Physical Layer Security in Large-Scale Random Multiple Access Wireless Sensor Networks: A Stochastic Geometry Approach

被引:0
|
作者
Zheng, Tong-Xing [1 ,2 ,3 ]
Chen, Xin [1 ,2 ,3 ]
Wang, Chao [3 ,4 ]
Wong, Kai-Kit [5 ]
Yuan, Jinhong [6 ]
机构
[1] Xi An Jiao Tong Univ, Minist Educ, Key Lab Intelligent Networks & Network Secur, Xian 710049, Peoples R China
[2] Xi An Jiao Tong Univ, Sch Informat & Commun Engn, Xian 710049, Peoples R China
[3] Southeast Univ, Natl Mobile Commun Res Lab, Nanjing 210096, Peoples R China
[4] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[5] UCL, Dept Elect & Elect Engn, London WC1E 6BT, England
[6] Univ New South Wales, Sch Elect Engn & Telecommun, Sydney, NSW 2052, Australia
基金
澳大利亚研究理事会; 中国国家自然科学基金; 中国博士后科学基金; 英国工程与自然科学研究理事会;
关键词
Wireless sensor networks; Physical layer security; Jamming; Throughput; Geometry; Reliability; Stochastic processes; wireless sensor networks; random multiple access; outage probability; sum secrecy throughput; stochastic geometry; AD HOC NETWORKS; ARTIFICIAL-NOISE; ANTENNA TRANSMISSION; SECRECY;
D O I
10.1109/TCOMM.2022.3167047
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper investigates physical layer security for a large-scale WSN with random multiple access, where each fusion center in the network randomly schedules a number of sensors to upload their sensed data subject to the overhearing of randomly distributed eavesdroppers. We propose an uncoordinated random jamming scheme in which those unscheduled sensors send jamming signals with a certain probability to defeat the eavesdroppers. With the aid of stochastic geometry theory and order statistics, we derive analytical expressions for the connection outage probability and secrecy outage probability to characterize transmission reliability and secrecy, respectively. Based on the obtained analytical results, we formulate an optimization problem for maximizing the sum secrecy throughput subject to both reliability and secrecy constraints, considering a joint design of the wiretap code rates for each scheduled sensor and the jamming probability for the unscheduled sensors. We provide both optimal and low-complexity sub-optimal algorithms to tackle the above problem, and further reveal various properties on the optimal parameters which are useful to guide practical designs. In particular, we demonstrate that the proposed random jamming scheme is beneficial for improving the sum secrecy throughput, and the optimal jamming probability is the result of trade-off between secrecy and throughput. We also show that the throughput performance of the sub-optimal scheme approaches that of the optimal one when facing a stringent reliability constraint or a loose secrecy constraint.
引用
收藏
页码:4038 / 4051
页数:14
相关论文
共 50 条
  • [1] Physical Layer Security in Three-Tier Wireless Sensor Networks: A Stochastic Geometry Approach
    Deng, Yansha
    Wang, Lifeng
    Elkashlan, Maged
    Nallanathan, Arumugam
    Mallik, Ranjan K.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (06) : 1128 - 1138
  • [2] Enhancing the Physical Layer Security of Non-Orthogonal Multiple Access in Large-Scale Networks
    Liu, Yuanwei
    Qin, Zhijin
    Elkashlan, Maged
    Gao, Yue
    Hanzo, Lajos
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2017, 16 (03) : 1656 - 1672
  • [3] A Stochastic Geometry Approach to the Energy Load of Relaying in Large-Scale Wireless Networks
    Wei, Ning
    Liao, Feng
    Zhang, Zhongpei
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2017, 95 (02) : 1249 - 1263
  • [4] A Stochastic Geometry Approach to the Energy Load of Relaying in Large-Scale Wireless Networks
    Ning Wei
    Feng Liao
    Zhongpei Zhang
    [J]. Wireless Personal Communications, 2017, 95 : 1249 - 1263
  • [5] Enhancing Physical Layer Security of Random Caching in Large-Scale Multi-Antenna Heterogeneous Wireless Networks
    Wen, Wanli
    Liu, Chenxi
    Fu, Yaru
    Quek, Tony Q. S.
    Zheng, Fu-Chun
    Jin, Shi
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 2840 - 2855
  • [6] Physical Layer Security in Cellular Networks: A Stochastic Geometry Approach
    Wang, He
    Zhou, Xiangyun
    Reed, Mark C.
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2013, 12 (06) : 2776 - 2787
  • [7] Physical Layer Security of Vehicular Networks: A Stochastic Geometry Approach
    Wang, Chao
    Li, Zan
    Shi, Jia
    Si, JiangBo
    Ng, Derrick Wing Kwan
    [J]. 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2020,
  • [8] Physical Layer Security for 5G Non-orthogonal Multiple Access in Large-scale Networks
    Qin, Zhijin
    Liu, Yuanwei
    Ding, Zhiguo
    Gao, Yue
    Elkashlan, Maged
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016, : 584 - 589
  • [9] Exploring random access and handshaking techniques in large-scale underwater wireless acoustic sensor networks
    Xie, Peng
    Cui, Jun-Hong
    [J]. OCEANS 2006, VOLS 1-4, 2006, : 1503 - +
  • [10] Large-Scale Analysis of Physical-Layer Security in Multi-User Wireless Networks
    Sadeghzadeh, Mehdi
    Maleki, Mehdi
    Salehi, Masoud
    Bahrami, Hamid Reza
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 2018, 66 (12) : 6450 - 6462