Performance Analysis of a Cache-Aided Wireless Heterogeneous Network With Secrecy Constraints

In this paper, we analyze the impact of caching on the performance of a cache enabled system with heterogeneous traffic where one of the users need to be served with confidential data. In this setup, a wireless helper system always serves a dedicated user and it can also serve a user requesting cached content. A cellular network access point is also available to serve the latter user if it cannot retrieve the requested data from the helper’s cache. The impact of caching and secrecy on throughput and delay performance for each user is then examined when the access point can deploy superposition coding to serve both users simultaneously. Two decoding schemes are considered in this work. The first decoding scheme treats interference from parallel transmissions as noise while the second one utilizes the parallel transmission to apply successive decoding for the intended data. Furthermore, network and cache related factors are identified and their impact on the overall performance of the system are analyzed. In order to find the optimal transmission power allocations, two distinct optimization problems are set in this context comparing the two decoding schemes. This will assist to identify the benefits of the considered decoding schemes for each user satisfying the secrecy requirements of the dedicated user and reducing its impact on the overall performance of the system.

[1]  Donatella Darsena,et al.  Convolutive Superposition for Multicarrier Cognitive Radio Systems , 2016, IEEE Journal on Selected Areas in Communications.

[2]  Suhas N. Diggavi,et al.  Rate and delay for coded caching with carrier aggregation , 2016, 2016 IEEE International Symposium on Information Theory (ISIT).

[3]  Mehdi Bennis,et al.  Living on the edge: The role of proactive caching in 5G wireless networks , 2014, IEEE Communications Magazine.

[4]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.

[5]  H. Vincent Poor,et al.  Secure Communications Over Wireless Broadcast Networks: Stability and Utility Maximization , 2011, IEEE Transactions on Information Forensics and Security.

[6]  Tony Q. S. Quek,et al.  Cooperative Caching and Transmission Design in Cluster-Centric Small Cell Networks , 2016, IEEE Transactions on Wireless Communications.

[7]  Zheng Chen,et al.  Wireless Caching Helper System with Heterogeneous Traffic and Secrecy Constraints , 2019, 2019 IEEE 20th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).

[8]  Tony Q. S. Quek,et al.  Secure Communications for the Two-User Broadcast Channel With Random Traffic , 2018, IEEE Transactions on Information Forensics and Security.

[9]  Amos Lapidoth,et al.  The Gaussian watermarking game , 2000, IEEE Trans. Inf. Theory.

[10]  Zheng Chen,et al.  Probabilistic Caching in Wireless D2D Networks: Cache Hit Optimal Versus Throughput Optimal , 2016, IEEE Communications Letters.

[11]  Alexandros G. Dimakis,et al.  Scaling Behavior for Device-to-Device Communications With Distributed Caching , 2014, IEEE Transactions on Information Theory.

[12]  Anthony Ephremides,et al.  Stable Throughput Region of the Two-User Broadcast Channel , 2016, IEEE Transactions on Communications.

[13]  Yue Wang,et al.  Joint Caching Placement and User Association for Minimizing User Download Delay , 2016, IEEE Access.

[14]  Ling Luo,et al.  Caching-Aided Physical Layer Security in Wireless Cache-Enabled Heterogeneous Networks , 2018, IEEE Access.

[15]  Joseph A. O'Sullivan,et al.  Information-theoretic analysis of information hiding , 2003, IEEE Trans. Inf. Theory.

[16]  Moe Z. Win,et al.  Distributed Network Secrecy , 2013, IEEE Journal on Selected Areas in Communications.

[17]  Yingbin Liang,et al.  Wireless broadcast networks: Reliability, security, and stability , 2008, 2008 Information Theory and Applications Workshop.

[18]  Zhen Li,et al.  Analysis of secrecy performance in fading multiple access wiretap channel with SIC receiver , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.

[19]  Anna Scaglione,et al.  An Amplify-and-Forward Scheme for Spectrum Sharing in Cognitive Radio Channels , 2015, IEEE Transactions on Wireless Communications.

[20]  Sennur Ulukus,et al.  Effects of cooperation on the secrecy of multiple access channels with generalized feedback , 2008, 2008 42nd Annual Conference on Information Sciences and Systems.

[21]  Zheng Chen,et al.  Throughput and Delay Analysis of Wireless Caching Helper Systems With Random Availability , 2017, IEEE Access.

[22]  Alexandros G. Dimakis,et al.  FemtoCaching: Wireless Content Delivery Through Distributed Caching Helpers , 2013, IEEE Transactions on Information Theory.

[23]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[24]  Miguel R. D. Rodrigues,et al.  Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.

[25]  Xiangyun Zhou,et al.  On Secrecy Metrics for Physical Layer Security Over Quasi-Static Fading Channels , 2016, IEEE Transactions on Wireless Communications.

[26]  Roy D. Yates,et al.  Discrete Memoryless Interference and Broadcast Channels With Confidential Messages: Secrecy Rate Regions , 2007, IEEE Transactions on Information Theory.

[27]  Sennur Ulukus,et al.  Secrecy in Cooperative Relay Broadcast Channels , 2008, IEEE Transactions on Information Theory.

[28]  Qian Yang,et al.  Delivery-Secrecy Tradeoff for Cache-Enabled Stochastic Networks: Content Placement Optimization , 2018, IEEE Transactions on Vehicular Technology.

[29]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[30]  K. J. Ray Liu,et al.  Cognitive multiple access via cooperation: Protocol design and performance analysis , 2007, IEEE Transactions on Information Theory.

[31]  Joy Kuri,et al.  Joint scheduling & jamming for data secrecy in wireless networks , 2013, 2013 11th International Symposium and Workshops on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt).

[32]  Babak Hossein Khalaj,et al.  Stability, Rate, and Delay Analysis of Single Bottleneck Caching Networks , 2016, IEEE Transactions on Communications.

[33]  Dongqing Xie,et al.  Hybrid Cache Placement for Physical-Layer Security in Cooperative Networks , 2018, IEEE Access.