Physical layer security in large-scale random multiple access wireless sensor networks: a stochastic geometry approach

by   Tong-Xing Zheng, et al.

This paper investigates physical layer security for a large-scale WSN with random multiple access, where each fusion center in the network randomly schedules a number of sensors to upload their sensed data subject to the overhearing of randomly distributed eavesdroppers. We propose an uncoordinated random jamming scheme in which those unscheduled sensors send jamming signals with a certain probability to defeat the eavesdroppers. With the aid of stochastic geometry theory and order statistics, we derive analytical expressions for the connection outage probability and secrecy outage probability to characterize transmission reliability and secrecy, respectively. Based on the obtained analytical results, we formulate an optimization problem for maximizing the sum secrecy throughput subject to both reliability and secrecy constraints, considering a joint design of the wiretap code rates for each scheduled sensor and the jamming probability for the unscheduled sensors. We provide both optimal and low-complexity sub-optimal algorithms to tackle the above problem, and further reveal various properties on the optimal parameters which are useful to guide practical designs. In particular, we demonstrate that the proposed random jamming scheme is beneficial for improving the sum secrecy throughput, and the optimal jamming probability is the result of trade-off between secrecy and throughput. We also show that the throughput performance of the sub-optimal scheme approaches that of the optimal one when facing a stringent reliability constraint or a loose secrecy constraint.


page 4

page 5

page 6

page 7

page 8

page 9

page 10

page 12


Energy-Efficient Resource Allocation for Secure NOMA-Enabled Mobile Edge Computing Networks

Mobile edge computing (MEC) has been envisaged as a promising technique ...

Secrecy Outage for Wireless Sensor Networks

This paper addresses Physical Layer Security (PLS) for a wireless sensor...

Transmitter Selection for Secrecy in Frequency-Selective Fading with Multiple Eavesdroppers and Wireless Backhaul Links

This paper investigates the secrecy performance of sub-optimal transmitt...

Adaptive Full-Duplex Jamming Receiver for Secure D2D Links in Random Networks

Device-to-device (D2D) communication raises new transmission secrecy pro...

On Secure Transmission Design: An Information Leakage Perspective

Information leakage rate is an intuitive metric that reflects the level ...

Design of Artificial Noise for Physical Layer Security in Visible Light Systems with Clipping

Though visible light communication (VLC) systems are contained to a give...

Secrecy Outage Probability: Revisited

This paper technically explores the secrecy outage probability (SOP) Λ a...

Please sign up or login with your details

Forgot password? Click here to reset