Boundaries as an Enhancement Technique for Physical Layer Security

Kostas Koufos, Carl Dettmann

Research output: Contribution to journalArticle (Academic Journal)peer-review

4 Citations (Scopus)
283 Downloads (Pure)

Abstract

In this paper, we study the receiver performance with physical layer security in a Poisson field of interferers. We compare the performance in two deployment scenarios: (i) the receiver is located at the corner of a quadrant, (ii) the receiver is located in the infinite plane. When the channel state information (CSI) of the eavesdropper is not available at the transmitter, we calculate the probability of secure connectivity using the Wyner coding scheme, and we show that hiding the receiver at the corner is beneficial at high rates of the transmitted codewords and detrimental at low transmission rates. When the CSI is available, we show that the average secrecy capacity is higher when the receiver is located at the corner, even if the intensity of interferers in this case is four times higher than the intensity of interferers in the bulk. Therefore boundaries can also be used as a secrecy enhancement technique for high data rate applications.

Original languageEnglish
Pages (from-to)61-74
Number of pages14
JournalIEEE Transactions on Information Forensics and Security
Volume14
Issue number1
Early online date29 May 2018
DOIs
Publication statusPublished - Jan 2019

Keywords

  • Correlation
  • Interference
  • Interference modeling
  • Network security
  • Physical layer
  • physical layer security
  • Probability
  • Receivers
  • stochastic geometry
  • Transmitters

Fingerprint Dive into the research topics of 'Boundaries as an Enhancement Technique for Physical Layer Security'. Together they form a unique fingerprint.

Cite this