Physical Layer Security in Large-Scale Random Multiple Access Wireless Sensor Networks: A Stochastic Geometry Approach
This paper investigates physical layer security for a large-scale WSN with random multiple access, where each fusion center in the network randomly schedules a number of sensors to upload their sensed data subject to the overhearing of randomly distributed eavesdroppers. We propose an uncoordinated...
Saved in:
Published in | IEEE transactions on communications Vol. 70; no. 6; p. 1 |
---|---|
Main Authors | , , , , |
Format | Journal Article |
Language | English |
Published |
New York
IEEE
01.06.2022
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | This paper investigates physical layer security for a large-scale WSN with random multiple access, where each fusion center in the network randomly schedules a number of sensors to upload their sensed data subject to the overhearing of randomly distributed eavesdroppers. We propose an uncoordinated random jamming scheme in which those unscheduled sensors send jamming signals with a certain probability to defeat the eavesdroppers. With the aid of stochastic geometry theory and order statistics, we derive analytical expressions for the connection outage probability and secrecy outage probability to characterize transmission reliability and secrecy, respectively. Based on the obtained analytical results, we formulate an optimization problem for maximizing the sum secrecy throughput subject to both reliability and secrecy constraints, considering a joint design of the wiretap code rates for each scheduled sensor and the jamming probability for the unscheduled sensors. We provide both optimal and low-complexity sub-optimal algorithms to tackle the above problem, and further reveal various properties on the optimal parameters which are useful to guide practical designs. In particular, we demonstrate that the proposed random jamming scheme is beneficial for improving the sum secrecy throughput, and the optimal jamming probability is the result of trade-off between secrecy and throughput. We also show that the throughput performance of the sub-optimal scheme approaches that of the optimal one when facing a stringent reliability constraint or a loose secrecy constraint. |
---|---|
AbstractList | This paper investigates physical layer security for a large-scale WSN with random multiple access, where each fusion center in the network randomly schedules a number of sensors to upload their sensed data subject to the overhearing of randomly distributed eavesdroppers. We propose an uncoordinated random jamming scheme in which those unscheduled sensors send jamming signals with a certain probability to defeat the eavesdroppers. With the aid of stochastic geometry theory and order statistics, we derive analytical expressions for the connection outage probability and secrecy outage probability to characterize transmission reliability and secrecy, respectively. Based on the obtained analytical results, we formulate an optimization problem for maximizing the sum secrecy throughput subject to both reliability and secrecy constraints, considering a joint design of the wiretap code rates for each scheduled sensor and the jamming probability for the unscheduled sensors. We provide both optimal and low-complexity sub-optimal algorithms to tackle the above problem, and further reveal various properties on the optimal parameters which are useful to guide practical designs. In particular, we demonstrate that the proposed random jamming scheme is beneficial for improving the sum secrecy throughput, and the optimal jamming probability is the result of trade-off between secrecy and throughput. We also show that the throughput performance of the sub-optimal scheme approaches that of the optimal one when facing a stringent reliability constraint or a loose secrecy constraint. |
