Physical Layer Security in Heterogeneous Networks With Jammer Selection and Full-Duplex Users

In this paper, we enhance physical layer security for downlink heterogeneous networks by using friendly jammers and full-duplex users. The jammers are selected to transmit jamming signal if their interfering power on the scheduled users is below a threshold, meanwhile the scheduled users confound the eavesdroppers using artificial noise by full-duplexing. Using the tools of stochastic geometry, we derive the expressions of connection probability and secrecy probability. In particular, the locations of active jammers are modeled by a modified Poisson hole process. Determining the jammer selection threshold is further investigated for connection probability maximization subject to the security constraints. A greedy algorithm is proposed to efficiently solve this problem. The accuracy of the theoretical analysis and the efficiency of the proposed algorithm are evaluated by numerical simulations.

[1]  Huiming Wang,et al.  Opportunistic Jamming for Enhancing Security: Stochastic Geometry Modeling and Analysis , 2016, IEEE Transactions on Vehicular Technology.

[2]  Xiangyun Zhou,et al.  Secure Routing in Multihop Wireless Ad-Hoc Networks With Decode-and-Forward Relaying , 2016, IEEE Transactions on Communications.

[3]  Xiaohu You,et al.  A Tractable Approach to Uplink Spectral Efficiency of Two-Tier Massive MIMO Cellular HetNets , 2016, IEEE Communications Letters.

[4]  Marwan Krunz,et al.  Exploiting Full-Duplex Receivers for Achieving Secret Communications in Multiuser MISO Networks , 2016, IEEE Transactions on Communications.

[5]  Ekram Hossain,et al.  On Stochastic Geometry Modeling of Cellular Uplink Transmission With Truncated Channel Inversion Power Control , 2014, IEEE Transactions on Wireless Communications.

[6]  François Baccelli,et al.  Stochastic Geometry and Wireless Networks, Volume 1: Theory , 2009, Found. Trends Netw..

[7]  Dongfeng Yuan,et al.  Improving Physical Layer Security for MISO Systems via Using Artificial Noise , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).

[8]  Ranjan K. Mallik,et al.  Physical Layer Security in Three-Tier Wireless Sensor Networks: A Stochastic Geometry Approach , 2016, IEEE Transactions on Information Forensics and Security.

[9]  Jeffrey G. Andrews,et al.  Joint Rate and SINR Coverage Analysis for Decoupled Uplink-Downlink Biased Cell Associations in HetNets , 2014, IEEE Transactions on Wireless Communications.

[10]  Bartlomiej Blaszczyszyn,et al.  Clustering Comparison of Point Processes, with Applications to Random Geometric Models , 2012, 1212.5285.

[11]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[12]  Jeffrey G. Andrews,et al.  Physical Layer Security in Downlink Multi-Antenna Cellular Networks , 2013, IEEE Transactions on Communications.

[13]  Suili Feng,et al.  Jammer Selection in Heterogeneous Networks with Full-Duplex Users , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[14]  Donald F. Towsley,et al.  Physical Layer Security in Heterogeneous Cellular Networks , 2016, IEEE Transactions on Communications.

[15]  Wei Yu,et al.  Optimizing User Association and Spectrum Allocation in HetNets: A Utility Perspective , 2014, IEEE Journal on Selected Areas in Communications.

[16]  Suili Feng,et al.  Hybrid Duplex Switching in Heterogeneous Networks , 2016, IEEE Transactions on Wireless Communications.

[17]  Joseph Lipka,et al.  A Table of Integrals , 2010 .

[18]  Meng Zhang,et al.  Artificial Noise Aided Secrecy Information and Power Transfer in OFDMA Systems , 2016, IEEE Transactions on Wireless Communications.

[19]  Jeffrey G. Andrews,et al.  Heterogeneous Cellular Networks with Flexible Cell Association: A Comprehensive Downlink SINR Analysis , 2011, IEEE Transactions on Wireless Communications.

[20]  I. S. Gradshteyn,et al.  Table of Integrals, Series, and Products , 1976 .

[21]  Xiangyun Zhou,et al.  Physical Layer Security in Cellular Networks: A Stochastic Geometry Approach , 2013, IEEE Transactions on Wireless Communications.

[22]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[23]  Mengyu Liu,et al.  Power Allocation for Secure SWIPT Systems With Wireless-Powered Cooperative Jamming , 2017, IEEE Communications Letters.

[24]  Tharmalingam Ratnarajah,et al.  On Ergodic Secrecy Capacity of Random Wireless Networks With Protected Zones , 2016, IEEE Transactions on Vehicular Technology.

[25]  T. Mattfeldt Stochastic Geometry and Its Applications , 1996 .

[26]  Huiming Wang,et al.  Physical Layer Security in Millimeter Wave Cellular Networks , 2016, IEEE Transactions on Wireless Communications.

[27]  Peter Han Joo Chong,et al.  Poisson Hole Process: Theory and Applications to Wireless Networks , 2016, IEEE Transactions on Wireless Communications.

[28]  Huiming Wang,et al.  Secure Communication in Uplink Transmissions: User Selection and Multiuser Secrecy Gain , 2016, IEEE Transactions on Communications.

[29]  Liyun Zhang,et al.  Improving Physical Layer Security for MISO Systems via Using Artificial Noise , 2014, GLOBECOM 2014.

[30]  Tony Q. S. Quek,et al.  Hybrid Full-/Half-Duplex System Analysis in Heterogeneous Wireless Networks , 2014, IEEE Transactions on Wireless Communications.

[31]  Lajos Hanzo,et al.  A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.