Physical Layer Security in Large-Scale Random Multiple Access Wireless Sensor Networks: A Stochastic Geometry Approach

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 14

4038 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 70, NO.

6, JUNE 2022

Physical Layer Security in Large-Scale Random


Multiple Access Wireless Sensor Networks:
A Stochastic Geometry Approach
Tong-Xing Zheng , Member, IEEE, Xin Chen , Chao Wang , Senior Member, IEEE,
Kai-Kit Wong , Fellow, IEEE, and Jinhong Yuan , Fellow, IEEE

Abstract— This paper investigates physical layer security for connection outage probability and secrecy outage probability
a large-scale WSN with random multiple access, where each to characterize transmission reliability and secrecy, respectively.
fusion center in the network randomly schedules a number of Based on the obtained analytical results, we formulate an opti-
sensors to upload their sensed data subject to the overhearing mization problem for maximizing the sum secrecy throughput
of randomly distributed eavesdroppers. We propose an unco- subject to both reliability and secrecy constraints, considering
ordinated random jamming scheme in which those unscheduled a joint design of the wiretap code rates for each scheduled
sensors send jamming signals with a certain probability to defeat sensor and the jamming probability for the unscheduled sensors.
the eavesdroppers. With the aid of stochastic geometry theory We provide both optimal and low-complexity sub-optimal algo-
and order statistics, we derive analytical expressions for the rithms to tackle the above problem, and further reveal various
properties on the optimal parameters which are useful to guide
Manuscript received August 12, 2021; revised March 3, 2022; accepted practical designs. In particular, we demonstrate that the proposed
April 5, 2022. Date of publication April 13, 2022; date of current ver- random jamming scheme is beneficial for improving the sum
sion June 16, 2022. The work of Tong-Xing Zheng and Xin Chen was secrecy throughput, and the optimal jamming probability is the
supported in part by the National Natural Science Foundation of China result of trade-off between secrecy and throughput. We also
under Grant 61701390, in part by the Open Research Fund of National show that the throughput performance of the sub-optimal scheme
Mobile Communications Research Laboratory, Southeast University, under approaches that of the optimal one when facing a stringent
Grant 2021D07, in part by the China Postdoctoral Science Foundation under reliability constraint or a loose secrecy constraint.
Grants 2021M702631, in part by the Natural Science Basic Research Plan of
Shaanxi Province under Grant 2022JM-320, and in part by the Fundamental Index Terms— Physical layer security, wireless sensor net-
Research Funds for the Central Universities under Grant xzy012021033. The works, random multiple access, outage probability, sum secrecy
work of Chao Wang was supported in part by the National Natural Science throughput, stochastic geometry.
Foundation of China under Grant 61801518, in part by the Key Research
and Development Program of Shaanxi under Grant 2022KW-03, in part I. I NTRODUCTION
by the Defense Industrial Technology Development Program under Grant
JCKY2021608B001, in part by the Zhejiang Lab’s International Talent Fund
for Young Professionals, in part by the China Postdoctoral Science Foundation
under Grant 2020M683428, in part by the open research fund of the Ministry
W IRELESS sensor networks (WSNs) have drawn promi-
nent research interests from both academia and
industry in recent years and have been envisioned as key
of Education Key Lab of Broadband Wireless Communication and Sensor technologies for Internet-of-Things (IoTs) [1]. With a massive
Network Technology, Nanjing University of Posts and Telecommunications,
and in part by the Open Research Fund of National Mobile Communi- number of sensors deployed in a network, collecting and
cations Research Laboratory, Southeast University, under Grant 2021D06. reporting diverse environmental data to fusion centers (FCs),
The work of Kai-Kit Wong was supported in part by the Engineering and WSNs show tremendous potential in a variety of applica-
Physical Sciences Research Council under Grant EP/T015985/1. The work
of Jinhong Yuan was supported in part by the Australia Research Council tions, including security and battlefield surveillance, disaster
Discovery Project under Grant DP220103596 and Linkage Project under Grant alert, industrial automation, traffic management, smart health-
LP200301482. The associate editor coordinating the review of this article and care and homes, etc [2]. However, delivering sensing data
approving it for publication was S. Aissa. (Corresponding authors: Tong-Xing
Zheng; Chao Wang.) over the air is prone to eavesdropping attacks due to the
Tong-Xing Zheng and Xin Chen are with the Ministry of Education Key openness of wireless channels. Moreover, it is challenging
Laboratory for Intelligent Networks and Network Security, and the School to employ key-based cryptographic techniques for WSNs,
of Information and Communications Engineering, Xi’an Jiaotong University,
Xi’an 710049, China, and also with the National Mobile Communications where the distribution, maintenance, and management of secret
Research Laboratory, Southeast University, Nanjing 210096, China (e-mail: keys are expensive under dynamic and large-scale topologies.
zhengtx@mail.xjtu.edu.cn; cx0513@stu.xjtu.edu.cn). In general, sensors are incapable of implementing complicated
Chao Wang is with the State Key Laboratory of Integrated Services Net-
works, Xidian University, Xi’an 710071, China, and also with the National cryptographic algorithms due to low energy and computing
Mobile Communications Research Laboratory, Southeast University, Nanjing power [3]. In this context, physical layer security [4]–[7] has
210096, China (e-mail: drchaowang@126.com). emerged as an appealing low-complexity paradigm to realize
Kai-Kit Wong is with the Department of Electronic and Electrical Engi-
neering, University College London, London WC1E 6BT, U.K. (e-mail: secure transmissions by exploiting wireless media character-
kai-kit.wong@ucl.ac.uk). istics, and it promises to be a powerful supplement or even
Jinhong Yuan is with the School of Electrical Engineering and Telecom- alternative to the cryptographic mechanisms for WSNs.
munications, University of New South Wales, Sydney, NSW 2052, Australia
(e-mail: j.yuan@unsw.edu.au). A. Background and Motivations
Color versions of one or more figures in this article are available at
https://doi.org/10.1109/TCOMM.2022.3167047. The research of physical layer security dates back to as
Digital Object Identifier 10.1109/TCOMM.2022.3167047 early as 1975 when Wyner postulated the information-theoretic
0090-6778 © 2022 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See https://www.ieee.org/publications/rights/index.html for more information.

