Physical Layer Security in Large-Scale Random Multiple Access Wireless Sensor Networks: A Stochastic Geometry Approach

This paper investigates physical layer security for a large-scale WSN with random multiple access, where each fusion center in the network randomly schedules a number of sensors to upload their sensed data subject to the overhearing of randomly distributed eavesdroppers. We propose an uncoordinated...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on communications Vol. 70; no. 6; p. 1
Main Authors Zheng, Tong-Xing, Chen, Xin, Wang, Chao, Wong, Kai-Kit, Yuan, Jinhong
Format Journal Article
LanguageEnglish
Published New York IEEE 01.06.2022
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
Abstract This paper investigates physical layer security for a large-scale WSN with random multiple access, where each fusion center in the network randomly schedules a number of sensors to upload their sensed data subject to the overhearing of randomly distributed eavesdroppers. We propose an uncoordinated random jamming scheme in which those unscheduled sensors send jamming signals with a certain probability to defeat the eavesdroppers. With the aid of stochastic geometry theory and order statistics, we derive analytical expressions for the connection outage probability and secrecy outage probability to characterize transmission reliability and secrecy, respectively. Based on the obtained analytical results, we formulate an optimization problem for maximizing the sum secrecy throughput subject to both reliability and secrecy constraints, considering a joint design of the wiretap code rates for each scheduled sensor and the jamming probability for the unscheduled sensors. We provide both optimal and low-complexity sub-optimal algorithms to tackle the above problem, and further reveal various properties on the optimal parameters which are useful to guide practical designs. In particular, we demonstrate that the proposed random jamming scheme is beneficial for improving the sum secrecy throughput, and the optimal jamming probability is the result of trade-off between secrecy and throughput. We also show that the throughput performance of the sub-optimal scheme approaches that of the optimal one when facing a stringent reliability constraint or a loose secrecy constraint.
AbstractList This paper investigates physical layer security for a large-scale WSN with random multiple access, where each fusion center in the network randomly schedules a number of sensors to upload their sensed data subject to the overhearing of randomly distributed eavesdroppers. We propose an uncoordinated random jamming scheme in which those unscheduled sensors send jamming signals with a certain probability to defeat the eavesdroppers. With the aid of stochastic geometry theory and order statistics, we derive analytical expressions for the connection outage probability and secrecy outage probability to characterize transmission reliability and secrecy, respectively. Based on the obtained analytical results, we formulate an optimization problem for maximizing the sum secrecy throughput subject to both reliability and secrecy constraints, considering a joint design of the wiretap code rates for each scheduled sensor and the jamming probability for the unscheduled sensors. We provide both optimal and low-complexity sub-optimal algorithms to tackle the above problem, and further reveal various properties on the optimal parameters which are useful to guide practical designs. In particular, we demonstrate that the proposed random jamming scheme is beneficial for improving the sum secrecy throughput, and the optimal jamming probability is the result of trade-off between secrecy and throughput. We also show that the throughput performance of the sub-optimal scheme approaches that of the optimal one when facing a stringent reliability constraint or a loose secrecy constraint.
