“…For a given and , the secrecy throughput of the legitimate link associated with the th transmitter, conditioned on , is given by (30) Similar to the conditional network secrecy rate defined in Section III-B, the conditional network secrecy throughput originated from the legitimate nodes in a bounded set is defined as (31) Then, the network secrecy throughput density is given by (32) which results in (33) In (33), is the average secrecy throughput of a typical link in the network with the legitimate transmitter placed in the origin. Specifically, we can write 18 (34) The evaluation of network secrecy metrics, given by (20), (24), and (33), requires the statistical characterization of and , whose CDF and PDF are derived in the following.…”