Authorized licensed use limited to: Motilal Nehru National Institute of Technology. Downloaded on November 08,2022 at 09:40:37 UTC from IEEE Xplore. Restrictions apply.
ZHENG et al.: PHYSICAL LAYER SECURITY IN LARGE-SCALE RANDOM MULTIPLE ACCESS WSNs 4039

foundation in his ground-breaking treatise [8]. Wyner intro- As mentioned previously, physical layer security is partic-
duced the degraded witetap channel model and showed that ularly important for WSNs, since employing traditional cryp-
the reliability and secrecy of information delivery can be tographic mechanism is rather costly and difficult. Recently,
concurrently guaranteed with appropriate secrecy channel cod- physical layer security has been advocated to protect com-
ing. This pioneering work has motivated substantial endeavors munications from eavesdropping for WSNs. The majority of
invested in developing physical layer security during the past existing literature on physical layer security in WSNs has
decade, from the viewpoints of both information theory and been concentrated on deterministic network geometry, i.e.,
signal processing. ignoring the uncertainty of nodes’ locations or large-scale path
Early research on physical layer security have been loss [27]–[29]. Given that sensors are generally randomly scat-
more concentrated on point-to-point communication links. tered, Lee et al. [30] first introduced the concept of distributed
Fundamental information-theoretic limits and optimal secrecy network secrecy and quantified the secrecy throughput and
signaling schemes have been investigated by exploiting the energy consumption for a multilevel WSN using tools from
channel state information (CSI) of both the main channel stochastic geometry. Deng et al. [31] further analyzed the
(spanning from transmitter to the intended receiver) and the average secrecy rate for a three-tier WSN. However, these
wiretap channel (spanning from transmitter to the undesired works only considered access technologies with orthogonal
receiver, or eavesdropper). When the eavesdropper’s CSI is resource blocks (RBs).
completely unavailable, Goel and Negi [9] proposed to radiate Random multiple access has the virtue of being highly con-
controllable artificial noise or jamming signals along with venient and flexible without requiring a complicated control
confidential information, through either centralized multiple scheduling, which is well-suited for the large-scale WSNs
antennas or distributed cooperative jammers, to degrade the particularly when the system load is overly heavy. Although
wiretap channel while without impairing the main channel. studies of secure multiple access have been reported for var-
With no need for the eavesdropper’s CSI, the idea of artificial ious wiretap channel models, the results cannot be directly
noise or cooperative jamming has opened a new avenue for applied for large-scale WSNs with stochastic network geom-
enhancing physical layer security and has sparked a wave of etry. In recent years, the physical layer security of non-
innovation, e.g, see [10]–[16]. orthogonal multiple access (NOMA) for large-scale networks
Different from the point-to-point scenarios, secure has received considerable attention, e.g., [32]–[34], but unfor-
communications in large-scale wireless networks suffer from tunately, at present researchers have mainly focused on two-
severe interference caused by a large amount of concurrent user pairing sharing the same RB. In fact, random multiple
transmissions, and therefore the security performance depends access with non-orthogonal RBs will significantly hamper the
heavily on the network geometry and the locations of nodes analysis of channel statistics for large-scale WSNs, since we
in the network. Against this background, stochastic geometry have to deal with the combined effect of channel fading, the
theory has offered powerful tools to study large-scale wireless random locations of external interfering sensors, as well as the
networks from a statistical point of view by modeling node uncertainty of the successive interference cancellation (SIC)
positions as some spatial distributions like Poisson point based decoding order for internal sensors belong to the same
process (PPP) [17], and the research on physical layer security FC. The intractability of analysis will in no doubt make
under a stochastic geometry framework has been extensively it challenging to design schemes to optimize the network
carried out recently. For example, for large-scale ad hoc security performance in terms of e.g., sum secrecy throughput.
networks, Zhou et al. [18] and Zhang et al. [19] respectively Our research work aims to provide an analytical framework
explored single- and multi-antenna secure transmissions and and design schemes to address the aforementioned problem.
identified the tradeoff between reliability and secrecy against
eavesdropping attacks. Zheng et al. [20], [21] explored the
great benefit of full-duplex receiver jamming in enhancing the B. Our Work and Contributions
network-wide secrecy throughput and energy efficiency. For In this paper, we study physical layer security for a large-
multi-cell cellular networks, Wang et al. [22] investigated the scale WSN consisting of randomly deployed sensors and FCs,
secure downlink transmissions and discussed the impact of coexisting with randomly distributed eavesdroppers attempting
cell association and the location information of mobile users. to intercept the data broadcast by the sensors. We establish
Geraci et al. [23] further evaluated the achievable secrecy a joint analysis and design framework to evaluate the trans-
rate with regularized channel inversion precoding under mission reliability and secrecy and optimize the network-wide
a massive multiple-input multiple-output (MIMO) system. performance in terms of the sum secrecy throughput. Our main
Wang et al. [24] comprehensively analyzed the network-wide contributions care summarized as follows:
secrecy for a multi-tier heterogeneous cellular network, where • We propose a random multiple access strategy which
a threshold-based mobile association policy was proposed associates each sensor to its nearest FC, and each FC
to balance link quality and secrecy. Wang et al. [25] further randomly selects a certain number of sensors for data
applied the artificial noise aided physical layer security to the acquisition. We then propose an uncoordinated jamming
cellular vehicle-to-everything (C-V2X) networks. Interested scheme to combat eavesdropping where those unsched-
readers are referred to [26] for a more thorough understanding uled sensors, who are not chosen for data collection at the
of the physical layer security in random wireless networks current time slot, independently radiate jamming signals
under the stochastic geometry framework. with a certain probability.

Authorized licensed use limited to: Motilal Nehru National Institute of Technology. Downloaded on November 08,2022 at 09:40:37 UTC from IEEE Xplore. Restrictions apply.
4040 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 70, NO. 6, JUNE 2022

