Secrecy outage analysis of multi-user multi-eavesdropper cellular networks in the face of cochannel interference

被引:0
作者
Yuan Jiang
Jia Zhu
Yulong Zou
机构
[1] SchoolofTelecommunicationsandInformationEngineering,NanjingUniversityofPostsandTelecommunications
关键词
D O I
暂无
中图分类号
TN918 [通信保密与通信安全];
学科分类号
0839 ; 1402 ;
摘要
This paper studies the physical-layer security of a multi-user multi-eavesdropper cellular network, which is composed of multiple users communicating with a base station while the eavesdroppers may intercept the communications from users to the base station(BS). The cellular network is a time-slotted system with simultaneously transmission, in each time slot, a single user is scheduled to transmit messages to BS while the remaining users opportunistically receive information. Considering multiple users available in the cellular network, we present three multi-user scheduling schemes, namely the round-robin scheduling scheme as well as the suboptimal and optimal user scheduling schemes to improve the security of communication(from users to BS) against eavesdropping attacks. We only need to assume that the channel state information(CSI) of the main link spanning from users to BS is known in the suboptimal scheduling. On the contrary, the optimal scheduling is designed by assuming that the CSI of the main link and wiretap link(spanning from users to the eavesdropper) are available. We further carry out secrecy diversity analysis and show that the round-robin always achieves only one diversity order, whereas the suboptimal and optimal user scheduling schemes achieve the full diversity. In addition, numerical results illustrate that the optimal scheduling performs the best and the round-robin has the worst performance in terms of the secrecy outage probability. Last,as the number of users increases, the secrecy outage probabilities of the suboptimal and optimal scheduling schemes decrease significantly.
引用
收藏
页码:68 / 74
页数:7
相关论文
共 9 条
[1]  
Joint Base Station Association and Power Control via Benders' Decomposition.[J].Li Ping Qian;Ying Jun Zhang;Yuan Wu;Jieying Chen.IEEE Transactions on Wireless Communications.2013, 4
[2]   A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks [J].
Fragkiadakis, Alexandros G. ;
Tragos, Elias Z. ;
Askoxylakis, Ioannis G. .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (01) :428-445
[3]   Physical-Layer Security with Multiuser Scheduling in Cognitive Radio Networks [J].
Zou, Yulong ;
Wang, Xianbin ;
Shen, Weiming .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2013, 61 (12) :5103-5113
[4]   Outage Probability Based Power Distribution Between Data and Artificial Noise for Physical Layer Security [J].
Romero-Zurita, Nabil ;
Ghogho, Mounir ;
McLernon, Des .
IEEE SIGNAL PROCESSING LETTERS, 2012, 19 (02) :71-74
[5]   Analytical Performance of MIMO Multichannel Beamforming in the Presence of Unequal Power Cochannel Interference and Noise [J].
Sun, Liang ;
Mckay, Matthew R. ;
Jin, Shi .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2009, 57 (07) :2721-2735
[6]   Guaranteeing secrecy using artificial noise [J].
Goel, Satashu ;
Negi, Rohit .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2008, 7 (06) :2180-2189
[7]   Wireless information-theoretic security [J].
Bloch, Matthieu ;
Barros, Joao ;
Rodrigues, Miguel R. D. ;
McLaughlin, Steven W. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) :2515-2534
[8]  
The Gaussian wire-tap channel..[J].Sik K. Leung-Yan-Cheong;Martin E. Hellman.IEEE Trans. Information Theory.1978, 4
[9]  
The Wire‐Tap Channel.[J].A. D. Wyner.Bell System Technical Journal.1975, 8