Secrecy

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 56043 Experts worldwide ranked by ideXlab platform

Maged Elkashlan - One of the best experts on this subject based on the ideXlab platform.

  • artificial noise aided secure transmission in large scale spectrum sharing networks
    IEEE Transactions on Communications, 2016
    Co-Authors: Yansha Deng, Jinhong Yuan, Lifeng Wang, Syed Ali Raza Zaidi, Maged Elkashlan
    Abstract:

    We investigate beamforming and artificial noise generation at the secondary transmitters to establish secure transmission in large scale spectrum sharing networks, where multiple noncolluding eavesdroppers attempt to intercept the secondary transmission. We develop a comprehensive analytical framework to accurately assess the Secrecy performance under the primary users’ quality of service constraint. Our aim is to characterize the impact of beamforming and artificial noise generation (BF&AN) on this complex large scale network. We first derive exact expressions for the average Secrecy rate and the Secrecy outage probability. We then derive an easy-to-evaluate asymptotic average Secrecy rate and asymptotic Secrecy outage probability when the number of antennas at the secondary transmitter goes to infinity. Our results show that the equal power allocation between the useful signal and artificial noise is not always the best strategy to achieve maximum average Secrecy rate in large scale spectrum sharing networks. Another interesting observation is that the advantage of BF&AN over BF on the average Secrecy rate is lost when the aggregate interference from the primary and secondary transmitters is strong, such that it overtakes the effect of the generated AN.

  • artificial noise aided secure transmission in large scale spectrum sharing networks
    arXiv: Information Theory, 2016
    Co-Authors: Yansha Deng, Jinhong Yuan, Lifeng Wang, Syed Ali Raza Zaidi, Maged Elkashlan
    Abstract:

    We investigate beamforming and artificial noise generation at the secondary transmitters to establish secure transmission in large scale spectrum sharing networks,where multiple non-colluding eavesdroppers attempt to intercept the secondary transmission. We develop a comprehensive analytical framework to accurately assess the Secrecy performance under the primary users' quality of service constraint. Our aim is to characterize the impact of beamforming and artificial noise generation on this complex large scale network. We first derive exact expressions for the average Secrecy rate and the Secrecy outage probability.We then derive an easy-to-evaluate asymptotic average Secrecy rate and asymptotic Secrecy outage probability when the number of antennas at the secondary transmitter goes to infinity. Our results show that the equal power allocation between the useful signal and artificial noise is not always the best strategy to achieve maximum average Secrecy rate in large scale spectrum sharing networks. Another interesting observation is that the advantage of beamforming and artificial noise generation over beamforming on the average Secrecy rate is lost when the aggregate interference from the primary and secondary transmitters is strong, such that it overtakes the effect of the generated artificial noise.

  • physical layer security in three tier wireless sensor networks a stochastic geometry approach
    arXiv: Information Theory, 2016
    Co-Authors: Yansha Deng, Arumugam Nallanathan, Maged Elkashlan, Lifeng Wang, Ranjan K. Mallik
    Abstract:

    This paper develops a tractable framework for exploiting the potential benefits of physical layer security in three-tier wireless sensor networks using stochastic geometry. In such networks, the sensing data from the remote sensors are collected by sinks with the help of access points, and the external eavesdroppers intercept the data transmissions.We focus on the secure transmission in two scenarios: i) the active sensors transmit their sensing data to the access points, and ii) the active access points forward the data to the sinks. We derive new compact expressions for the average Secrecy rate in these two scenarios. We also derive a new compact expression for the overall average Secrecy rate. Numerical results corroborate our analysis and show that multiple antennas at the access points can enhance the security of three-tier wireless sensor networks. Our results show that increasing the number of access points decreases the average Secrecy rate between the access point and its associated sink. However, we find that increasing the number of access points first increases the overall average Secrecy rate, with a critical value beyond which the overall average Secrecy rate then decreases. When increasing the number of active sensors, both the average Secrecy rate between the sensor and its associated access point and the overall average Secrecy rate decrease. In contrast, increasing the number of sinks improves both the average Secrecy rate between the access point and its associated sink, as well as the overall average Secrecy rate.