Author | Wong, Kai-Kit Chen, Xin Wang, Chao Zheng, Tong-Xing Yuan, Jinhong |
Author_xml | – sequence: 1 givenname: Tong-Xing surname: Zheng fullname: Zheng, Tong-Xing organization: School of Information and Communications Engineering, Xi'an Jiaotong University, Xi'an 710049, China, and National Mobile Communications Research Laboratory, Southeast University, Nanjing 210096, China, and Ministry of Education Key Laboratory for Intelligent Networks and Network Security, Xi'an Jiaotong University, Xi'an 710049, China – sequence: 2 givenname: Xin surname: Chen fullname: Chen, Xin organization: School of Information and Communications Engineering, Xi'an Jiaotong University, Xi'an 710049, China, and National Mobile Communications Research Laboratory, Southeast University, Nanjing 210096, China, and Ministry of Education Key Laboratory for Intelligent Networks and Network Security, Xi'an Jiaotong University, Xi'an 710049, China – sequence: 3 givenname: Chao surname: Wang fullname: Wang, Chao organization: State Key Laboratory of Integrated Services Networks, Xidian University, Xi'an 710071, China, and National Mobile Communications Research Laboratory, Southeast University, Nanjing 210096, China – sequence: 4 givenname: Kai-Kit surname: Wong fullname: Wong, Kai-Kit organization: Department of Electronic and Electrical Engineering, University College London, WC1E 6BT London, U.K – sequence: 5 givenname: Jinhong surname: Yuan fullname: Yuan, Jinhong organization: School of Electrical Engineering and Telecommunications, University of New South Wales, Sydney, NSW 2052, Australia |
BookMark | eNp9kEtPGzEQgC0EEuHxB-jFEudNx14_drlFUUuRkoIIiOPKmNnGsFmntlO0_x6nQRw4cJrnNyN9R2S_9z0ScsZgzBjU3--m1_P5mAPn45IpDULvkRGTsiqgknqfjABqKJTW1SE5ivEZAASU5Yj8u1kO0VnT0ZkZMNAF2k1waaCuz53wB4tFHiK9Nf2TX9H5pktuneuJtRgjfXABu22ywD76QH9jevXhJV7QCV0kb5cmJmfpJfoVpjDQyXodvLHLE3LQmi7i6Xs8Jvc_f9xNfxWz68ur6WRWWF7LVCAIIZQE1E8VihYqYZk2LUcha8asrlRrbY5cMaEEMmm0ZgqZYQIe27Iqj8n57m5--3eDMTXPfhP6_LLhSmcfouSQt6rdlg0-xoBtY10yyfk-BeO6hkGztdz8t9xsLTfvljPKP6Hr4FYmDF9D33aQQ8QPoNZSSaXKN-FCirc |
CODEN | IECMBT |
CitedBy_id | crossref_primary_10_3390_s24248045 crossref_primary_10_1364_OE_500703 crossref_primary_10_1109_TIFS_2025_3530677 crossref_primary_10_1109_TWC_2024_3354452 crossref_primary_10_1155_2024_3570302 crossref_primary_10_1109_TNSE_2023_3234284 crossref_primary_10_1109_TVT_2024_3457777 crossref_primary_10_1016_j_comnet_2023_109845 crossref_primary_10_1109_TCCN_2024_3405481 crossref_primary_10_4028_p_5s9p7j crossref_primary_10_1186_s13638_024_02395_z crossref_primary_10_3390_s24113389 crossref_primary_10_1109_TIFS_2025_3544957 crossref_primary_10_1109_JIOT_2024_3357123 crossref_primary_10_1109_JIOT_2023_3313197 |
Cites_doi | 10.1017/CBO9780511804441 10.1109/ACCESS.2018.2875118 10.1109/TIFS.2013.2279842 10.1109/TCOMM.2014.2314664 10.1109/TVT.2016.2599223 10.1002/j.1538-7305.1975.tb02040.x 10.1109/TVT.2017.2700475 10.1109/SURV.2009.090205 10.1109/TWC.2016.2622689 10.1109/JIOT.2015.2498900 10.1109/ACCESS.2018.2823003 10.1109/TIFS.2012.2194704 10.1109/JSAC.2013.130920 10.1002/SERIES1345 10.1007/978-3-030-55366-1 10.1109/ACCESS.2019.2920578 10.1109/ACCESS.2018.2839669 10.1109/TWC.2013.041713.120865 10.1115/1.3452897 10.1109/ACCESS.2017.2696032 10.1109/26.668742 10.1109/TIFS.2014.2309855 10.1109/TWC.2017.2689005 10.1109/MWC.001.1900051 10.1109/TVT.2017.2779508 10.1109/TCOMM.2015.2474390 10.1109/TIFS.2016.2516917 10.1109/JSAC.2018.2825560 10.1109/MCOM.2015.7081071 10.1109/TCOMM.2020.2989462 10.1109/JSAC.2009.090902 10.1109/T-WC.2008.071047 10.1109/TWC.2011.061511.102257 10.1109/TIFS.2019.2912337 10.1109/TWC.2017.2650987 10.1109/TWC.2008.060848 10.1109/TWC.2016.2613860 10.1007/978-981-10-1575-5 10.1109/TVT.2020.3037899 10.1109/TSP.2009.2014816 10.1109/TCOMM.2016.2519402 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022 |
