A new model for physical layer security in cellular networks

Giovanni Geraci, Harpreet S. Dhillon, Jeffrey G. Andrews, Jinhong Yuan, Iain B. Collings

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

8 Citations (Scopus)

Abstract

In this paper, we study physical layer security for the downlink of cellular networks. In a cellular network, the confidential messages transmitted to each mobile user can be eavesdropped by the other users in the same cell and also by the users in the other cells. We model the locations of base stations and mobile users as two independent two-dimensional Poisson point processes. By combining tools from stochastic geometry and random matrix theory, we analyze the secrecy rates achievable with regularized channel inversion (RCI) precoding under Rayleigh fading. Our analysis shows that unlike isolated cells, the secrecy rate in a cellular network does not grow monotonically with the transmit power. Moreover, we find that the network tends to be in secrecy outage if the transmit power grows unbounded. Furthermore, we show that there exists an optimal value for the base station deployment density that maximizes the secrecy rate.

Original languageEnglish
Title of host publication2014 IEEE International Conference on Communications, ICC 2014
EditorsA Jamalipour, DJ Deng
Place of PublicationLos Alamitos, CA
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Pages2147-2152
Number of pages6
ISBN (Print)9781479920037
DOIs
Publication statusPublished - 2014
Externally publishedYes
Event2014 1st IEEE International Conference on Communications, ICC 2014 - Sydney, NSW, Australia
Duration: 10 Jun 201414 Jun 2014

Other

Other2014 1st IEEE International Conference on Communications, ICC 2014
Country/TerritoryAustralia
CitySydney, NSW
Period10/06/1414/06/14

Keywords

  • cellular networks
  • linear precoding
  • physical layer security
  • random matrix theory
  • stochastic geometry

Fingerprint

Dive into the research topics of 'A new model for physical layer security in cellular networks'. Together they form a unique fingerprint.

Cite this