  • Physical Layer Security in Three-Tier Wireless Sensor Networks: A Stochastic Geometry Approach
    IEEE Transactions on Information Forensics and Security, 2016
    Co-Authors: Yansha Deng, Liangmin Wang, Maged Elkashlan, Arumugam Nallanathan, Lifeng Wang, Ranjan K. Mallik
    Abstract:

    This paper develops a tractable framework for exploiting the potential benefits of physical layer security in three-tier wireless sensor networks (WSNs) using stochastic geometry. In such networks, the sensing data from the remote sensors are collected by sinks with the help of access points, and the external eavesdroppers intercept the data transmissions. We focus on the secure transmission in two scenarios: 1) the active sensors transmit their sensing data to the access points and 2) the active access points forward the data to the sinks. We derive new compact expressions for the average Secrecy rate in these two scenarios. We also derive a new compact expression for the overall average Secrecy rate. Numerical results corroborate our analysis and show that multiple antennas at the access points can enhance the security of three-tier WSNs. Our results show that increasing the number of access points decreases the average Secrecy rate between the access point and its associated sink. However, we find that increasing the number of access points first increases the overall average Secrecy rate, with a critical value beyond which the overall average Secrecy rate then decreases. When increasing the number of active sensors, both the average Secrecy rate between the sensor and its associated access point, and the overall average Secrecy rate decrease. In contrast, increasing the number of sinks improves both the average Secrecy rate between the access point and its associated sink, and the overall average Secrecy rate.

  • secure transmission with antenna selection in mimo nakagami m fading channels
    IEEE Transactions on Wireless Communications, 2014
    Co-Authors: Lifeng Wang, Robert Schober, Maged Elkashlan, Jing Huang, Ranjan K. Mallik
    Abstract:

    This paper considers transmit antenna selection (TAS) and receive generalized selection combining (GSC) for se- cure communication in the multiple-input-multiple-output wire- tap channel, where confidential messages transmitted from an NA-antenna transmitter to an NB-antenna legitimate receiver are overheard by an NE-antenna eavesdropper. We assume that the main channel and the eavesdropper's channel undergo Nakagami-m fading with fading parameters mB and mE ,r e- spectively. In order to assess the Secrecy performance, we present a new unifying framework for the average Secrecy rate and the se- crecy outage probability. We first derive expressions for the prob- ability density function and the cumulative distribution function of the signal-to-noise ratio with TAS/GSC, from which we derive exact expressions for the average Secrecy rate and the Secrecy outage probability. We then derive compact expressions for the asymptotic average Secrecy rate and the asymptotic Secrecy outage probability for two distinct scenarios: 1) the legitimate receiver is located close to the transmitter, and 2) the legitimate receiver and the eavesdropper are located close to the transmitter. For these scenarios, we present new closed-form expressions for several key performance indicators: 1) the capacity slope and the power offset of the asymptotic average Secrecy rate, and 2) the Secrecy diversity order and the Secrecy array gain of the asymptotic Secrecy outage probability. For the first scenario, we confirm that the capacity slope is one and the Secrecy diversity order is mBNBNA .F or the second scenario, we confirm that the capacity slope and the Secrecy diversity order collapse to zero.

Jinhong Yuan - One of the best experts on this subject based on the ideXlab platform.