• We assume that each FC adopts zero-forcing SIC (ZF-


SIC) to decode the multiple streams of the scheduled
sensors, where the decoding order is determined accord-
ing to their distances to the associated FC. We derive
new closed-form expressions for the connection outage
probability of a typical FC, leveraging tools from the
stochastic geometry theory and order statistics. We also
provide analytical expressions for the secrecy outage
probability of the typical FC, assuming that eavesdrop-
pers employ the minimum mean square error (MMSE)
receiver to demodulate signals and have a powerful multi-
user detection capability.
• We formulate a problem of maximizing the sum secrecy Fig. 1. Illustration of a large-scale security-oriented WSN. A great quantity
of FCs are deployed in the network (three FCs in the figure), each of
throughput of the typical FC, imposing both reliabil- which collects different categories of environmental information from a certain
ity and secrecy constraints on each scheduled sensor. number (three sensor nodes as a group for the same FC in the figure) of near
We jointly design the optimal parameters, including the sensors nodes in the presence of numerous randomly located eavesdroppers
(six eavesdroppers in the figure).
code rates of the scheduled sensors and the jamming
probability of the unscheduled sensors. We also provide
a computational-convenient sub-optimal solution by forc-
modeled as independent homogeneous PPPs Φs , Φc , and Φe
ing each scheduled sensor to attain a target high level
in a two-dimensional plane R2 , with spatial densities λs , λc ,
of reliability. We derive closed-form expressions for the
and λe , respectively.1
optimal code rates, and we prove that the sum secrecy
throughput is a quasi-concave function of the jamming
probability, where the optimal jamming probability can A. Channel Model
be efficiently calculated via the bisection method.
We consider that the sensors are single-antenna devices
due to hardware restrictions, and the FCs and eavesdroppers
C. Organization and Notations
are equipped with Mc and Me antennas, respectively, for
The remainder of this paper is organized as follows. Section achieving signal enhancement, interference suppression, etc.
II describes the random multiple access WSN and the opti- All the wireless channels are modeled by the combination of
mization problem of interest. Section III analyzes the connec- a frequency flat Rayleigh fading and a standard distance-based
tion and secrecy outage probabilities of the secure transmission path loss. Hence, the channels from a sensor located at x to an
of the scheduled sensors. Section IV details the sum secrecy FC located at y and to an eavesdropper located at z are respec-
throughput maximization, with both optimal and sub-optimal −α/2 −α/2
tively characterized as hy,x ry,x and g z,x rz,x , respectively.
solutions provided. Section V concludes this paper. To be specific, hy,x ∈ C Mc ×1
and g z,x ∈ CMe ×1 represent
Notations: Bold uppercase (lowercase) letters denote matri- the small-scale fading channel vector with independent and
ces (column vectors). | · |,  · , (·)† , (·)T , ln(·), P{·}, and identically distributed (i.i.d.) entries obeying the distribution
Ez [·] denote the absolute value, Euclidean norm, conjugate, CN (0, 1), ry,x and rz,x denote the corresponding Euclidean
transpose, natural logarithm, probability, and the expectation distances, and α > 2 is the path-loss exponent.
over a random variable z, respectively. fz (·) and Fz (·) denote
the probability density function (PDF) and cumulative distri-
bution function (CDF) of z, respectively. CN (μ, v), Exp(λ), B. Random Multiple Access
and Gamma(N, λ) denote the circularly symmetric complex
Gaussian distribution with mean μ and variance v, the expo- We consider random multiple access scheduling, where each
nential distribution with parameter λ, and the gamma distribu- sensor is associated with its nearest FC, and each FC randomly
tion with parameters N and λ, respectively. Rm×n and Cm×n chooses a set of K < Mc sensors for data gathering at a given
denote the m × n real radio resource. Define K  {1, 2, · · · , K}. Note that due to
 n and complex number domains, respec-
the ultra-dense deployment of sensors, we consider a plausible
tively. In addition, m  m!(n−m)!
n!
for integers n > m ≥ 0.
scenario where the density of sensors is much higher than K
times the density of FCs, i.e., λs  Kλc , and there always
II. N ETWORK M ODEL AND P ROBLEM D ESCRIPTION
exist more than K sensors assigned to the same FC. Under
We consider the issue of secure wireless transmissions for this circumstance, all the sensors in a specific time slot can be
a large-scale WSN as illustrated in Fig. 1, where a large naturally divided into two thinned PPPs, namely, the scheduled
number of sensor nodes continually monitor the surrounding sensors Φa with density λa = Kλc which are communicating
environment and report their observations to the FCs which with their associated FCs and the unscheduled sensors Φi with
are responsible for decision making, whilst the ongoing data density λi = λs − Kλc which remain silent, respectively.
uploading is overheard by eavesdroppers hiding in the net-
work. We assume that the sensors, FCs, and eavesdroppers 1 Throughout this paper, we have a slight abuse with the notation Φ, which is
are all spatially randomly positioned, and their locations are used to represent the set of nodes’ locations as well as the nodes themselves.

