Skip to main navigation Skip to search Skip to main content

On physical layer security in finite-area wireless networks: An analysis framework

  • Jiajia Liu
  • , Jiahao Dai
  • , Yongpeng Shi
  • , Wen Sun
  • , Nei Kato

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

4 Scopus citations

Abstract

This paper analyzes the information theoretic secrecy performance in finite-area wireless networks based on a stochastic geometry framework. Unlike most prior works, which explored the physical layer security with a large number of transmitters, legitimate receivers and eavesdroppers in infinite regions, we consider a finite downlink wireless network composing of a transmitter, a legitimate receiver and several eavesdroppers. The legitimate receiver attempts to receive confidential data from the transmitter in the presence of the eavesdroppers. We present the probabilistic characteristics of the achievable secrecy rates and average secrecy rates in both disk regions and regular -sided convex polygon regions. As shown by extensive numerical results, the proposed framework could be leveraged to efficiently analyze the secrecy performance of finite-area networks, and give insights for network designers on how to achieve good secrecy performance in finite-area networks.

Original languageEnglish
Title of host publication2017 IEEE 86th Vehicular Technology Conference, VTC Fall 2017 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1-5
Number of pages5
ISBN (Electronic)9781509059355
DOIs
StatePublished - 2 Jul 2017
Externally publishedYes
Event86th IEEE Vehicular Technology Conference, VTC Fall 2017 - Toronto, Canada
Duration: 24 Sep 201727 Sep 2017

Publication series

NameIEEE Vehicular Technology Conference
Volume2017-September
ISSN (Print)1550-2252

Conference

Conference86th IEEE Vehicular Technology Conference, VTC Fall 2017
Country/TerritoryCanada
CityToronto
Period24/09/1727/09/17

Fingerprint

Dive into the research topics of 'On physical layer security in finite-area wireless networks: An analysis framework'. Together they form a unique fingerprint.

Cite this