  • artificial noise aided secure transmission in large scale spectrum sharing networks
    IEEE Transactions on Communications, 2016
    Co-Authors: Yansha Deng, Jinhong Yuan, Lifeng Wang, Syed Ali Raza Zaidi, Maged Elkashlan
    Abstract:

    We investigate beamforming and artificial noise generation at the secondary transmitters to establish secure transmission in large scale spectrum sharing networks, where multiple noncolluding eavesdroppers attempt to intercept the secondary transmission. We develop a comprehensive analytical framework to accurately assess the Secrecy performance under the primary users’ quality of service constraint. Our aim is to characterize the impact of beamforming and artificial noise generation (BF&AN) on this complex large scale network. We first derive exact expressions for the average Secrecy rate and the Secrecy outage probability. We then derive an easy-to-evaluate asymptotic average Secrecy rate and asymptotic Secrecy outage probability when the number of antennas at the secondary transmitter goes to infinity. Our results show that the equal power allocation between the useful signal and artificial noise is not always the best strategy to achieve maximum average Secrecy rate in large scale spectrum sharing networks. Another interesting observation is that the advantage of BF&AN over BF on the average Secrecy rate is lost when the aggregate interference from the primary and secondary transmitters is strong, such that it overtakes the effect of the generated AN.

  • artificial noise aided secure transmission in large scale spectrum sharing networks
    arXiv: Information Theory, 2016
    Co-Authors: Yansha Deng, Jinhong Yuan, Lifeng Wang, Syed Ali Raza Zaidi, Maged Elkashlan
    Abstract:

    We investigate beamforming and artificial noise generation at the secondary transmitters to establish secure transmission in large scale spectrum sharing networks,where multiple non-colluding eavesdroppers attempt to intercept the secondary transmission. We develop a comprehensive analytical framework to accurately assess the Secrecy performance under the primary users' quality of service constraint. Our aim is to characterize the impact of beamforming and artificial noise generation on this complex large scale network. We first derive exact expressions for the average Secrecy rate and the Secrecy outage probability.We then derive an easy-to-evaluate asymptotic average Secrecy rate and asymptotic Secrecy outage probability when the number of antennas at the secondary transmitter goes to infinity. Our results show that the equal power allocation between the useful signal and artificial noise is not always the best strategy to achieve maximum average Secrecy rate in large scale spectrum sharing networks. Another interesting observation is that the advantage of beamforming and artificial noise generation over beamforming on the average Secrecy rate is lost when the aggregate interference from the primary and secondary transmitters is strong, such that it overtakes the effect of the generated artificial noise.

  • physical layer security in heterogeneous cellular networks
    arXiv: Information Theory, 2016
    Co-Authors: Hui-ming Wang, Tong-xing Zheng, Jinhong Yuan, Don Towsley
    Abstract:

    The heterogeneous cellular network (HCN) is a promising approach to the deployment of 5G cellular networks. This paper comprehensively studies physical layer security in a multi-tier HCN where base stations (BSs), authorized users and eavesdroppers are all randomly located. We first propose an access threshold based Secrecy mobile association policy that associates each user with the BS providing the maximum \emph{truncated average received signal power} beyond a threshold. Under the proposed policy, we investigate the connection probability and Secrecy probability of a randomly located user, and provide tractable expressions for the two metrics. Asymptotic analysis reveals that setting a larger access threshold increases the connection probability while decreases the Secrecy probability. We further evaluate the network-wide Secrecy throughput and the minimum Secrecy throughput per user with both connection and Secrecy probability constraints. We show that introducing a properly chosen access threshold significantly enhances the Secrecy throughput performance of a HCN.

  • Physical Layer Security in Heterogeneous Cellular Networks
    IEEE Transactions on Communications, 2016
    Co-Authors: Hui-ming Wang, Tong-xing Zheng, Jinhong Yuan, Don Towsley, Moon Ho Lee
    Abstract:

    The heterogeneous cellular network (HCN) is a promising approach to the deployment of 5G cellular networks. This paper comprehensively studies physical layer security in a multitier HCN where base stations (BSs), authorized users, and eavesdroppers are all randomly located. We first propose an access threshold-based Secrecy mobile association policy that associates each user with the BS providing the maximum truncated average received signal power beyond a threshold. Under the proposed policy, we investigate the connection probability and Secrecy probability of a randomly located user and provide tractable expressions for the two metrics. Asymptotic analysis reveals that setting a larger access threshold increases the connection probability while decreases the Secrecy probability. We further evaluate the network-wide Secrecy throughput and the minimum Secrecy throughput per user with both connection and Secrecy probability constraints. We show that introducing a properly chosen access threshold significantly enhances the Secrecy throughput performance of a HCN.