Authorized licensed use limited to: Motilal Nehru National Institute of Technology. Downloaded on November 08,2022 at 09:40:37 UTC from IEEE Xplore. Restrictions apply.
ZHENG et al.: PHYSICAL LAYER SECURITY IN LARGE-SCALE RANDOM MULTIPLE ACCESS WSNs 4041

C. Uncoordinated Random Jamming are represented by the codeword rate Rt and the secrecy
We assume that each FC knows perfectly the instantaneous rate Rs , respectively. The rate redundancy Re  Rt − Rs
CSI regarding its K scheduled sensors, whilst only has the is intentionally introduced for guaranteeing secrecy against
statistical CSI of the other sensors and of the eavesdroppers.2 eavesdropping attacks. If the capacity of the main channel
In order to combat eavesdropping effectively while avoiding falls below the codeword rate Rt , the desired receiver cannot
bringing severe interference to the FCs, an uncoordinated ran- recover the codeword correctly, which is regarded as connec-
dom jamming scheme is proposed, in which the unscheduled tion outage, and the probability that this event happens is
sensors radiate jamming signals at a probability ρ ∈ [0, 1]. termed connection outage probability (COP). If the capacity
By doing this, the distribution of the jamming sensors follows of the wiretap channel exceeds the rate redundancy Re , perfect
a PPP Φj with density λj = ρλi . secrecy is not possible, which is considered to be secrecy
We emphasize that the proposed random jamming scheme outage, and the probability of this event occurring is referred
is suitable for the energy-limited sensor networks owing to to as secrecy outage probability (SOP).
its low-level collaboration. This is fundamentally different Without loss of generality, we focus on a typical FC which is
from those higher-level collaboration schemes such as coor- placed at the origin o of the polar coordinate, and denote its K
dinated ZF jamming, which will cause high overhead and scheduled sensors as S1 , S2 , · · · , SK with an ascending sort
implementation complexity due to information sharing, beam- order of their distances. The codeword rate and the secrecy
former design, and synchronization. Moreover, the jamming rate of sensor Sk are denoted as Rt,k and Rs,k , respec-
probability ρ is carefully designed off line for maximizing the tively, and the corresponding rate redundancy is given by
network security performance, as will be discussed in Sec. Re,k = Rt,k − Rs,k . The COP of Sk can be defined as
IV, and hence our scheme can balance well between network pco,k  P{SINRo,k < βt,k }, ∀k ∈ K, (1)
performance and complexity.
where SINRo,k denotes the instantaneous signal-to-
D. Multi-Stream Decoding interference-plus-noise ratio (SINR) of the typical FC
for resolving the signal from Sk , and βt,k  2Rt,k − 1 is the
At the FC side, the ZF-SIC method is employed to sep- threshold SINR for connection outage.
arate the multiple data streams received from its associated We consider the wiretap scenario in which the eavesdrop-
K sensors.3 Theoretically, the SIC order should be sorted pers do not collude with each other and decode messages
according to the instantaneous received signal strengths from individually. In this case, a secrecy outage event takes place if
the strongest to the weakest. However, given that the impact only confidential information is leaked to the most threatening
of large-scale path loss is generally more dominant on the eavesdropper of the highest SINR. Therefore, the SOP of Sk
channel impairment and is more stable compared with the can be defined as
small-scale channel fading, we schedule the SIC order based  
on the sensors’ distances to the FC from the nearest to the pso,k  P max SINRe,k > βe,k , ∀k ∈ K, (2)
farthest. To be more specific, the procedure of ZF-SIC can e∈Φe

be described as follows: 1) first decode the signal received where SINRe,k denotes the instantaneous SINR of the eaves-
from the nearest sensor by removing the aggregated signals dropper located at e ∈ Φe for intercepting the data from Sk ,
received from the K − 1 farther sensors through projecting and βe,k  2Re,k −1 is the threshold SINR for secrecy outage.
these signals on to the null space of the instantaneous channel This paper uses the metric sum secrecy throughput to assess
of the nearest sensor, 2) then cancel the decoded signal from the capacity of multi-access secure transmissions from the
the composite received signals, and 3) successively decode the viewpoint of secrecy outage, where the sum secrecy through-
signal from the second nearest sensor in a similar way, and put of a typical FC is defined as the total average successfully
so on. After the ZF-SIC operation, when decoding the signal received confidential information bits from its K scheduled
from any specific sensor, the FC can successfully eliminate sensors per second per Hertz per channel use subject to certain
the interfering signals generated by the other K − 1 sensors. secrecy constraints. Formally, the sum secrecy throughput can
be formulated as
E. Performance Metrics and Optimization Problem 
K