Author Wong, Kai-Kit
Chen, Xin
Wang, Chao
Zheng, Tong-Xing
Yuan, Jinhong
Author_xml – sequence: 1
  givenname: Tong-Xing
  surname: Zheng
  fullname: Zheng, Tong-Xing
  organization: School of Information and Communications Engineering, Xi'an Jiaotong University, Xi'an 710049, China, and National Mobile Communications Research Laboratory, Southeast University, Nanjing 210096, China, and Ministry of Education Key Laboratory for Intelligent Networks and Network Security, Xi'an Jiaotong University, Xi'an 710049, China
– sequence: 2
  givenname: Xin
  surname: Chen
  fullname: Chen, Xin
  organization: School of Information and Communications Engineering, Xi'an Jiaotong University, Xi'an 710049, China, and National Mobile Communications Research Laboratory, Southeast University, Nanjing 210096, China, and Ministry of Education Key Laboratory for Intelligent Networks and Network Security, Xi'an Jiaotong University, Xi'an 710049, China
– sequence: 3
  givenname: Chao
  surname: Wang
  fullname: Wang, Chao
  organization: State Key Laboratory of Integrated Services Networks, Xidian University, Xi'an 710071, China, and National Mobile Communications Research Laboratory, Southeast University, Nanjing 210096, China
– sequence: 4
  givenname: Kai-Kit
  surname: Wong
  fullname: Wong, Kai-Kit
  organization: Department of Electronic and Electrical Engineering, University College London, WC1E 6BT London, U.K
– sequence: 5
  givenname: Jinhong
  surname: Yuan
  fullname: Yuan, Jinhong
  organization: School of Electrical Engineering and Telecommunications, University of New South Wales, Sydney, NSW 2052, Australia
BookMark eNp9kEtPGzEQgC0EEuHxB-jFEudNx14_drlFUUuRkoIIiOPKmNnGsFmntlO0_x6nQRw4cJrnNyN9R2S_9z0ScsZgzBjU3--m1_P5mAPn45IpDULvkRGTsiqgknqfjABqKJTW1SE5ivEZAASU5Yj8u1kO0VnT0ZkZMNAF2k1waaCuz53wB4tFHiK9Nf2TX9H5pktuneuJtRgjfXABu22ywD76QH9jevXhJV7QCV0kb5cmJmfpJfoVpjDQyXodvLHLE3LQmi7i6Xs8Jvc_f9xNfxWz68ur6WRWWF7LVCAIIZQE1E8VihYqYZk2LUcha8asrlRrbY5cMaEEMmm0ZgqZYQIe27Iqj8n57m5--3eDMTXPfhP6_LLhSmcfouSQt6rdlg0-xoBtY10yyfk-BeO6hkGztdz8t9xsLTfvljPKP6Hr4FYmDF9D33aQQ8QPoNZSSaXKN-FCirc
CODEN IECMBT
CitedBy_id crossref_primary_10_3390_s24248045
crossref_primary_10_1364_OE_500703
crossref_primary_10_1109_TIFS_2025_3530677
crossref_primary_10_1109_TWC_2024_3354452
crossref_primary_10_1155_2024_3570302
crossref_primary_10_1109_TNSE_2023_3234284
crossref_primary_10_1109_TVT_2024_3457777
crossref_primary_10_1016_j_comnet_2023_109845
crossref_primary_10_1109_TCCN_2024_3405481
crossref_primary_10_4028_p_5s9p7j
crossref_primary_10_1186_s13638_024_02395_z
crossref_primary_10_3390_s24113389
crossref_primary_10_1109_TIFS_2025_3544957
crossref_primary_10_1109_JIOT_2024_3357123
crossref_primary_10_1109_JIOT_2023_3313197
Cites_doi 10.1017/CBO9780511804441
10.1109/ACCESS.2018.2875118
10.1109/TIFS.2013.2279842
10.1109/TCOMM.2014.2314664
