Caching-Aided Physical Layer Security in Wireless Cache-Enabled Heterogeneous Networks

Caching popular contents is a promising way to offload the mobile data traffic in wireless networks, but so far the potential advantage of caching in improving physical layer security (PLS) is rarely considered. In this paper, we contribute to the design and theoretical understanding of exploiting t...

Full description

Saved in:
Bibliographic Details
Published inIEEE access Vol. 6; pp. 68920 - 68931
Main Authors Zhao, Wu, Chen, Zhiyong, Li, Kuikui, Liu, Ning, Xia, Bin, Luo, Ling
Format Journal Article
LanguageEnglish
Published Piscataway IEEE 2018
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Caching popular contents is a promising way to offload the mobile data traffic in wireless networks, but so far the potential advantage of caching in improving physical layer security (PLS) is rarely considered. In this paper, we contribute to the design and theoretical understanding of exploiting the caching ability to improve the transmission security in a wireless heterogeneous network. Two transmission schemes, namely Symbol-level scheme and Bit-level scheme, are considered in such network to improve PLS by utilizing the content property of cached files. In Symbol-level scheme, the base station (BS) ensures the secrecy of communication by transmitting the requested file along with a pre-cached file of the user such that the eavesdropper's channel is degraded. In Bit-level scheme, the BS encodes the requested file with a pre-cached file to fully resist the overhearing of eavesdroppers in bit level, e.g., network coding. Accordingly, the node locations of BSs, users and eavesdroppers are first modeled as mutually independent Poisson point processes and the corresponding file access protocol is developed. We consider two scenarios where each scheme is employed respectively, and then derive analytical expressions of two secrecy metrics in terms of average secrecy rate and secrecy coverage probability. Numerical results are provided to show the significant security advantages of the proposed schemes and to characterize the impacts of the cache ability and network resources on the security performance.
ISSN:2169-3536
2169-3536
DOI:10.1109/ACCESS.2018.2880339