Physical Layer Security in Heterogeneous Cellular Network

  • Hui-Ming WangEmail author
  • Tong-Xing Zheng
Part of the SpringerBriefs in Computer Science book series (BRIEFSCOMPUTER)


The heterogeneous cellular network is believed to be a promising deployment of cellular networks in 5G. This chapter comprehensively studies physical layer security in a multitier HCN where BSs, authorized users and eavesdroppers are all randomly located. We first propose a truncated average received signal power-based secrecy mobile association policy. Under this policy, we investigate and provide tractable expressions for the connection probability and secrecy probability of a randomly located user. We further evaluate the network-wide secrecy throughput and the minimum secrecy throughput per user under both connection and secrecy probability constraints. We prove that the proposed mobile association policy significantly enhances the secrecy throughput performance of the HCN.


Physical Layer Security Heterogeneous Cellular Networks Connection Probability Private Investigation Average Received Signal Power (ARSP) 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    H.-M. Wang, T.-X. Zheng, J. Yuan, D. Towsley, M.H. Lee, Physical layer security in heterogeneous cellular networks. IEEE Trans. Commun. 64(3), 1204–1219 (2016)CrossRefGoogle Scholar
  2. 2.
    M. Haenggi, On distances in uniformly random networks. IEEE Trans. Inf. Theory 51(10), 3584–3586 (2005)MathSciNetCrossRefzbMATHGoogle Scholar
  3. 3.
    J.G. Andrews, F. Baccelli, R.K. Ganti, A tractable approach to coverage and rate in cellular networks. IEEE Trans. Commun. 59(11), 3122–3134 (2011)CrossRefGoogle Scholar
  4. 4.
    A.M. Hunter, J.G. Andrews, S. Weber, Transmission capacity of ad hoc networks with spatial diversity. IEEE Trans. Wirel. Commun. 7(12), 5058–5071 (2008)CrossRefGoogle Scholar
  5. 5.
    H.S. Dhillon, R.K. Ganti, F. Baccelli, J.G. Andrews, Modeling and analysis of K-tier downlink heterogeneous cellular networks. IEEE J. Sel. Areas Commun. 30(3), 550–560 (2012)CrossRefGoogle Scholar
  6. 6.
    H.-S. Jo, Y.J. Sang, P. Xia, J.G. Andrews, Heterogeneous cellular networks with flexible cell association: a comprehensive downlink SINR analysis. IEEE Trans. Wirel. Commun. 11(10), 3484–3495 (2012)CrossRefGoogle Scholar
  7. 7.
    X. Zhang, X. Zhou, M.R. McKay, Enhancing secrecy with multi-antenna transmission in wireless ad hoc networks. IEEE Trans. Inf. Forensics Secur. 8(11), 1802–1814 (2013)CrossRefGoogle Scholar
  8. 8.
    F.W.J. Olver, D.W. Lozier, R.F. Boisvert, C.W. Clark, NIST Handbook of Mathematical Functions (Cambrige Univ. Press, Cambrige, 2010)zbMATHGoogle Scholar
  9. 9.
    M. Haenggi, J. Andrews, F. Baccelli, O. Dousse, M. Franceschetti, Stochastic geometry and random graphs for the analysis and design of wireless networks. IEEE J. Sel. Areas Commun. 27(7), 1029–1046 (2009)CrossRefGoogle Scholar
  10. 10.
    I.S. Gradshteyn, I.M. Ryzhik, A. Jeffrey, D. Zwillinger, S. Technica, Table of Integrals, Series, and Products, 7th edn. (Academic Press, New York, 2007)Google Scholar
  11. 11.
    C. Li, J. Zhang, K.B. Letaief, Throughput and energy efficiency analysis of small cell networks with multi-antenna base stations. IEEE Trans. Wirel. Commun. 13(5), 2505–2517 (2014)CrossRefGoogle Scholar
  12. 12.
    H. Alzer, On some inequalities for the incomplete gamma function. Math. Comput. 66(218), 771–778 (1997)MathSciNetCrossRefzbMATHGoogle Scholar
  13. 13.
    W. Dunham, Cardano and the solution of the cubic, Ch. 6 in Journey Through Genius: The Great Theorems of Mathematics (Wiley, London, 1990), pp. 133–154Google Scholar

Copyright information

© The Author(s) 2016

Authors and Affiliations

  1. 1.Department of Information and Communications EngineeringXi’an Jiaotong UniversityXi’anChina

Personalised recommendations