In order to secure the data transmission, Wyner’s secrecy- T = Rs,k (1 − pco,k ), s.t. pso,k ≤ , ∀k ∈ K, (3)
preserving channel code, generally known as the wiretap code, k=1

is employed. In the wiretap code, the rates of the trans- where  ∈ [0, 1] is a prescribed threshold representing the
mitted codewords and the embedded confidential messages maximal tolerable SOP.
In this paper, we aim to maximize the sum secrecy through-
2 Theoretically, an FC can obtain the perfect CSI of its scheduled sensors
put T via jointly designing the wiretap code rates for each
via channel estimation by letting them transmit orthogonal training sequences
simultaneously. scheduled sensor (including the codeword rate Rt,k and the
3 ZF is a typical linear filter for multi-user communication systems, and ZF- secrecy rate Rs,k ) and the jamming probability ρ for the
SIC is commonly used in an NOMA system to achieve SIC due to its ease of unscheduled sensors. Before proceeding to the optimization
implementation and low computational complexity [35], [36]. In this sense,
ZF-SIC is more subtable for the large-scale random multiple access WSN problem, we will first derive analytical expressions for the
compared with more advanced but complicated methods, e.g., MMSE-SIC. COP pco,k and SOP pso,k for k ∈ K in the following section.

Authorized licensed use limited to: Motilal Nehru National Institute of Technology. Downloaded on November 08,2022 at 09:40:37 UTC from IEEE Xplore. Restrictions apply.
4042 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 70, NO. 6, JUNE 2022

III. A NALYSES OF COP AND SOP Proposition 1: The COP of the secure transmission from
This section evaluates the reliability and secrecy perfor- the k-th nearest sensor Sk to the typical FC is given by
mance of the large-scale WSN under investigation with ran-   k−1   Mk −1 
m  
K  k−1  m (−1)l
dom multiple access. Specifically, we will analyze in detail pco,k = 1 − πλc k
k l p m!
the COP pco,k and SOP pso,k of the secure transmission l=0 m=0 p=0
from the k-th nearest sensor Sk to the typical FC located  m−p 
p
ωβt,k n
at the origin o, utilizing the stochastic geometry theory and × 1p=0 Ω mα
2
+1p=0 δ
δφλo βt,k
Pa
order statistics. For ease of notation, we define δ  2/α and n=1
φ  πΓ(1 + δ)Γ(1 − δ) throughout the paper.
× Ωμ Υp,n (7)
A. General Results for COP
where 1H is the indicator function with 1H = 1 when event
Denote the locations of the K sensors Sk scheduled by the H is true and 1H = 0 otherwise, λo  λa + (Pj /Pa ) λj ,
δ
typical FC as sk for k ∈ K, with an ascending order of their μ = 2 (m − p) + n, Ωμ  0 x e
α ∞ μ −τ1 xα/2 −τ2 x
dx with
distances to the FC L1 ≤ L2 , · · · , ≤ LK . Note that due to τ1 = ωβt,k /Pa and τ2 = φλo βt,k
δ
+ πλc (K − k + l + 1), and
random multiple access and SIC order scheduling, the ordered
Υp,n  ψj ∈comb( p−1 ) qij ∈ψj [qij − δ(qij − i + 1)],
distance Lk is a random variable, the statistics of which is p−n
i=1,··· ,p−n
characterized by the following lemma. with the
 p−1convention
 that Υp,p = 1 for p ≥ 1. The term
Lemma 1: The PDF of the ordered distance Lk from the comb p−n represents the set of all distinct subsets of the
typical FC to the k-th nearest sensor is given by natural numbers {1, 2, · · · , p − 1} with cardinality p − n. The
