Physical layer security strategies for downlink heterogeneous cloud radio access networks

Abstract Cloud radio access networks (C-RANs) were proposed as promising solutions to increase both spectrum and energy efficiency performance in next generation wireless communication systems. Much works discussed the concrete implementation technology to justify the huge development potential of C-RAN. However, only a few litterateurs focused on characterizing the physical layer security in the downlink. The authors studied the physical layer security in downlink heterogeneous C-RAN systems in the article. To characterize the random deployment of remote radio units (RRUs) with single antenna configuration, the stochastic geometry is based to evaluate the proposals' secrecy transmission capacity performances, where the closed-form expressions are derived. Furthermore, two security strategies based on eavesdropper neutralization region to protect the target RRU user against eavesdropping were presented and analyzed. Simulation illustrates the secrecy transmission capacity performance limits on different system parameters. The presented security strategies show a significant enhancement on the secrecy performance.

[1]  Jeffrey G. Andrews,et al.  The Guard Zone in Wireless Ad hoc Networks , 2007, IEEE Transactions on Wireless Communications.

[2]  Jeffrey G. Andrews,et al.  Transmission capacity of wireless ad hoc networks with outage constraints , 2005, IEEE Transactions on Information Theory.

[3]  Vera Stavroulaki,et al.  5G on the Horizon: Key Challenges for the Radio-Access Network , 2013, IEEE Vehicular Technology Magazine.

[4]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[5]  Xiangyun Zhou,et al.  Physical Layer Security in Cellular Networks: A Stochastic Geometry Approach , 2013, IEEE Transactions on Wireless Communications.

[6]  A. Lee Swindlehurst,et al.  Secure Communications via Cooperative Jamming in Two-Hop Relay Systems , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[7]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[8]  Zhu Han,et al.  Joint Relay and Jammer Selection for Secure Two-Way Relay Networks , 2011, IEEE Transactions on Information Forensics and Security.

[9]  Jeffrey G. Andrews,et al.  A new tractable model for cellular coverage , 2010, 2010 48th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[10]  Moe Z. Win,et al.  Percolation and Connectivity in the Intrinsically Secure Communications Graph , 2012, IEEE Transactions on Information Theory.

[11]  Hui Zhao,et al.  Joint power allocation and relay selection for decode-and-forward cooperative relay in secure communication , 2013 .

[12]  Jeffrey G. Andrews,et al.  Stochastic geometry and random graphs for the analysis and design of wireless networks , 2009, IEEE Journal on Selected Areas in Communications.

[13]  John S. Thompson,et al.  Relay selection for secure cooperative networks with jamming , 2009, IEEE Transactions on Wireless Communications.

[14]  H. Vincent Poor,et al.  Secrecy throughput of MANETs with malicious nodes , 2009, 2009 IEEE International Symposium on Information Theory.

[15]  Tony Q. S. Quek,et al.  Throughput Optimization, Spectrum Allocation, and Access Control in Two-Tier Femtocell Networks , 2012, IEEE Journal on Selected Areas in Communications.