  • multi antenna transmission with artificial noise against randomly distributed eavesdroppers
    IEEE Transactions on Communications, 2015
    Co-Authors: Tong-xing Zheng, Hui-ming Wang, Jinhong Yuan, Don Towsley
    Abstract:

    In this paper, we study the secure multi-antenna transmission with artificial noise (AN) under slow fading channels coexisting with randomly located eavesdroppers. We provide a comprehensive Secrecy performance analysis and system design/optimization under a stochastic geometry framework. Specifically, we first evaluate the Secrecy outage performance, and derive a closed-form expression for the optimal power allocation ratio of the information signal power to the total transmit power that minimizes the Secrecy outage probability (SOP). Subject to a SOP constraint, we then propose a dynamic parameter transmission scheme (DPTS) and a static parameter transmission scheme (SPTS) to maximize Secrecy throughput, and provide explicit solutions on the optimal transmission parameters, including the wiretap code rates, the on-off transmission threshold and the power allocation ratio. Our results give new insight into secure transmission designs. For example, Secrecy rate is a concave function of the power allocation ratio in DPTS, and AN plays a significant role under SOP constraints and in dense eavesdropper scenarios. In SPTS, transmission probability is a concave function of the power allocation ratio, and Secrecy throughput is a quasi-concave function of the Secrecy rate. Numerical results are demonstrated to validate our theoretical analysis.

Lifeng Wang - One of the best experts on this subject based on the ideXlab platform.

  • artificial noise aided secure transmission in large scale spectrum sharing networks
    IEEE Transactions on Communications, 2016
    Co-Authors: Yansha Deng, Jinhong Yuan, Lifeng Wang, Syed Ali Raza Zaidi, Maged Elkashlan
    Abstract:

    We investigate beamforming and artificial noise generation at the secondary transmitters to establish secure transmission in large scale spectrum sharing networks, where multiple noncolluding eavesdroppers attempt to intercept the secondary transmission. We develop a comprehensive analytical framework to accurately assess the Secrecy performance under the primary users’ quality of service constraint. Our aim is to characterize the impact of beamforming and artificial noise generation (BF&AN) on this complex large scale network. We first derive exact expressions for the average Secrecy rate and the Secrecy outage probability. We then derive an easy-to-evaluate asymptotic average Secrecy rate and asymptotic Secrecy outage probability when the number of antennas at the secondary transmitter goes to infinity. Our results show that the equal power allocation between the useful signal and artificial noise is not always the best strategy to achieve maximum average Secrecy rate in large scale spectrum sharing networks. Another interesting observation is that the advantage of BF&AN over BF on the average Secrecy rate is lost when the aggregate interference from the primary and secondary transmitters is strong, such that it overtakes the effect of the generated AN.

  • artificial noise aided secure transmission in large scale spectrum sharing networks
    arXiv: Information Theory, 2016
    Co-Authors: Yansha Deng, Jinhong Yuan, Lifeng Wang, Syed Ali Raza Zaidi, Maged Elkashlan
    Abstract:

    We investigate beamforming and artificial noise generation at the secondary transmitters to establish secure transmission in large scale spectrum sharing networks,where multiple non-colluding eavesdroppers attempt to intercept the secondary transmission. We develop a comprehensive analytical framework to accurately assess the Secrecy performance under the primary users' quality of service constraint. Our aim is to characterize the impact of beamforming and artificial noise generation on this complex large scale network. We first derive exact expressions for the average Secrecy rate and the Secrecy outage probability.We then derive an easy-to-evaluate asymptotic average Secrecy rate and asymptotic Secrecy outage probability when the number of antennas at the secondary transmitter goes to infinity. Our results show that the equal power allocation between the useful signal and artificial noise is not always the best strategy to achieve maximum average Secrecy rate in large scale spectrum sharing networks. Another interesting observation is that the advantage of beamforming and artificial noise generation over beamforming on the average Secrecy rate is lost when the aggregate interference from the primary and secondary transmitters is strong, such that it overtakes the effect of the generated artificial noise.

