Projects per year
Abstract
In this paper, we study the receiver performance with physical layer security in a Poisson field of interferers. We compare the performance in two deployment scenarios: (i) the receiver is located at the corner of a quadrant, (ii) the receiver is located in the infinite plane. When the channel state information (CSI) of the eavesdropper is not available at the transmitter, we calculate the probability of secure connectivity using the Wyner coding scheme, and we show that hiding the receiver at the corner is beneficial at high rates of the transmitted codewords and detrimental at low transmission rates. When the CSI is available, we show that the average secrecy capacity is higher when the receiver is located at the corner, even if the intensity of interferers in this case is four times higher than the intensity of interferers in the bulk. Therefore boundaries can also be used as a secrecy enhancement technique for high data rate applications.
Original language | English |
---|---|
Pages (from-to) | 61-74 |
Number of pages | 14 |
Journal | IEEE Transactions on Information Forensics and Security |
Volume | 14 |
Issue number | 1 |
Early online date | 29 May 2018 |
DOIs | |
Publication status | Published - Jan 2019 |
Keywords
- Correlation
- Interference
- Interference modeling
- Network security
- Physical layer
- physical layer security
- Probability
- Receivers
- stochastic geometry
- Transmitters
Fingerprint
Dive into the research topics of 'Boundaries as an Enhancement Technique for Physical Layer Security'. Together they form a unique fingerprint.Projects
- 1 Finished
-
Spatially embedded networks
Dettmann , C. P. (Principal Investigator)
1/11/15 → 18/03/19
Project: Research