DBID | 97E RIA RIE AAYXX CITATION 7SP 8FD L7M |
DOI | 10.1109/TCOMM.2022.3167047 |
DatabaseName | IEEE Xplore (IEEE) IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Electronics & Communications Abstracts Technology Research Database Advanced Technologies Database with Aerospace |
DatabaseTitle | CrossRef Technology Research Database Advanced Technologies Database with Aerospace Electronics & Communications Abstracts |
DatabaseTitleList | Technology Research Database |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 1558-0857 |
EndPage | 1 |
ExternalDocumentID | 10_1109_TCOMM_2022_3167047 9756566 |
Genre | orig-research |
GroupedDBID | -~X .DC 0R~ 29I 4.4 5GY 6IK 85S 97E AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACGFO ACGFS ACIWK ACNCT AENEX AGQYO AHBIQ AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ASUFR ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 EBS HZ~ IES IFIPE IPLJI JAVBF LAI M43 MS~ O9- OCL P2P RIA RIE RNS TAE TN5 ZCA 3EH 5VS AAYOK AAYXX ABFSI ACKIV AETIX AGSQL AI. AIBXA ALLEH CITATION E.L EJD H~9 IAAWW IBMZZ ICLAB IFJZH RIG VH1 ZCG 7SP 8FD L7M |
ID | FETCH-LOGICAL-c295t-e0444650e7d8e4f084c17af2e45911c786fcc1c7261464e15a7716e1a140bf383 |
IEDL.DBID | RIE |
ISSN | 0090-6778 |
IngestDate | Mon Jun 30 10:14:17 EDT 2025 Tue Jul 01 02:51:37 EDT 2025 Thu Apr 24 22:55:42 EDT 2025 Wed Aug 27 02:40:49 EDT 2025 |
IsDoiOpenAccess | false |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 6 |
Language | English |
License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c295t-e0444650e7d8e4f084c17af2e45911c786fcc1c7261464e15a7716e1a140bf383 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0003-0187-6453 0000-0001-7521-0078 0000-0002-8730-5063 0000-0002-5794-493X 0000-0001-8164-3902 |
PQID | 2676774320 |
PQPubID | 85472 |
PageCount | 1 |
ParticipantIDs | ieee_primary_9756566 crossref_citationtrail_10_1109_TCOMM_2022_3167047 proquest_journals_2676774320 crossref_primary_10_1109_TCOMM_2022_3167047 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2022-06-01 |
PublicationDateYYYYMMDD | 2022-06-01 |
PublicationDate_xml | – month: 06 year: 2022 text: 2022-06-01 day: 01 |
PublicationDecade | 2020 |
PublicationPlace | New York |
PublicationPlace_xml | – name: New York |
PublicationTitle | IEEE transactions on communications |
PublicationTitleAbbrev | TCOMM |
PublicationYear | 2022 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref13 ref35 ref12 ref34 ref15 ref37 ref14 ref36 ref31 ref30 ref11 ref33 ref10 ref32 ref2 ref1 ref17 ref39 ref16 ref38 ref19 ref18 ref24 ref23 ref26 ref25 ref20 ref42 ref41 ref22 ref21 ref28 ref27 ref29 ref8 ref7 ref9 ref4 ref3 ref6 ref5 ref40 |
References_xml | – ident: ref42 doi: 10.1017/CBO9780511804441 – ident: ref34 doi: 10.1109/ACCESS.2018.2875118 – ident: ref19 doi: 10.1109/TIFS.2013.2279842 – ident: ref23 doi: 10.1109/TCOMM.2014.2314664 – ident: ref12 doi: 10.1109/TVT.2016.2599223 – ident: ref8 doi: 10.1002/j.1538-7305.1975.tb02040.x – ident: ref13 doi: 10.1109/TVT.2017.2700475 – ident: ref3 doi: 10.1109/SURV.2009.090205 – ident: ref20 doi: 10.1109/TWC.2016.2622689 – ident: ref1 doi: 10.1109/JIOT.2015.2498900 – ident: ref36 doi: 10.1109/ACCESS.2018.2823003 – ident: ref28 doi: 10.1109/TIFS.2012.2194704 – ident: ref30 doi: 10.1109/JSAC.2013.130920 – ident: ref41 doi: 10.1002/SERIES1345 – ident: ref4 doi: 10.1007/978-3-030-55366-1 – ident: ref33 doi: 10.1109/ACCESS.2019.2920578 – ident: ref2 doi: 10.1109/ACCESS.2018.2839669 – ident: ref22 doi: 10.1109/TWC.2013.041713.120865 – ident: ref40 doi: 10.1115/1.3452897 – ident: ref35 doi: 10.1109/ACCESS.2017.2696032 – ident: ref39 doi: 10.1109/26.668742 – ident: ref29 doi: 10.1109/TIFS.2014.2309855 – ident: ref21 doi: 