  • physical layer security in three tier wireless sensor networks a stochastic geometry approach
    arXiv: Information Theory, 2016
    Co-Authors: Yansha Deng, Arumugam Nallanathan, Maged Elkashlan, Lifeng Wang, Ranjan K. Mallik
    Abstract:

    This paper develops a tractable framework for exploiting the potential benefits of physical layer security in three-tier wireless sensor networks using stochastic geometry. In such networks, the sensing data from the remote sensors are collected by sinks with the help of access points, and the external eavesdroppers intercept the data transmissions.We focus on the secure transmission in two scenarios: i) the active sensors transmit their sensing data to the access points, and ii) the active access points forward the data to the sinks. We derive new compact expressions for the average Secrecy rate in these two scenarios. We also derive a new compact expression for the overall average Secrecy rate. Numerical results corroborate our analysis and show that multiple antennas at the access points can enhance the security of three-tier wireless sensor networks. Our results show that increasing the number of access points decreases the average Secrecy rate between the access point and its associated sink. However, we find that increasing the number of access points first increases the overall average Secrecy rate, with a critical value beyond which the overall average Secrecy rate then decreases. When increasing the number of active sensors, both the average Secrecy rate between the sensor and its associated access point and the overall average Secrecy rate decrease. In contrast, increasing the number of sinks improves both the average Secrecy rate between the access point and its associated sink, as well as the overall average Secrecy rate.

  • Physical Layer Security in Three-Tier Wireless Sensor Networks: A Stochastic Geometry Approach
    IEEE Transactions on Information Forensics and Security, 2016
    Co-Authors: Yansha Deng, Liangmin Wang, Maged Elkashlan, Arumugam Nallanathan, Lifeng Wang, Ranjan K. Mallik
    Abstract:

    This paper develops a tractable framework for exploiting the potential benefits of physical layer security in three-tier wireless sensor networks (WSNs) using stochastic geometry. In such networks, the sensing data from the remote sensors are collected by sinks with the help of access points, and the external eavesdroppers intercept the data transmissions. We focus on the secure transmission in two scenarios: 1) the active sensors transmit their sensing data to the access points and 2) the active access points forward the data to the sinks. We derive new compact expressions for the average Secrecy rate in these two scenarios. We also derive a new compact expression for the overall average Secrecy rate. Numerical results corroborate our analysis and show that multiple antennas at the access points can enhance the security of three-tier WSNs. Our results show that increasing the number of access points decreases the average Secrecy rate between the access point and its associated sink. However, we find that increasing the number of access points first increases the overall average Secrecy rate, with a critical value beyond which the overall average Secrecy rate then decreases. When increasing the number of active sensors, both the average Secrecy rate between the sensor and its associated access point, and the overall average Secrecy rate decrease. In contrast, increasing the number of sinks improves both the average Secrecy rate between the access point and its associated sink, and the overall average Secrecy rate.