 k−1   elements in each subset ψj are sorted in an ascending order
K  k−1 2
fLk (r) = 2k (−1)l πλc re−πλc r (K−k+l+1) , with qij being the i-th element of ψj .
k l Proof: Please refer to Appendix A.
l=0
(4) Although (7) seems difficult to analyze due to the existence
of the integral term Ωμ , it provides a general and accurate
Proof: The PDF of Lk follows from order statistics [37],
  expression for the COP without requiring time-consuming
K simulations. More importantly, it can be used as a baseline
fLk (r) = k FL (r)k−1 [1 − FL (r)]K−k fL (r), (5)
k for comparison with other approximate results. For a special
2 2 case with α = 4, Ωμ can be simplified by [40, Eq. (3.462.1)]
where fL (r) = 2πrλc e−πλc r and FL (r) = 1 − e−πλc r are as the following practically closed form,
the PDF and CDF of the unordered distance L from a sensor  2  
to its nearest FC, respectively. − μ+1 τ2 τ2
Ωα=4 = (2τ 1 ) 2 Γ(μ + 1) exp D −μ−1 √ ,
According to the ZF-SIC decoding described in Sec. II-B,
μ
8τ1 2μ1
the instantaneous SINR of Sk can be formulated as (8)
2 −α
Pa |wTk ho,sk | Lk where D−μ (z) denotes the parabolic cylinder function [40,
SINRo,k = , (6)
Ia + Ij + ω Eq. (9.241.2)]. Note that with (8), the new expression of the
T 2 −α COP pco,k becomes rather computationally convenient which
where Ia = x∈Φa \o Pa |w k ho,x | ro,x denotes the inter- requires only the calculation or lookup of a D−μ (z) value.
ference generated by those sensors scheduled by the FCs
T 2 −α
other than the typical FC, Ij = y∈Φj Pj |w k ho,y | ro,y
denotes the power of the aggregated jamming signal from B. Interference-Limited Case for COP
the unscheduled sensors, with Pa and Pj being the trans- Owing to a large amount of uncoordinated concurrent
mit power of the information-bearing signals and the jam- transmissions in the network, the aggregate interference at a
ming signals, respectively, and ω denotes the power of the receiver generally dominates the thermal noise. Motivated by
U † U T h† this fact, we turn to examine the interference-limited WSN by
receiver noise. Here, w k = Uk T hk † o,sk denotes the weight
k o,sk ignoring the receiver noise at the FC side.
vector designed for the k-th sensor as per the ZF-MRC
The following corollary provides a closed-form expression
criterion, where U k ∈ CMc ×Mk , with Mk  Mc −K + k,
for the COP pco,k considering the interference-limited case.
is the projection matrix onto the null space of the matrix
Corollary 1: For the interference-limited WSN, the COP of
[ho,sk+1 , · · · , ho,sK ] such that wTk ho,sj = 0 for j > k. Sk is given by
Note that the columns of U k constitute an orthogonal basis,
T †   k−1  
and hence |w T K  k − 1 (−1)l
2 2 T 2
k ho,sk | = U k ho,sk  and |w k ho,x | obey
the gamma distribution Gamma(Mk , 1) and the exponential pco,k = 1 − πλc k
k l τ2
distribution Exp(1), respectively. 
l=0
 n 
Mk −1 
m δ
The COP of sensor Sk is defined in (1) with SINRo,k given n! δφλo βt,k
× 1+ Υm,n .
in (6). Note that the COP is affected by various uncertainties, m! τ2
m=1 n=1
including fading channels, node locations, as well as the
(9)
decoding order. In the following proposition, we provide an
expression for the exact COP. Proof: Please refer to Appendix B.