10.1109/TVT.2016.2599223
10.1002/j.1538-7305.1975.tb02040.x
10.1109/TVT.2017.2700475
10.1109/SURV.2009.090205
10.1109/TWC.2016.2622689
10.1109/JIOT.2015.2498900
10.1109/ACCESS.2018.2823003
10.1109/TIFS.2012.2194704
10.1109/JSAC.2013.130920
10.1002/SERIES1345
10.1007/978-3-030-55366-1
10.1109/ACCESS.2019.2920578
10.1109/ACCESS.2018.2839669
10.1109/TWC.2013.041713.120865
10.1115/1.3452897
10.1109/ACCESS.2017.2696032
10.1109/26.668742
10.1109/TIFS.2014.2309855
10.1109/TWC.2017.2689005
10.1109/MWC.001.1900051
10.1109/TVT.2017.2779508
10.1109/TCOMM.2015.2474390
10.1109/TIFS.2016.2516917
10.1109/JSAC.2018.2825560
10.1109/MCOM.2015.7081071
10.1109/TCOMM.2020.2989462
10.1109/JSAC.2009.090902
10.1109/T-WC.2008.071047
10.1109/TWC.2011.061511.102257
10.1109/TIFS.2019.2912337
10.1109/TWC.2017.2650987
10.1109/TWC.2008.060848
10.1109/TWC.2016.2613860
10.1007/978-981-10-1575-5
10.1109/TVT.2020.3037899
10.1109/TSP.2009.2014816
10.1109/TCOMM.2016.2519402
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022
DBID 97E
RIA
RIE
AAYXX
CITATION
7SP
8FD
L7M
DOI 10.1109/TCOMM.2022.3167047
DatabaseName IEEE Xplore (IEEE)
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Electronics & Communications Abstracts
Technology Research Database
Advanced Technologies Database with Aerospace
DatabaseTitle CrossRef
Technology Research Database
Advanced Technologies Database with Aerospace
Electronics & Communications Abstracts
DatabaseTitleList Technology Research Database

Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1558-0857
EndPage 1
ExternalDocumentID 10_1109_TCOMM_2022_3167047
9756566
Genre orig-research
GroupedDBID -~X
.DC
0R~
29I
4.4
5GY
6IK
85S
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABQJQ
ABVLG
ACGFO
ACGFS
ACIWK
ACNCT
AENEX
AGQYO
AHBIQ
AKJIK
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ASUFR
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
EBS
HZ~
IES
IFIPE
IPLJI
JAVBF
LAI
M43
MS~
O9-
OCL
P2P
RIA
RIE
RNS
TAE
TN5
ZCA
3EH
5VS
AAYOK
AAYXX
ABFSI
ACKIV
AETIX
AGSQL
AI.
AIBXA
ALLEH
CITATION
E.L
EJD
H~9
IAAWW
IBMZZ
ICLAB
IFJZH
RIG
VH1
ZCG
7SP
8FD
L7M
ID FETCH-LOGICAL-c295t-e0444650e7d8e4f084c17af2e45911c786fcc1c7261464e15a7716e1a140bf383
IEDL.DBID RIE
ISSN 0090-6778
IngestDate Mon Jun 30 10:14:17 EDT 2025
Tue Jul 01 02:51:37 EDT 2025
Thu Apr 24 22:55:42 EDT 2025
Wed Aug 27 02:40:49 EDT 2025
IsDoiOpenAccess false
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 6
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
https://doi.org/10.15223/policy-029
https://doi.org/10.15223/policy-037
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c295t-e0444650e7d8e4f084c17af2e45911c786fcc1c7261464e15a7716e1a140bf383
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0003-0187-6453
0000-0001-7521-0078
0000-0002-8730-5063
0000-0002-5794-493X
0000-0001-8164-3902
PQID 2676774320
PQPubID 85472