  • secure transmission with antenna selection in mimo nakagami m fading channels
    IEEE Transactions on Wireless Communications, 2014
    Co-Authors: Lifeng Wang, Robert Schober, Maged Elkashlan, Jing Huang, Ranjan K. Mallik
    Abstract:

    This paper considers transmit antenna selection (TAS) and receive generalized selection combining (GSC) for se- cure communication in the multiple-input-multiple-output wire- tap channel, where confidential messages transmitted from an NA-antenna transmitter to an NB-antenna legitimate receiver are overheard by an NE-antenna eavesdropper. We assume that the main channel and the eavesdropper's channel undergo Nakagami-m fading with fading parameters mB and mE ,r e- spectively. In order to assess the Secrecy performance, we present a new unifying framework for the average Secrecy rate and the se- crecy outage probability. We first derive expressions for the prob- ability density function and the cumulative distribution function of the signal-to-noise ratio with TAS/GSC, from which we derive exact expressions for the average Secrecy rate and the Secrecy outage probability. We then derive compact expressions for the asymptotic average Secrecy rate and the asymptotic Secrecy outage probability for two distinct scenarios: 1) the legitimate receiver is located close to the transmitter, and 2) the legitimate receiver and the eavesdropper are located close to the transmitter. For these scenarios, we present new closed-form expressions for several key performance indicators: 1) the capacity slope and the power offset of the asymptotic average Secrecy rate, and 2) the Secrecy diversity order and the Secrecy array gain of the asymptotic Secrecy outage probability. For the first scenario, we confirm that the capacity slope is one and the Secrecy diversity order is mBNBNA .F or the second scenario, we confirm that the capacity slope and the Secrecy diversity order collapse to zero.

Yansha Deng - One of the best experts on this subject based on the ideXlab platform.

  • artificial noise aided secure transmission in large scale spectrum sharing networks
    IEEE Transactions on Communications, 2016
    Co-Authors: Yansha Deng, Jinhong Yuan, Lifeng Wang, Syed Ali Raza Zaidi, Maged Elkashlan
    Abstract:

    We investigate beamforming and artificial noise generation at the secondary transmitters to establish secure transmission in large scale spectrum sharing networks, where multiple noncolluding eavesdroppers attempt to intercept the secondary transmission. We develop a comprehensive analytical framework to accurately assess the Secrecy performance under the primary users’ quality of service constraint. Our aim is to characterize the impact of beamforming and artificial noise generation (BF&AN) on this complex large scale network. We first derive exact expressions for the average Secrecy rate and the Secrecy outage probability. We then derive an easy-to-evaluate asymptotic average Secrecy rate and asymptotic Secrecy outage probability when the number of antennas at the secondary transmitter goes to infinity. Our results show that the equal power allocation between the useful signal and artificial noise is not always the best strategy to achieve maximum average Secrecy rate in large scale spectrum sharing networks. Another interesting observation is that the advantage of BF&AN over BF on the average Secrecy rate is lost when the aggregate interference from the primary and secondary transmitters is strong, such that it overtakes the effect of the generated AN.

  • artificial noise aided secure transmission in large scale spectrum sharing networks
    arXiv: Information Theory, 2016
    Co-Authors: Yansha Deng, Jinhong Yuan, Lifeng Wang, Syed Ali Raza Zaidi, Maged Elkashlan
    Abstract:

    We investigate beamforming and artificial noise generation at the secondary transmitters to establish secure transmission in large scale spectrum sharing networks,where multiple non-colluding eavesdroppers attempt to intercept the secondary transmission. We develop a comprehensive analytical framework to accurately assess the Secrecy performance under the primary users' quality of service constraint. Our aim is to characterize the impact of beamforming and artificial noise generation on this complex large scale network. We first derive exact expressions for the average Secrecy rate and the Secrecy outage probability.We then derive an easy-to-evaluate asymptotic average Secrecy rate and asymptotic Secrecy outage probability when the number of antennas at the secondary transmitter goes to infinity. Our results show that the equal power allocation between the useful signal and artificial noise is not always the best strategy to achieve maximum average Secrecy rate in large scale spectrum sharing networks. Another interesting observation is that the advantage of beamforming and artificial noise generation over beamforming on the average Secrecy rate is lost when the aggregate interference from the primary and secondary transmitters is strong, such that it overtakes the effect of the generated artificial noise.

