On Ergodic Secrecy Capacity of Random Wireless Networks With Protected Zones

被引:65
作者
Liu, Weigang [1 ]
Ding, Zhiguo [2 ]
Ratnarajah, Tharmalingam [1 ]
Xue, Jiang [1 ]
机构
[1] Univ Edinburgh, Inst Digital Commun, Sch Engn, Edinburgh EH9 3JL, Midlothian, Scotland
[2] Univ Lancaster, Sch Comp & Commun, Lancaster LA1 4YW, England
基金
英国工程与自然科学研究理事会;
关键词
Ergodic secrecy capacity; interference; physical-layer security; protected zone; stochastic geometry; SECURE TRANSMISSION; BROADCAST CHANNELS; ARTIFICIAL NOISE; LAYER SECURITY; INTERFERENCE;
D O I
10.1109/TVT.2015.2477315
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we investigate physical-layer security in a random wireless network where both legitimate and eavesdropping nodes are randomly deployed. In the first scenario, we study the basic random network without a protected zone around the source node. The probability density functions (pdfs) for the composite channel gain with both fading and path loss is derived and used to calculate the probability of secure connection and ergodic secrecy capacity. In the second scenario, we consider the use of secrecy protected zone around the source node to enhance the security in a noise-limited network. Here, we study the following two cases: 1) The eavesdroppers are aware of the secrecy protected zone, and 2) the eavesdroppers are unaware of the secrecy protected zone. Moreover, the distribution of the distances between the origin and random nodes outside the secrecy protected zone is derived. In the final scenario, the interferer protected zones around the legitimate receivers are used to improve the physical-layer security by restructuring the interference. The derived analytical results are verified by the Monte Carlo simulations. It is shown that the application of secrecy and interferer protected zones lead to significant improvement in security, depending on different system parameters.
引用
收藏
页码:6146 / 6158
页数:13
相关论文
共 35 条
[1]   Automatic Moving Object Segmentation from Video Sequences Using Alternate Flashing System [J].
Ahn, Jae-Kyun ;
Lee, Dae-Yeon ;
Lee, Chul ;
Kim, Chang-Su .
EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2010,
[2]  
[Anonymous], 2011, IEEE ICC
[3]   Wireless information-theoretic security [J].
Bloch, Matthieu ;
Barros, Joao ;
Rodrigues, Miguel R. D. ;
McLaughlin, Steven W. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) :2515-2534
[4]   Enhanced Secrecy in Stochastic Wireless Networks: Artificial Noise With Secrecy Protected Zone [J].
Chae, Seong Ho ;
Choi, Wan ;
Lee, Jung Hoon ;
Quek, Tony Q. S. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (10) :1617-1628
[5]  
CSISZAR I, 1978, IEEE T INFORM THEORY, V24, P339, DOI 10.1109/TIT.1978.1055892
[6]   Improving Wireless Physical Layer Security via Cooperating Relays [J].
Dong, Lun ;
Han, Zhu ;
Petropulu, Athina P. ;
Poor, H. Vincent .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2010, 58 (03) :1875-1888
[7]   Secrecy Rates in Broadcast Channels with Confidential Messages and External Eavesdroppers [J].
Geraci, Giovanni ;
Singh, Sarabjot ;
Andrews, Jeffrey G. ;
Yuan, Jinhong ;
Collings, Iain B. .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2014, 13 (05) :2931-2943
[8]   On the secrecy capacity of fading channels [J].
Gopala, Praveen Kumar ;
Lai, Lifeng ;
El Gamal, Hesham .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (10) :4687-4698
[9]  
Gradshteyn S., 2014, Table of Integrals, Series, and Products, V8th
[10]   On distances in uniformly random networks [J].
Haenggi, M .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2005, 51 (10) :3584-3586