Advertisement

Physical Layer Security in Cellular Networks Under TDMA

  • Hui-Ming WangEmail author
  • Tong-Xing Zheng
Chapter
  • 549 Downloads
Part of the SpringerBriefs in Computer Science book series (BRIEFSCOMPUTER)

Abstract

In this chapter, we discuss the physical layer secrecy transmission in a downlink cellular network under TDMA, coexisting with randomly located eavesdroppers. We adopt and investigate a secure multi-antenna transmission scheme in which artificial noise is injected into the null space of the legitimate channel to confuse eavesdroppers, and provide a comprehensive secrecy performance analysis and system design/optimization under the stochastic geometry framework. We first analyze the optimal power allocation to minimize the SOP. Subject to an SOP constraint, we then propose a dynamic parameter transmission scheme (DPTS) and a static parameter transmission scheme (SPTS) to maximize secrecy throughput. Our results give new insight into secure transmission designs in a random cellular network. Numerical results are demonstrated to validate our theoretical analysis.

Keywords

Physical Layer Security Downlink Cellular Network Power Allocation Ratio Private Transmission Secrecy Outage 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    S. Goel, R. Negi, Guaranteeing secrecy using artificial noise. IEEE Trans. Wirel. Commun. 7(6), 2180–2189 (2008)CrossRefGoogle Scholar
  2. 2.
    P. Gopala, L. Lai, H. El Gamal, On the secrecy capacity of fading channels. IEEE Trans. Inf. Theory 54(10), 4687–4698 (2008)MathSciNetCrossRefzbMATHGoogle Scholar
  3. 3.
    X. Zhang, X. Zhou, M.R. McKay, On the design of artificial-noise-aided secure multi-antenna transmission in slow fading channels. IEEE Trans. Veh. Technol. 62(5), 2170–2181 (2013)CrossRefGoogle Scholar
  4. 4.
    D. Stoyan, W. Kendall, J. Mecke, Stochastic Geometry and Its Applications, 2nd edn. (Wiley, London, 1996)zbMATHGoogle Scholar
  5. 5.
    I.S. Gradshteyn, I.M. Ryzhik, A. Jeffrey, D. Zwillinger, S. Technica, Table of Integrals, Series, and Products, 7th edn. (Academic Press, New York, 2007)Google Scholar
  6. 6.
    S. Boyd, L. Vandenberghe, Convex Optimization (Cambridge Univ. Press, Cambridge, 2004)CrossRefzbMATHGoogle Scholar
  7. 7.
    T.-X. Zheng, H.-M. Wang, J. Yuan, D. Towsley, M.H. Lee, Multi-antenna transmission with artificial noise against randomly distributed eavesdroppers. IEEE Trans. Commun. 63(11), 4347–4362 (2015)Google Scholar

Copyright information

© The Author(s) 2016

Authors and Affiliations

  1. 1.Department of Information and Communications EngineeringXi’an Jiaotong UniversityXi’anChina

Personalised recommendations