Boundaries as an Enhancement Technique for Physical Layer Security

In this paper, we study the receiver performance with physical layer security in a Poisson field of interferers. We compare the performance in two deployment scenarios: 1) the receiver is located at the corner of a quadrant and 2) the receiver is located in the infinite plane. When the channel state information (CSI) of the eavesdropper is not available at the transmitter, we calculate the probability of secure connectivity using the Wyner coding scheme and show that hiding the receiver at the corner is beneficial at high rates of the transmitted code words and detrimental at low transmission rates. When the CSI is available, we show that the average secrecy capacity is higher when the receiver is located at the corner, even if the intensity of interferers in this case is four times higher than the intensity of interferers in the bulk. Therefore, boundaries can also be used as a secrecy enhancement technique for high-data-rate applications.

[1]  Imran Shafique Ansari,et al.  Secrecy Outage Performance of Transmit Antenna Selection for MIMO Underlay Cognitive Radio Systems Over Nakagami- $m$ Channels , 2017, IEEE Transactions on Vehicular Technology.

[2]  Carl P. Dettmann,et al.  Temporal Correlation of Interference in Bounded Mobile Ad Hoc Networks With Blockage , 2016, IEEE Communications Letters.

[3]  Halim Yanikomeroglu,et al.  A Simple Approximation of the Aggregate Interference From a Cluster of Many Interferers With Correlated Shadowing , 2014, IEEE Transactions on Wireless Communications.

[4]  S. Srinivasa MODELING INTERFERENCE IN FINITE UNIFORMLY RANDOM NETWORKS , 2007 .

[5]  Carl P. Dettmann,et al.  Distribution of Cell Area in Bounded Poisson Voronoi Tessellations with Application to Secure Local Connectivity , 2016, Journal of Statistical Physics.

[6]  H. Saunders,et al.  Probability, Random Variables and Stochastic Processes (2nd Edition) , 1989 .

[7]  Matthew R. McKay,et al.  Enhancing Secrecy With Multi-Antenna Transmission in Wireless Ad Hoc Networks , 2013, IEEE Transactions on Information Forensics and Security.

[8]  Mohamed-Slim Alouini,et al.  An Overview of Physical Layer Security in Wireless Communication Systems With CSIT Uncertainty , 2016, IEEE Access.

[9]  Harpreet S. Dhillon,et al.  Stochastic Geometry-Based Comparison of Secrecy Enhancement Techniques in D2D Networks , 2017, IEEE Wireless Communications Letters.

[10]  I. Miller Probability, Random Variables, and Stochastic Processes , 1966 .

[11]  Matthew C. Valenti,et al.  The Outage Probability of a Finite Ad Hoc Network in Nakagami Fading , 2012, IEEE Transactions on Communications.

[12]  Salman Durrani,et al.  Outage Probability in Arbitrarily-Shaped Finite Wireless Networks , 2013, IEEE Transactions on Communications.

[13]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[14]  Martin Haenggi,et al.  Spatial and temporal correlation of the interference in ALOHA ad hoc networks , 2009, IEEE Communications Letters.

[15]  Mohamed-Slim Alouini,et al.  The Effect of Spatial Interference Correlation and Jamming on Secrecy in Cellular Networks , 2017, IEEE Wireless Communications Letters.

[16]  Huiming Wang,et al.  Secure MISO Wiretap Channels With Multiantenna Passive Eavesdropper: Artificial Noise vs. Artificial Fast Fading , 2015, IEEE Transactions on Wireless Communications.

[17]  Donald F. Towsley,et al.  Physical Layer Security in Heterogeneous Cellular Networks , 2016, IEEE Transactions on Communications.

[18]  Justin P. Coon,et al.  More is less: Connectivity in fractal regions , 2014, 2015 International Symposium on Wireless Communication Systems (ISWCS).

[19]  Carl P. Dettmann,et al.  Temporal Correlation of Interference and Outage in Mobile Networks over One-Dimensional Finite Regions , 2016, IEEE Transactions on Mobile Computing.

[20]  Wade Trappe,et al.  The challenges facing physical layer security , 2015, IEEE Communications Magazine.

[21]  Matthew R. McKay,et al.  Rethinking the Secrecy Outage Formulation: A Secure Transmission Design Perspective , 2011, IEEE Communications Letters.

[22]  Martin Haenggi,et al.  Interference and Outage in Mobile Random Networks: Expectation, Distribution, and Correlation , 2014, IEEE Transactions on Mobile Computing.