  • physical layer security in three tier wireless sensor networks a stochastic geometry approach
    arXiv: Information Theory, 2016
    Co-Authors: Yansha Deng, Arumugam Nallanathan, Maged Elkashlan, Lifeng Wang, Ranjan K. Mallik
    Abstract:

    This paper develops a tractable framework for exploiting the potential benefits of physical layer security in three-tier wireless sensor networks using stochastic geometry. In such networks, the sensing data from the remote sensors are collected by sinks with the help of access points, and the external eavesdroppers intercept the data transmissions.We focus on the secure transmission in two scenarios: i) the active sensors transmit their sensing data to the access points, and ii) the active access points forward the data to the sinks. We derive new compact expressions for the average Secrecy rate in these two scenarios. We also derive a new compact expression for the overall average Secrecy rate. Numerical results corroborate our analysis and show that multiple antennas at the access points can enhance the security of three-tier wireless sensor networks. Our results show that increasing the number of access points decreases the average Secrecy rate between the access point and its associated sink. However, we find that increasing the number of access points first increases the overall average Secrecy rate, with a critical value beyond which the overall average Secrecy rate then decreases. When increasing the number of active sensors, both the average Secrecy rate between the sensor and its associated access point and the overall average Secrecy rate decrease. In contrast, increasing the number of sinks improves both the average Secrecy rate between the access point and its associated sink, as well as the overall average Secrecy rate.

  • Physical Layer Security in Three-Tier Wireless Sensor Networks: A Stochastic Geometry Approach
    IEEE Transactions on Information Forensics and Security, 2016
    Co-Authors: Yansha Deng, Liangmin Wang, Maged Elkashlan, Arumugam Nallanathan, Lifeng Wang, Ranjan K. Mallik
    Abstract:

    This paper develops a tractable framework for exploiting the potential benefits of physical layer security in three-tier wireless sensor networks (WSNs) using stochastic geometry. In such networks, the sensing data from the remote sensors are collected by sinks with the help of access points, and the external eavesdroppers intercept the data transmissions. We focus on the secure transmission in two scenarios: 1) the active sensors transmit their sensing data to the access points and 2) the active access points forward the data to the sinks. We derive new compact expressions for the average Secrecy rate in these two scenarios. We also derive a new compact expression for the overall average Secrecy rate. Numerical results corroborate our analysis and show that multiple antennas at the access points can enhance the security of three-tier WSNs. Our results show that increasing the number of access points decreases the average Secrecy rate between the access point and its associated sink. However, we find that increasing the number of access points first increases the overall average Secrecy rate, with a critical value beyond which the overall average Secrecy rate then decreases. When increasing the number of active sensors, both the average Secrecy rate between the sensor and its associated access point, and the overall average Secrecy rate decrease. In contrast, increasing the number of sinks improves both the average Secrecy rate between the access point and its associated sink, and the overall average Secrecy rate.

Hui-ming Wang - One of the best experts on this subject based on the ideXlab platform.

  • combining dirty paper coding and artificial noise for Secrecy
    International Conference on Acoustics Speech and Signal Processing, 2016
    Co-Authors: Bo Wang, Hui-ming Wang, Chao Wang, Weile Zhang, Bobin Yao
    Abstract:

    This paper studies the dirty-paper coding (DPC) based secure transmission in a multiuser broadcast channel. Since the encoding order of DPC determines which information-bearing signals must be treated as noise by potential eavesdroppers, adopting DPC enables the accurate characterization of the intrinsic Secrecy as well as Secrecy outage of multiuser broadcasting. Furthermore, the information-bearing signals can be designed to provide Secrecy in addition to supporting normal (unclassified) transmission. To show this, we consider the scenario where one user requests secure transmission and the other users request normal transmission, and propose a hybrid secure transmission scheme which combines zero-forcing DPC and artificial noise (AN). By solving the Secrecy rate maximization problem under constraints on the Secrecy outage probability and the normal communication rates, we find that in addition to supporting the normal transmission, the proposed scheme has the potential to achieve a Secrecy rate close to that of the traditional AN-based beamforming.

