Caching-Aided Physical Layer Security in Wireless Cache-Enabled Heterogeneous Networks
Caching popular contents is a promising way to offload the mobile data traffic in wireless networks, but so far the potential advantage of caching in improving physical layer security (PLS) is rarely considered. In this paper, we contribute to the design and theoretical understanding of exploiting t...
Saved in:
Published in | IEEE access Vol. 6; pp. 68920 - 68931 |
---|---|
Main Authors | , , , , , |
Format | Journal Article |
Language | English |
Published |
Piscataway
IEEE
2018
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | Caching popular contents is a promising way to offload the mobile data traffic in wireless networks, but so far the potential advantage of caching in improving physical layer security (PLS) is rarely considered. In this paper, we contribute to the design and theoretical understanding of exploiting the caching ability to improve the transmission security in a wireless heterogeneous network. Two transmission schemes, namely Symbol-level scheme and Bit-level scheme, are considered in such network to improve PLS by utilizing the content property of cached files. In Symbol-level scheme, the base station (BS) ensures the secrecy of communication by transmitting the requested file along with a pre-cached file of the user such that the eavesdropper's channel is degraded. In Bit-level scheme, the BS encodes the requested file with a pre-cached file to fully resist the overhearing of eavesdroppers in bit level, e.g., network coding. Accordingly, the node locations of BSs, users and eavesdroppers are first modeled as mutually independent Poisson point processes and the corresponding file access protocol is developed. We consider two scenarios where each scheme is employed respectively, and then derive analytical expressions of two secrecy metrics in terms of average secrecy rate and secrecy coverage probability. Numerical results are provided to show the significant security advantages of the proposed schemes and to characterize the impacts of the cache ability and network resources on the security performance. |
---|---|
ISSN: | 2169-3536 2169-3536 |
DOI: | 10.1109/ACCESS.2018.2880339 |