A secrecy evaluation scheme for infrastructure deployment in radio access network

In order to make a thorough evaluation of the security against eavesdropping in heterogeneous radio access network (RAN) with relays, this paper proposes a novel secrecy graph-based secrecy evaluation scheme for distributed wireless relay networks with eavesdropping present. Our scheme firstly models user and eavesdropper with the nonuniform distributions in a discrete system and decides the best path choice of users and relays for the purpose of security. Secondly, we derive the average eavesdropping effect (AEE) based on the known distribution and arrangement of uplink path, and investigate the derived results and the different relay deployment plans. Taking into account various factors (fluctuation of user traffic, burden limitation of relay etc), we efficiently utilize the available resources to simulate the real scenarios to implement the accurate secrecy evaluations. Finally, the simulation results prove that our proposed scheme outperform the other existing ones.

[1]  Gang Feng,et al.  Cost-Efficient Deployment of Relays for LTE-Advanced Cellular Networks , 2011, 2011 IEEE International Conference on Communications (ICC).

[2]  Mingwei Xu,et al.  A Lightweight IP Fast Reroute Algorithm with Tunneling , 2010, 2010 IEEE International Conference on Communications.

[3]  Vijay K. Bhargava,et al.  Green Cellular Networks: A Survey, Some Research Issues and Challenges , 2011, IEEE Communications Surveys & Tutorials.

[4]  Xi Zhang,et al.  A novel security-oriented cooperative scheme for wireless relay networks in presence of eavesdroppers , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[5]  Bor-Sen Chen,et al.  Mobile Positioning Problem in Manhattan-Like Urban Areas: Uniqueness of Solution, Optimal Deployment of BSs, and Fuzzy Implementation , 2009, IEEE Transactions on Signal Processing.

[6]  Zhu Han,et al.  Joint Optimization of Placement and Bandwidth Reservation for Relays in IEEE 802.16j Mobile Multihop Networks , 2009, 2009 IEEE International Conference on Communications.

[7]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.

[8]  Martin Haenggi The secrecy graph and some of its properties , 2008, 2008 IEEE International Symposium on Information Theory.

[9]  Arne Simonsson,et al.  Deployment Aspects of LTE Pico Nodes , 2011, 2011 IEEE International Conference on Communications Workshops (ICC).

[10]  Xi Fang,et al.  Relay Station Placement for Cooperative Communications in WiMAX Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.