PageCount 1
ParticipantIDs ieee_primary_9756566
crossref_citationtrail_10_1109_TCOMM_2022_3167047
proquest_journals_2676774320
crossref_primary_10_1109_TCOMM_2022_3167047
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2022-06-01
PublicationDateYYYYMMDD 2022-06-01
PublicationDate_xml – month: 06
  year: 2022
  text: 2022-06-01
  day: 01
PublicationDecade 2020
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle IEEE transactions on communications
PublicationTitleAbbrev TCOMM
PublicationYear 2022
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref13
ref35
ref12
ref34
ref15
ref37
ref14
ref36
ref31
ref30
ref11
ref33
ref10
ref32
ref2
ref1
ref17
ref39
ref16
ref38
ref19
ref18
ref24
ref23
ref26
ref25
ref20
ref42
ref41
ref22
ref21
ref28
ref27
ref29
ref8
ref7
ref9
ref4
ref3
ref6
ref5
ref40
References_xml – ident: ref42
  doi: 10.1017/CBO9780511804441
– ident: ref34
  doi: 10.1109/ACCESS.2018.2875118
– ident: ref19
  doi: 10.1109/TIFS.2013.2279842
– ident: ref23
  doi: 10.1109/TCOMM.2014.2314664
– ident: ref12
  doi: 10.1109/TVT.2016.2599223
– ident: ref8
  doi: 10.1002/j.1538-7305.1975.tb02040.x
– ident: ref13
  doi: 10.1109/TVT.2017.2700475
– ident: ref3
  doi: 10.1109/SURV.2009.090205
– ident: ref20
  doi: 10.1109/TWC.2016.2622689
– ident: ref1
  doi: 10.1109/JIOT.2015.2498900
– ident: ref36
  doi: 10.1109/ACCESS.2018.2823003
– ident: ref28
  doi: 10.1109/TIFS.2012.2194704
– ident: ref30
  doi: 10.1109/JSAC.2013.130920
– ident: ref41
  doi: 10.1002/SERIES1345
– ident: ref4
  doi: 10.1007/978-3-030-55366-1
– ident: ref33
  doi: 10.1109/ACCESS.2019.2920578
– ident: ref2
  doi: 10.1109/ACCESS.2018.2839669
– ident: ref22
  doi: 10.1109/TWC.2013.041713.120865
– ident: ref40
  doi: 10.1115/1.3452897
– ident: ref35
  doi: 10.1109/ACCESS.2017.2696032
– ident: ref39
  doi: 10.1109/26.668742
– ident: ref29
  doi: 10.1109/TIFS.2014.2309855
– ident: ref21
  doi: 10.1109/TWC.2017.2689005
– ident: ref5
  doi: 10.1109/MWC.001.1900051
– ident: ref14
  doi: 10.1109/TVT.2017.2779508
– ident: ref10
  doi: 10.1109/TCOMM.2015.2474390
– ident: ref31
  doi: 10.1109/TIFS.2016.2516917
– ident: ref6
  doi: 10.1109/JSAC.2018.2825560
– ident: ref7
  doi: 10.1109/MCOM.2015.7081071
– ident: ref16
  doi: 10.1109/TCOMM.2020.2989462
– ident: ref17
  doi: 10.1109/JSAC.2009.090902
– ident: ref38
  doi: 10.1109/T-WC.2008.071047
– ident: ref18
  doi: 10.1109/TWC.2011.061511.102257
– ident: ref15
  doi: 10.1109/TIFS.2019.2912337
– ident: ref32
  doi: 10.1109/TWC.2017.2650987
– ident: ref9
  doi: 10.1109/TWC.2008.060848
– ident: ref11
  doi: 10.1109/TWC.2016.2613860
– ident: ref26
  doi: 10.1007/978-981-10-1575-5
– ident: ref25
  doi: 10.1109/TVT.2020.3037899
– ident: ref27
  doi: 10.1109/TSP.2009.2014816
– ident: ref37
  doi: 10.1002/SERIES1345
– ident: ref24
  doi: 10.1109/TCOMM.2016.2519402
SSID ssj0004033