  • opportunistic jamming for enhancing security stochastic geometry modeling and analysis
    IEEE Transactions on Vehicular Technology, 2016
    Co-Authors: Chunxiang Wang, Hui-ming Wang
    Abstract:

    This correspondence studies the Secrecy commu- nication of the single-input single-output multi-eavesdropper (SISOME) channel with multiple single-antenna jammers, where the jammers and eavesdroppers are distributed according to the independent two-dimensional homogeneous Poisson point process (PPP). For enhancing the physical layer security, we propose an opportunistic multiple jammer selection scheme, where the jammers whose channel gains to the legitimate receiver less than a threshold, are selected to transmit independent and identically distributed (i.i.d.) Gaussian jamming signals to confound the eavesdroppers. We characterize the Secrecy throughput achieved by our proposed jammer selection scheme, and show that the Secrecy throughput is a quasi-concave function of the selection threshold. Index Terms—Secrecy communication, SISOME, Poisson point process, jammer selection, Secrecy throughput.

  • physical layer security in heterogeneous cellular networks
    arXiv: Information Theory, 2016
    Co-Authors: Hui-ming Wang, Tong-xing Zheng, Jinhong Yuan, Don Towsley
    Abstract:

    The heterogeneous cellular network (HCN) is a promising approach to the deployment of 5G cellular networks. This paper comprehensively studies physical layer security in a multi-tier HCN where base stations (BSs), authorized users and eavesdroppers are all randomly located. We first propose an access threshold based Secrecy mobile association policy that associates each user with the BS providing the maximum \emph{truncated average received signal power} beyond a threshold. Under the proposed policy, we investigate the connection probability and Secrecy probability of a randomly located user, and provide tractable expressions for the two metrics. Asymptotic analysis reveals that setting a larger access threshold increases the connection probability while decreases the Secrecy probability. We further evaluate the network-wide Secrecy throughput and the minimum Secrecy throughput per user with both connection and Secrecy probability constraints. We show that introducing a properly chosen access threshold significantly enhances the Secrecy throughput performance of a HCN.

  • Physical Layer Security in Heterogeneous Cellular Networks
    IEEE Transactions on Communications, 2016
    Co-Authors: Hui-ming Wang, Tong-xing Zheng, Jinhong Yuan, Don Towsley, Moon Ho Lee
    Abstract:

    The heterogeneous cellular network (HCN) is a promising approach to the deployment of 5G cellular networks. This paper comprehensively studies physical layer security in a multitier HCN where base stations (BSs), authorized users, and eavesdroppers are all randomly located. We first propose an access threshold-based Secrecy mobile association policy that associates each user with the BS providing the maximum truncated average received signal power beyond a threshold. Under the proposed policy, we investigate the connection probability and Secrecy probability of a randomly located user and provide tractable expressions for the two metrics. Asymptotic analysis reveals that setting a larger access threshold increases the connection probability while decreases the Secrecy probability. We further evaluate the network-wide Secrecy throughput and the minimum Secrecy throughput per user with both connection and Secrecy probability constraints. We show that introducing a properly chosen access threshold significantly enhances the Secrecy throughput performance of a HCN.

  • enhancing wireless Secrecy via cooperation signal design and optimization
    IEEE Communications Magazine, 2015
    Co-Authors: Hui-ming Wang, Xianggen Xia
    Abstract:

    Physical layer security, or information-theoretic security, has attracted considerable attention recently, due to its potential to enhance the transmission Secrecy of wireless communications. Various Secrecy signaling and coding schemes have been designed at the physical layer of wireless systems to guarantee confidentiality against information leakage to unauthorized receivers, among which the strategy based on the idea of node cooperation is promising. This article provides an overview of the recent research on enhancing wireless transmission Secrecy via cooperation. We take a signal processing perspective and focus on the Secrecy signal design and optimization techniques to increase Secrecy performance. We also propose some future research directions on this topic.