A Cyber Insurance Approach to Manage Physical Layer Secrecy for Massive MIMO Cellular Networks

Due to the fading and broadcast nature of wireless medium, it is challenging to provide full wireless coverage and secure the transmitted signals from unintended users in cellular networks. As a result, cyber risks, such as service outage and secrecy outage, would inevitably occur and cause loss/damage to the users. To transfer the cyber risks and mitigate the impact of loss, cyber insurance appears to be a promising solution for the economics of wireless services. In this paper, we introduce a cyber insurance framework for wireless users to relieve loss from the cyber risks. In this framework, each user pays a premium to an insurer. If the user experiences an outage, he/she will claim the loss, and the insurer will pay the corresponding %claim or indemnity to the user. Under the network model of a large-scale massive multiple-input multiple- output (MIMO) cellular networks and cyber insurance, we first characterize the user performance in terms of both service outage probability and secrecy outage probability using stochastic geometry analysis. Based on these performance results, we quantify the ruin probability of the cyber insurer, which indicates the chance that the insurer does not have enough capital reserve to afford the claims from the outage users. Through numerical evaluation, we show that the ruin probability of the insurer can be efficiently reduced by equipping a larger number of antennas at base stations or increasing network frequency reuse.

[1]  Martin Haenggi,et al.  Stochastic Geometry for Wireless Networks , 2012 .

[2]  Jorge A. León,et al.  On the distributions of the sup and inf of the classical risk process with exponential claim , 2009 .

[3]  Dusit Niyato,et al.  Exact Performance Analysis of Ambient RF Energy Harvesting Wireless Sensor Networks With Ginibre Point Process , 2016, IEEE Journal on Selected Areas in Communications.

[4]  Kai-Kit Wong,et al.  Secrecy and Energy Efficiency in Massive MIMO Aided Heterogeneous C-RAN: A New Look at Interference , 2016, IEEE Journal of Selected Topics in Signal Processing.

[5]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[6]  Thomas L. Marzetta,et al.  Noncooperative Cellular Wireless with Unlimited Numbers of Base Station Antennas , 2010, IEEE Transactions on Wireless Communications.

[7]  Xiao Lu,et al.  Performance Analysis of Wireless-Powered Relaying with Ambient Backscattering , 2018, 2018 IEEE International Conference on Communications (ICC).

[8]  Xiao Lu,et al.  Self-Sustainable Communications With RF Energy Harvesting: Ginibre Point Process Modeling and Analysis , 2016, IEEE Journal on Selected Areas in Communications.

[9]  Yu Cheng,et al.  Modeling and Analysis of Wireless Sensor Networks With/Without Energy Harvesting Using Ginibre Point Processes , 2017, IEEE Transactions on Wireless Communications.

[10]  Hsiao-Chun Wu,et al.  Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.

[11]  Giuseppe Caire,et al.  Optimal User-Cell Association for Massive MIMO Wireless Networks , 2014, IEEE Transactions on Wireless Communications.

[12]  Jeffrey G. Andrews,et al.  User Association and Interference Management in Massive MIMO HetNets , 2015, IEEE Transactions on Communications.

[13]  A. Lee Swindlehurst,et al.  Detecting passive eavesdroppers in the MIMO wiretap channel , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[14]  Zhu Han,et al.  Wireless-Powered Device-to-Device Communications With Ambient Backscattering: Performance Modeling and Analysis , 2017, IEEE Transactions on Wireless Communications.

[15]  Xiao Lu,et al.  Performance Analysis of Ambient RF Energy Harvesting with Repulsive Point Process Modeling , 2015, IEEE Transactions on Wireless Communications.

[16]  H. Vincent Poor,et al.  Cyber Insurance for Heterogeneous Wireless Networks , 2018, IEEE Communications Magazine.

[17]  David C. M. Dickson,et al.  Insurance risk and ruin , 2005 .

[18]  L. Decreusefond,et al.  Efficient simulation of the Ginibre point process , 2015 .

[19]  Hsiao-Hwa Chen,et al.  A Survey on Multiple-Antenna Techniques for Physical Layer Security , 2017, IEEE Communications Surveys & Tutorials.

[20]  Yue Chen,et al.  Spectrum and Energy Efficiency in Massive MIMO Enabled HetNets: A Stochastic Geometry Approach , 2015, IEEE Communications Letters.

[21]  Lawrence A. Gordon,et al.  A framework for using insurance for cyber-risk management , 2003, Commun. ACM.

[22]  P. Vallois,et al.  Level crossing times for certain processes without positive jumps , 1997 .

[23]  Martin Haardt,et al.  Zero-forcing methods for downlink spatial multiplexing in multiuser MIMO channels , 2004, IEEE Transactions on Signal Processing.

[24]  Nicolas Privault,et al.  Sensitivity analysis and density estimation for finite-time ruin probabilities , 2009 .

[25]  Claude Lefèvre,et al.  The probability of ruin in finite time with discrete claim size distribution , 1997 .

[26]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[27]  Wei Yu,et al.  Large-scale MIMO versus network MIMO for multicell interference mitigation , 2014, 2014 IEEE 15th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).