Score 2.4991636
Snippet This paper investigates physical layer security for a large-scale WSN with random multiple access, where each fusion center in the network randomly schedules a...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 1
SubjectTerms Algorithms
Eavesdropping
Geometry
Jamming
Mathematical analysis
Multiple access
Optimization
outage probability
Outages
Physical layer security
Probability theory
random multiple access
Reliability
Reliability analysis
Sensors
stochastic geometry
Stochastic processes
sum secrecy throughput
Throughput
Wireless sensor networks
Wiretapping
Title Physical Layer Security in Large-Scale Random Multiple Access Wireless Sensor Networks: A Stochastic Geometry Approach
URI https://ieeexplore.ieee.org/document/9756566
https://www.proquest.com/docview/2676774320
Volume 70
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT9wwEB4BJ3poy0vd8pAP3CCLE5xXbyvEQ4gAYkHiFjmTCSAgQUu2UvvrO3a8C4IKcYqVOJGlz7G_L5n5BmBTq4JlQ0Ie7-bSUxUlng4QPSywQgp9TH2T4JydRkdX6vg6vJ6B7WkuDBHZ4DPqm6b9l182ODafynbS2NKPWZhl4dblar3kQMpd5zhpwtnjZJIgI9Ody72zLGMpGAR9k_ctTSmVV5uQrarybim2-8vBN8gmI-vCSu7747bo4983po2fHfp3-OqIphh0M2MBZqhehC-v7AeX4Pe5A0mcaGbeYuhq2Ym7ms-Mbsgb8kUSF7oum0eRudhDMbBFFoUJnH0wjSFL4WYkTruI8udfYiCGbYO32nhAi0NqHqkd_REDZ1--DFcH-5d7R56rw-BhkIatR8ZTjpkcxWVCqpKJQj_WVUAq5KUS4ySqEPnIYkxFivxQx6zCyNcs3oqKJfAKzNVNTT9AhGGAqmBeEEeFqnSalrtxWhLJSMsiQdUDfwJMjs6k3NTKeMitWJFpbsHMDZi5A7MHW9N7njqLjg97Lxl0pj0dMD1Ym-Cfu7f4OQ-Mmx1TrED-_P9dqzBvnt2Fjq3BXDsa0zqTlLbYsLPzH8y242E
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3fT9RAEJ4gPKgPgiLxEHQffNMe27L9xduFgIdeT-MdCW_NdjpVI7Tk6JnIX8_sdu8gSIxP3bS76Sbfdme-7cw3AO-0Kpg2JOSxNZeeqijxdIDoYYEVUuhj6psE52wcDU_Vp7PwbAU-LHNhiMgGn1HfNO2__LLBuTkq20tj6348gjW2-6HfZWvdZkHKfac5aQLa42SRIiPTvenhlyxjMhgEfZP5LU0xlTtmyNZV-WszthbmeB2yxdy6wJJf_Xlb9PH6nmzj_05-A545V1MMurXxHFaofgFP7wgQbsLvrw4mMdLse4uJq2YnftZ8Z_advAk_JPFN12VzITIXfSgGtsyiMKGz56YxYTLczMS4iym_OhADMWkb_KGNCrT4SM0FtbM_YuAEzF_C6fHR9HDouUoMHgZp2HpkVOXYl6O4TEhVMlHox7oKSIW8WWKcRBUiX5mOqUiRH-qYeRj5mulbUTEJ3oLVuqnpFYgwDFAV7BnEUaEqnablfpyWRDLSskhQ9cBfAJOjkyk31TLOc0tXZJpbMHMDZu7A7MH75ZjLTqTjn703DTrLng6YHuws8M_dd3yVB0bPjp2sQG4_POotPB5Os1E-Ohl_fg1PzHu6QLIdWG1nc9pll6Ut3tiVegPRjuaq
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Physical+Layer+Security+in+Large-Scale+Random+Multiple+Access+Wireless+Sensor+Networks%3A+A+Stochastic+Geometry+Approach&rft.jtitle=IEEE+transactions+on+communications&rft.au=Zheng%2C+Tong-Xing&rft.au=Chen%2C+Xin&rft.au=Wang%2C+Chao&rft.au=Wong%2C+Kai-Kit&rft.date=2022-06-01&rft.pub=IEEE&rft.issn=0090-6778&rft.spage=1&rft.epage=1&rft_id=info:doi/10.1109%2FTCOMM.2022.3167047&rft.externalDocID=9756566
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0090-6778&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0090-6778&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0090-6778&client=summon