A Tractable Approach to Analyzing the Physical-Layer Security in K-Tier Heterogeneous Cellular Networks

被引:0
作者
Zhong Zhihao [1 ]
Peng Janhua [1 ]
Luo Wenyu [1 ]
Huang Kaizhi [1 ]
机构
[1] Natl Digital Switching Syst Engn & Technol Res Ct, Zhengzhou 450002, Henan Province, Peoples R China
基金
中国国家自然科学基金;
关键词
heterogeneous cellular networks; physical layer security; stochastic geometry; secrecy coverage probability;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
This study proposes a tractable approach to analyze the physical-layer security in the downlink of a multi-tier heterogeneous cellular network. This method is based on stochastic geometry, has low computational complexity, and uses the two-dimensional Poisson point process to model the locations of K-tier base stations and receivers, including those of legitimate users and eavesdroppers. Then, the achievable secrecy rates for an arbitrary user are determined and the upper and lower bounds Of secrecy coverage probability derived on the condition that cross-tier interference is the main contributor to aggregate interference. Finally, our analysis results reveal the innate connections between information-theoretic security and the spatial densities of legitimate and malicious nodes.
引用
收藏
页码:166 / 173
页数:8
相关论文
共 17 条
[1]  
[Anonymous], CHIN J BIOMED ENG
[2]  
DENG Na, 2015, IEEE J SELECTED AREA
[3]   Modeling and Analysis of K-Tier Downlink Heterogeneous Cellular Networks [J].
Dhillon, Harpreet S. ;
Ganti, Radha Krishna ;
Baccelli, Francois ;
Andrews, Jeffrey G. .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2012, 30 (03) :550-560
[4]   Physical Layer Security in Downlink Multi-Antenna Cellular Networks [J].
Geraci, Giovanni ;
Dhillon, Harpreet S. ;
Andrews, Jeffrey G. ;
Yuan, Jinhong ;
Collings, Iain B. .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2014, 62 (06) :2006-2021
[5]   Heterogeneous Cellular Networks: From Theory to Practice [J].
Ghosh, Amitabha ;
Mangalvedhe, Nitin ;
Ratasuk, Rapeepat ;
Mondal, Bishwarup ;
Cudak, Mark ;
Visotsky, Eugene ;
Thomas, Timothy A. ;
Andrews, Jeffrey G. ;
Xia, Ping ;
Jo, Han Shin ;
Dhillon, Harpreet S. ;
Novlan, Thomas D. .
IEEE COMMUNICATIONS MAGAZINE, 2012, 50 (06) :54-64
[6]   The Secrecy Graph and Some of its Properties [J].
Haenggi, Martin .
2008 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, VOLS 1-6, 2008, :539-543
[7]   Modeling Heterogeneous Network Interference Using Poisson Point Processes [J].
Heath, Robert W., Jr. ;
Kountouris, Marios ;
Bai, Tianyang .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2013, 61 (16) :4114-4126
[8]   Secrecy Transmit Beamforming for Heterogeneous Networks [J].
Lv, Tiejun ;
Gao, Hui ;
Yang, Shaoshi .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2015, 33 (06) :1154-1170
[9]  
MIRAHSAN M, 2015, IEEE J SELECTED AREA
[10]  
Mukherjee A., 2010, Chinese Medicine, V1, P1