10.1109/TWC.2017.2689005 – ident: ref5 doi: 10.1109/MWC.001.1900051 – ident: ref14 doi: 10.1109/TVT.2017.2779508 – ident: ref10 doi: 10.1109/TCOMM.2015.2474390 – ident: ref31 doi: 10.1109/TIFS.2016.2516917 – ident: ref6 doi: 10.1109/JSAC.2018.2825560 – ident: ref7 doi: 10.1109/MCOM.2015.7081071 – ident: ref16 doi: 10.1109/TCOMM.2020.2989462 – ident: ref17 doi: 10.1109/JSAC.2009.090902 – ident: ref38 doi: 10.1109/T-WC.2008.071047 – ident: ref18 doi: 10.1109/TWC.2011.061511.102257 – ident: ref15 doi: 10.1109/TIFS.2019.2912337 – ident: ref32 doi: 10.1109/TWC.2017.2650987 – ident: ref9 doi: 10.1109/TWC.2008.060848 – ident: ref11 doi: 10.1109/TWC.2016.2613860 – ident: ref26 doi: 10.1007/978-981-10-1575-5 – ident: ref25 doi: 10.1109/TVT.2020.3037899 – ident: ref27 doi: 10.1109/TSP.2009.2014816 – ident: ref37 doi: 10.1002/SERIES1345 – ident: ref24 doi: 10.1109/TCOMM.2016.2519402 |
SSID | ssj0004033 |
Score | 2.4991636 |
Snippet | This paper investigates physical layer security for a large-scale WSN with random multiple access, where each fusion center in the network randomly schedules a... |
SourceID | proquest crossref ieee |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 1 |
SubjectTerms | Algorithms Eavesdropping Geometry Jamming Mathematical analysis Multiple access Optimization outage probability Outages Physical layer security Probability theory random multiple access Reliability Reliability analysis Sensors stochastic geometry Stochastic processes sum secrecy throughput Throughput Wireless sensor networks Wiretapping |
Title | Physical Layer Security in Large-Scale Random Multiple Access Wireless Sensor Networks: A Stochastic Geometry Approach |
URI | https://ieeexplore.ieee.org/document/9756566 https://www.proquest.com/docview/2676774320 |
Volume | 70 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT9wwEB4BJ3poy0vd8pAP3CCLE5xXbyvEQ4gAYkHiFjmTCSAgQUu2UvvrO3a8C4IKcYqVOJGlz7G_L5n5BmBTq4JlQ0Ie7-bSUxUlng4QPSywQgp9TH2T4JydRkdX6vg6vJ6B7WkuDBHZ4DPqm6b9l182ODafynbS2NKPWZhl4dblar3kQMpd5zhpwtnjZJIgI9Ody72zLGMpGAR9k_ctTSmVV5uQrarybim2-8vBN8gmI-vCSu7747bo4983po2fHfp3-OqIphh0M2MBZqhehC-v7AeX4Pe5A0mcaGbeYuhq2Ym7ms-Mbsgb8kUSF7oum0eRudhDMbBFFoUJnH0wjSFL4WYkTruI8udfYiCGbYO32nhAi0NqHqkd_REDZ1--DFcH-5d7R56rw-BhkIatR8ZTjpkcxWVCqpKJQj_WVUAq5KUS4ySqEPnIYkxFivxQx6zCyNcs3oqKJfAKzNVNTT9AhGGAqmBeEEeFqnSalrtxWhLJSMsiQdUDfwJMjs6k3NTKeMitWJFpbsHMDZi5A7MHW9N7njqLjg97Lxl0pj0dMD1Ym-Cfu7f4OQ-Mmx1TrED-_P9dqzBvnt2Fjq3BXDsa0zqTlLbYsLPzH8y242E |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3fT9RAEJ4gPKgPgiLxEHQffNMe27L9xduFgIdeT-MdCW_NdjpVI7Tk6JnIX8_sdu8gSIxP3bS76Sbfdme-7cw3AO-0Kpg2JOSxNZeeqijxdIDoYYEVUuhj6psE52wcDU_Vp7PwbAU-LHNhiMgGn1HfNO2__LLBuTkq20tj6348gjW2-6HfZWvdZkHKfac5aQLa42SRIiPTvenhlyxjMhgEfZP5LU0xlTtmyNZV-WszthbmeB2yxdy6wJJf_Xlb9PH6nmzj_05-A545V1MMurXxHFaofgFP7wgQbsLvrw4mMdLse4uJq2YnftZ8Z_advAk_JPFN12VzITIXfSgGtsyiMKGz56YxYTLczMS4iym_OhADMWkb_KGNCrT4SM0FtbM_YuAEzF_C6fHR9HDouUoMHgZp2HpkVOXYl6O4TEhVMlHox7oKSIW8WWKcRBUiX5mOqUiRH-qYeRj5mulbUTEJ3oLVuqnpFYgwDFAV7BnEUaEqnablfpyWRDLSskhQ9cBfAJOjkyk31TLOc0tXZJpbMHMDZu7A7MH75ZjLTqTjn703DTrLng6YHuws8M_dd3yVB0bPjp2sQG4_POotPB5Os1E-Ohl_fg1PzHu6QLIdWG1nc9pll6Ut3tiVegPRjuaq |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Physical+Layer+Security+in+Large-Scale+Random+Multiple+Access+Wireless+Sensor+Networks%3A+A+Stochastic+Geometry+Approach&rft.jtitle=IEEE+transactions+on+communications&rft.au=Zheng%2C+Tong-Xing&rft.au=Chen%2C+Xin&rft.au=Wang%2C+Chao&rft.au=Wong%2C+Kai-Kit&rft.date=2022-06-01&rft.pub=IEEE&rft.issn=0090-6778&rft.spage=1&rft.epage=1&rft_id=info:doi/10.1109%2FTCOMM.2022.3167047&rft.externalDocID=9756566 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0090-6778&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0090-6778&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0090-6778&client=summon |