Department of Electronic Engineering, Shanghai Jiao Tong University, China]"],"affiliations":[{"raw_affiliation_string":"Dept. of Electronic Engineering, Shanghai Jiao Tong University, China","institution_ids":["https://openalex.org/I183067930"]},{"raw_affiliation_string":"[Department of Electronic Engineering, Shanghai Jiao Tong University, China]","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048486573","display_name":"Luoyi Fu","orcid":"https://orcid.org/0000-0001-7796-9168"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Luoyi Fu","raw_affiliation_strings":["Dept. of Electronic Engineering, Shanghai Jiao Tong University, China","[Department of Electronic Engineering, Shanghai Jiao Tong University, China]"],"affiliations":[{"raw_affiliation_string":"Dept. of Electronic Engineering, Shanghai Jiao Tong University, China","institution_ids":["https://openalex.org/I183067930"]},{"raw_affiliation_string":"[Department of Electronic Engineering, Shanghai Jiao Tong University, China]","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5034483183","display_name":"Xinbing Wang","orcid":"https://orcid.org/0000-0002-0357-8356"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xinbing Wang","raw_affiliation_strings":["Dept. of Electronic Engineering, Shanghai Jiao Tong University, China","[Department of Electronic Engineering, Shanghai Jiao Tong University, China]"],"affiliations":[{"raw_affiliation_string":"Dept. of Electronic Engineering, Shanghai Jiao Tong University, China","institution_ids":["https://openalex.org/I183067930"]},{"raw_affiliation_string":"[Department of Electronic Engineering, Shanghai Jiao Tong University, China]","institution_ids":["https://openalex.org/I183067930"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5004595691"],"corresponding_institution_ids":["https://openalex.org/I183067930"],"apc_list":null,"apc_paid":null,"fwci":2.7388,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.90717207,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"3051","last_page":"3055"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11392","display_name":"Energy Harvesting in Wireless Networks","score":0.9909999966621399,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.9317306280136108},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.6000276803970337},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5520857572555542},{"id":"https://openalex.org/keywords/constraint","display_name":"Constraint (computer-aided design)","score":0.5083741545677185},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.503579318523407},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.49190807342529297},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.48905476927757263},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.4637598991394043},{"id":"https://openalex.org/keywords/information-theoretic-security","display_name":"Information-theoretic security","score":0.44441336393356323},{"id":"https://openalex.org/keywords/topology","display_name":"Topology (electrical circuits)","score":0.3376210033893585},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2933410406112671},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.22939255833625793},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.20498162508010864},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.17040905356407166},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.1313651204109192}],"concepts":[{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.9317306280136108},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.6000276803970337},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5520857572555542},{"id":"https://openalex.org/C2776036281","wikidata":"https://www.wikidata.org/wiki/Q48769818","display_name":"Constraint (computer-aided design)","level":2,"score":0.5083741545677185},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.503579318523407},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.49190807342529297},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.48905476927757263},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.4637598991394043},{"id":"https://openalex.org/C47191418","wikidata":"https://www.wikidata.org/wiki/Q3510462","display_name":"Information-theoretic security","level":3,"score":0.44441336393356323},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.3376210033893585},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2933410406112671},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.22939255833625793},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.20498162508010864},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.17040905356407166},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.1313651204109192},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/infcom.2012.6195757","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infcom.2012.6195757","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 Proceedings IEEE INFOCOM","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.724.4166","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.724.4166","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://iwct.sjtu.edu.cn/Personal/xwang8/paper/INFOCOM2012_Secrecy_Capacity.