[23]  Jeffrey G. Andrews,et al.  A general approach to SINR-based performance metrics with application to D2D and carrier aggregation , 2013, 2013 Asilomar Conference on Signals, Systems and Computers.

[24]  John G. Proakis,et al.  Probability, random variables and stochastic processes , 1985, IEEE Trans. Acoust. Speech Signal Process..

[25]  Milton Abramowitz,et al.  Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables , 1964 .

[26]  Alberto Zanella,et al.  Interference Analysis in a Poisson Field of Nodes of Finite Area , 2009, IEEE Transactions on Vehicular Technology.

[27]  Tong-Xing Zheng,et al.  Physical Layer Security in Random Cellular Networks , 2016, SpringerBriefs in Computer Science.

[28]  Donald F. Towsley,et al.  Multi-Antenna Transmission With Artificial Noise Against Randomly Distributed Eavesdroppers , 2015, IEEE Transactions on Communications.

[29]  Nei Kato,et al.  On Physical Layer Security in Finite-Area Wireless Networks: An Analysis Framework , 2017, 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall).

[30]  Raviraj S. Adve,et al.  Analyzing the Impact of Access Point Density on the Performance of Finite-Area Networks , 2015, IEEE Transactions on Communications.

[31]  Lifeng Wang,et al.  Physical Layer Security of Maximal Ratio Combining in Two-Wave With Diffuse Power Fading Channels , 2014, IEEE Transactions on Information Forensics and Security.

[32]  Tareq Y. Al-Naffouri,et al.  Enhancing Secrecy With Multiantenna Transmission in Millimeter Wave Vehicular Communication Systems , 2016, IEEE Transactions on Vehicular Technology.

[33]  Jeffrey G. Andrews,et al.  Secure Wireless Network Connectivity with Multi-Antenna Transmission , 2011, IEEE Transactions on Wireless Communications.

[34]  Tharmalingam Ratnarajah,et al.  An Analysis on Secure Communication in Millimeter/Micro-Wave Hybrid Networks , 2016, IEEE Transactions on Communications.

[35]  Robert W. Heath,et al.  Device-to-Device Millimeter Wave Communications: Interference, Coverage, Rate, and Finite Topologies , 2015, IEEE Transactions on Wireless Communications.

[36]  M. Abramowitz,et al.  Handbook of Mathematical Functions With Formulas, Graphs and Mathematical Tables (National Bureau of Standards Applied Mathematics Series No. 55) , 1965 .

[37]  Jeffrey G. Andrews,et al.  A Tractable Approach to Coverage and Rate in Cellular Networks , 2010, IEEE Transactions on Communications.

[38]  Moe Z. Win,et al.  Secure Communication in Stochastic Wireless Networks—Part I: Connectivity , 2012, IEEE Transactions on Information Forensics and Security.

[39]  Salman Durrani,et al.  Device-to-Device Communication Underlaying a Finite Cellular Network Region , 2015, IEEE Transactions on Wireless Communications.

[40]  Martin Haenggi The secrecy graph and some of its properties , 2008, 2008 IEEE International Symposium on Information Theory.

[41]  Jeffrey G. Andrews,et al.  On the Throughput Cost of Physical Layer Security in Decentralized Wireless Networks , 2010, IEEE Transactions on Wireless Communications.

[42]  Moe Z. Win,et al.  Secure Communication in Stochastic Wireless Networks , 2010, ArXiv.

[43]  Justin P. Coon,et al.  Full Connectivity: Corners, Edges and Faces , 2012, ArXiv.

[44]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[45]  Victor C. M. Leung,et al.  Improving physical-layer security in wireless communications using diversity techniques , 2014, IEEE Network.

[46]  Ranjan K. Mallik,et al.  Physical Layer Security in Three-Tier Wireless Sensor Networks: A Stochastic Geometry Approach , 2016, IEEE Transactions on Information Forensics and Security.

[47]  Zhu Han,et al.  Physical Layer Security in Wireless Ad Hoc Networks Under A Hybrid Full-/Half-Duplex Receiver Deployment Strategy , 2017, IEEE Transactions on Wireless Communications.

[48]  Kalle Ruttik,et al.  Computation of Aggregate Interference from Multiple Secondary Transmitters , 2011, IEEE Communications Letters.

[49]  Xiangyun Zhou,et al.  Wireless Physical Layer Security with Imperfect Channel State Information: A Survey , 2013, ArXiv.

[50]  Moe Z. Win,et al.  Continuum percolation in the intrinsically secure communications graph , 2010, 2010 International Symposium On Information Theory & Its Applications.