On physical layer security in finite-area wireless networks: An analysis framework

Jiajia Liu, Jiahao Dai, Yongpeng Shi, Wen Sun, Nei Kato

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

This paper analyzes the information theoretic secrecy performance in finite-area wireless networks based on a stochastic geometry framework. Unlike most prior works, which explored the physical layer security with a large number of transmitters, legitimate receivers and eavesdroppers in infinite regions, we consider a finite downlink wireless network composing of a transmitter, a legitimate receiver and several eavesdroppers. The legitimate receiver attempts to receive confidential data from the transmitter in the presence of the eavesdroppers. We present the probabilistic characteristics of the achievable secrecy rates and average secrecy rates in both disk regions and regular -sided convex polygon regions. As shown by extensive numerical results, the proposed framework could be leveraged to efficiently analyze the secrecy performance of finite-area networks, and give insights for network designers on how to achieve good secrecy performance in finite-area networks.

Original languageEnglish
Title of host publication2017 IEEE 86th Vehicular Technology Conference, VTC Fall 2017 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1-5
Number of pages5
ISBN (Electronic)9781509059355
DOIs
Publication statusPublished - 2018 Feb 8
Event86th IEEE Vehicular Technology Conference, VTC Fall 2017 - Toronto, Canada
Duration: 2017 Sep 242017 Sep 27

Publication series

NameIEEE Vehicular Technology Conference
Volume2017-September
ISSN (Print)1550-2252

Other

Other86th IEEE Vehicular Technology Conference, VTC Fall 2017
CountryCanada
CityToronto
Period17/9/2417/9/27

ASJC Scopus subject areas

  • Computer Science Applications
  • Electrical and Electronic Engineering
  • Applied Mathematics

Fingerprint Dive into the research topics of 'On physical layer security in finite-area wireless networks: An analysis framework'. Together they form a unique fingerprint.

Cite this