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.728.3666","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.728.3666","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://iwct.sjtu.edu.cn/Personal/xwang8/paper/INFOCOM2012_Secrecy_Capacity_Techreport.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5400000214576721,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W157873018","https://openalex.org/W630423399","https://openalex.org/W2007529001","https://openalex.org/W2043769961","https://openalex.org/W2056746002","https://openalex.org/W2057399436","https://openalex.org/W2057411153","https://openalex.org/W2069091932","https://openalex.org/W2104562009","https://openalex.org/W2109394932","https://openalex.org/W2112027676","https://openalex.org/W2120925548","https://openalex.org/W2122125652","https://openalex.org/W2126906340","https://openalex.org/W2127066052","https://openalex.org/W2129836086","https://openalex.org/W2133286957","https://openalex.org/W2133406100","https://openalex.org/W2135356058","https://openalex.org/W2137775453","https://openalex.org/W2144007657","https://openalex.org/W2145913720","https://openalex.org/W2148967920","https://openalex.org/W2149959815","https://openalex.org/W2153646424","https://openalex.org/W2153811089","https://openalex.org/W2156214717","https://openalex.org/W2159753313","https://openalex.org/W2161725792","https://openalex.org/W2168527529","https://openalex.org/W2171471095","https://openalex.org/W6664822211"],"related_works":["https://openalex.org/W2150528942","https://openalex.org/W2114007974","https://openalex.org/W2022046490","https://openalex.org/W2154832352","https://openalex.org/W1483037127","https://openalex.org/W2898567960","https://openalex.org/W4387963661","https://openalex.org/W2340481533","https://openalex.org/W2036210457","https://openalex.org/W2369043755"],"abstract_inverted_index":{"Since":[0],"wireless":[1],"channel":[2,48],"is":[3,12,38,94,126,191,200],"vulnerable":[4],"to":[5,79,161],"eavesdroppers,":[6],"the":[7,41,45,84,90,100,105,108,118,142,192,205,209],"secrecy":[8,30,42,92,110,152],"during":[9],"message":[10],"delivery":[11],"a":[13,81,201],"major":[14],"concern":[15],"in":[16,31,97],"many":[17],"applications":[18],"such":[19],"as":[20,141],"commercial,":[21],"governmental":[22],"and":[23,34,47,71,138,159,208],"military":[24],"networks.":[25],"This":[26],"paper":[27],"investigates":[28],"information-theoretic":[29],"large-scale":[32],"networks":[33],"studies":[35],"how":[36],"capacity":[37,93,111,153],"affected":[39,96],"by":[40,99,164],"constraint":[43],"where":[44,64,75,189],"locations":[46],"state":[49],"information":[50],"(CSI)":[51],"of":[52,102,112,144],"eavesdroppers":[53,65,76,145],"are":[54,154],"both":[55,157],"unknown.":[56],"We":[57,196],"consider":[58],"two":[59],"scenarios:":[60],"1)":[61],"non-colluding":[62,85],"case":[63,74],"can":[66,77,114],"only":[67],"decode":[68,80],"messages":[69],"individually;":[70],"2)":[72],"colluding":[73,106],"collude":[78],"message.":[82],"For":[83,104],"case,":[86,107],"we":[87],"show":[88,197],"that":[89,198],"network":[91,151],"not":[95],"order-sense":[98],"presence":[101],"eavesdroppers.":[103],"per-node":[109],"\u0398(1/\u221an)":[113],"be":[115,162],"achieved":[116],"when":[117,167],"eavesdropper":[119],"density":[120,143],"\u03c8":[121,168,180],"<sub":[122,169,181],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[123,129,170,176,182],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">e</sub>":[124,171,183],"(n)":[125,172,184],"O(n":[127,174],"<sup":[128,175],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">-\u03b2</sup>":[130,177],"),":[131],"for":[132,156],"any":[133],"constant":[134],"\u03b2":[135],">;":[136],"0":[137],"decreases":[139],"monotonously":[140],"increases.":[146],"The":[147],"upper":[148],"bounds":[149],"on":[150],"derived":[155],"cases":[158],"shown":[160],"achievable":[163,210],"our":[165],"scheme":[166],"=":[173,185],")":[178],"or":[179],"\u03a9(log":[186],"\u03b1-2/\u03b1":[187],"n),":[188],"\u03b1":[190],"path":[193],"loss":[194],"gain.":[195],"there":[199],"clear":[202],"tradeoff":[203],"between":[204],"security":[206],"constraints":[207],"capacity.":[211]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":4},{"year":2013,"cited_by_count":5}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
