On Ergodic Secrecy Capacity of Random Wireless Networks With Protected Zones

In this paper, we investigate physical-layer security in a random wireless network where both legitimate and eavesdropping nodes are randomly deployed. In the first scenario, we study the basic random network without a protected zone around the source node. The probability density functions (pdfs) for the composite channel gain with both fading and path loss is derived and used to calculate the probability of secure connection and ergodic secrecy capacity. In the second scenario, we consider the use of secrecy protected zone around the source node to enhance the security in a noise-limited network. Here, we study the following two cases: 1) The eavesdroppers are aware of the secrecy protected zone, and 2) the eavesdroppers are unaware of the secrecy protected zone. Moreover, the distribution of the distances between the origin and random nodes outside the secrecy protected zone is derived. In the final scenario, the interferer protected zones around the legitimate receivers are used to improve the physical-layer security by restructuring the interference. The derived analytical results are verified by the Monte Carlo simulations. It is shown that the application of secrecy and interferer protected zones lead to significant improvement in security, depending on different system parameters.

[1]  Martin Haenggi,et al.  Stochastic Geometry for Wireless Networks , 2012 .

[2]  M. Haenggi,et al.  Interference in Large Wireless Networks , 2009, Found. Trends Netw..

[3]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[4]  Moe Z. Win,et al.  Secure Communication in Stochastic Wireless Networks—Part I: Connectivity , 2012, IEEE Transactions on Information Forensics and Security.

[5]  Moe Z. Win,et al.  Secure Communication in Stochastic Wireless Networks—Part II: Maximum Rate and Collusion , 2012, IEEE Transactions on Information Forensics and Security.

[6]  Wan Choi,et al.  Enhanced Secrecy in Stochastic Wireless Networks: Artificial Noise With Secrecy Protected Zone , 2014, IEEE Transactions on Information Forensics and Security.

[7]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[8]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.

[9]  Can Emre Koksal,et al.  On Secrecy Capacity Scaling in Wireless Networks , 2012, IEEE Trans. Inf. Theory.

[10]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[11]  Kerstin Vogler,et al.  Table Of Integrals Series And Products , 2016 .

[12]  Mazen O. Hasna,et al.  On Ergodic Capacity of Wireless Transmission Subject to Poisson Distributed Interferers over Rayleigh Fading Channels , 2013, 2013 IEEE 77th Vehicular Technology Conference (VTC Spring).

[13]  Hyundong Shin,et al.  Stochastic wireless secure multicasting , 2013, 2013 IEEE International Conference on Communications (ICC).

[14]  Shlomo Shamai,et al.  Secrecy Capacity Region of Fading Broadcast Channels , 2007, 2007 IEEE International Symposium on Information Theory.

[15]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[16]  Shi Jin,et al.  On the ergodic secrecy rate of multiple-antenna wiretap channels using artificial noise and finite-rate feedback , 2011, 2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications.

[17]  João Barros,et al.  Position-Based Jamming for Enhanced Wireless Secrecy , 2011, IEEE Transactions on Information Forensics and Security.

[18]  Yuan Li,et al.  Co‐channel interference in two‐tier heterogeneous networks: analytical model and ergodic capacity , 2016, Trans. Emerg. Telecommun. Technol..

[19]  Jeffrey G. Andrews,et al.  Secure Wireless Network Connectivity with Multi-Antenna Transmission , 2011, IEEE Transactions on Wireless Communications.

[20]  Martin Haenggi,et al.  Interference and Outage in Poisson Cognitive Networks , 2012, IEEE Transactions on Wireless Communications.

[21]  Martin Haenggi,et al.  Mean Interference in Hard-Core Wireless Networks , 2011, IEEE Communications Letters.

[22]  Ananthram Swami,et al.  PHY Layer Security Based on Protected Zone and Artificial Noise , 2013, IEEE Signal Processing Letters.

[23]  Yang Bin Physical Layer Security in Wireless Communication , 2012 .

[24]  Martin Haenggi,et al.  On distances in uniformly random networks , 2005, IEEE Transactions on Information Theory.

[25]  Jeffrey G. Andrews,et al.  On the Throughput Cost of Physical Layer Security in Decentralized Wireless Networks , 2010, IEEE Transactions on Wireless Communications.

[26]  Joseph Lipka,et al.  A Table of Integrals , 2010 .

[27]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[28]  Matthew R. McKay,et al.  Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation , 2010, IEEE Transactions on Vehicular Technology.

[29]  Jeffrey G. Andrews,et al.  Secrecy Rates in Broadcast Channels with Confidential Messages and External Eavesdroppers , 2013, IEEE Transactions on Wireless Communications.

[30]  Matthew R. McKay,et al.  Physical layer security with artificial noise: Secrecy capacity and optimal power allocation , 2009, 2009 3rd International Conference on Signal Processing and Communication Systems.

[31]  Mounir Ghogho,et al.  Physical-Layer Secrecy of MIMO Communications in the Presence of a Poisson Random Field of Eavesdroppers , 2011, 2011 IEEE International Conference on Communications Workshops (ICC).

[32]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[33]  Giuseppe Thadeu Freitas de Abreu,et al.  Unicasting on the Secrecy Graph , 2013, IEEE Transactions on Information Forensics and Security.

[34]  Martin Haenggi A Geometric Interpretation of Fading in Wireless Networks: Theory and Applications , 2008, IEEE Transactions on Information Theory.

[35]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[36]  Martin Haenggi,et al.  Interference and Outage in Doubly Poisson Cognitive Networks , 2010, 2010 Proceedings of 19th International Conference on Computer Communications and Networks.

[37]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.