Secrecy performance analysis of hybrid eavesdroppers system using stochastic geometry and random matrix theory

We consider a hybrid eavesdropping wireless system, where the locations of the eavesdroppers are drawn from Poisson point process (PPP). The eavesdroppers work in a half-duplex mode with a certain probability to transfer from eavesdropping mode to jamming mode. Based on the stochastic geometry (SG) and the random matrix theory (RMT), we derive the analytic results for the secrecy outage probability (SOP) and mean secrecy rate (MSR), which are verified by Monte-carlo simulations. We further derive the closed-form results for a special case where some special system parameters are assumed. It is found that the secrecy outage probability increases fast with the increasing of eavesdroppers' density. To improve the secrecy performance, the transmit power should be optimally designed.

[1]  Jeffrey G. Andrews,et al.  Physical Layer Security in Downlink Multi-Antenna Cellular Networks , 2013, IEEE Transactions on Communications.

[2]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[3]  Mérouane Debbah,et al.  Large System Analysis of Linear Precoding in Correlated MISO Broadcast Channels Under Limited Feedback , 2009, IEEE Transactions on Information Theory.

[4]  Hui Chen,et al.  Secrecy performance of the artificial noise assisted broadcast channel with confidential messages and external eavesdroppers , 2016, 2016 IEEE International Conference on Communications (ICC).

[5]  Jamie S. Evans,et al.  Multiuser Transmit Beamforming via Regularized Channel Inversion: A Large System Analysis , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[6]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[7]  Matthew R. McKay,et al.  On the Design of Artificial-Noise-Aided Secure Multi-Antenna Transmission in Slow Fading Channels , 2012, IEEE Transactions on Vehicular Technology.

[8]  A. Lee Swindlehurst,et al.  A vector-perturbation technique for near-capacity multiantenna multiuser communication-part II: perturbation , 2005, IEEE Transactions on Communications.

[9]  Qimei Cui,et al.  Large-System Analysis of Artificial-Noise-Assisted Communication in the Multiuser Downlink: Ergodic Secrecy Sum Rate and Optimal Power Allocation , 2016, IEEE Transactions on Vehicular Technology.

[10]  Jeffrey G. Andrews,et al.  What Will 5G Be? , 2014, IEEE Journal on Selected Areas in Communications.

[11]  Prabhata K. Swamee,et al.  Near Lognormal Distribution , 2002 .

[12]  D. Stoyan,et al.  Stochastic Geometry and Its Applications , 1989 .

[13]  A. Lozano,et al.  What Will 5 G Be ? , 2014 .

[14]  Jeffrey G. Andrews,et al.  Secrecy Rates in Broadcast Channels with Confidential Messages and External Eavesdroppers , 2013, IEEE Transactions on Wireless Communications.

[15]  Zhu Han,et al.  Combating full-duplex active eavesdropper: A game-theoretic perspective , 2016, 2016 IEEE International Conference on Communications (ICC).

[16]  Can Emre Koksal,et al.  On the Secrecy Capacity of Block Fading Channels With a Hybrid Adversary , 2013, IEEE Transactions on Information Theory.

[17]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[18]  Xiangyun Zhou,et al.  Pilot Contamination for Active Eavesdropping , 2012, IEEE Transactions on Wireless Communications.

[19]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[20]  Antonia Maria Tulino,et al.  Random Matrix Theory and Wireless Communications , 2004, Found. Trends Commun. Inf. Theory.

[21]  Geoffrey G. Messier,et al.  Opportunistic Transmission using Large Scale Channel Effects , 2010, IEEE Transactions on Communications.