Authorized licensed use limited to: Motilal Nehru National Institute of Technology. Downloaded on November 08,2022 at 09:40:37 UTC from IEEE Xplore. Restrictions apply.
ZHENG et al.: PHYSICAL LAYER SECURITY IN LARGE-SCALE RANDOM MULTIPLE ACCESS WSNs 4043

same FC. Obviously, the Monte-Carlo simulation results are


in good agreement with the exact theoretical values. It is
expected that pco,k monotonically increases with βs,k , and
the interference-limited results are always smaller than the
general ones whereas the gaps are relatively small and even
can be negligible as Mc , K, or βt,k goes large enough. We can
observe that pco,k decreases with a smaller K when Mc is
fixed or with a larger Mc for a given K. This indicates
that once additional sensor nodes are connected to an FC,
the reliability for each sensor node will be degraded, which
however can be ameliorated by equipping the FC with more
antennas.

C. General Results for SOP


Fig. 2. COP pco,k at k = 1 v.s. SINR threshold βt,k for different Mc From a robust secure transmission perspective, we are
and K, with Pj = 10 dBm, λc = 0.01, and ρ = 0.05. Unless otherwise inclined to consider a worst-case scenario by overestimat-
specified, we always set Pa = 10 dBm, ω = 0 dBm, α = 4, and λs = 1. ing the wiretap capability of eavesdroppers. Specifically,
The labels {Th, Sim, IL} refer to the general theoretical result from (7), the
Monte-Carlo simulated result, and the interference-limited result from (9), we assume that the eavesdroppers have powerful multi-stream
respectively. decoding capabilities such that they can distinguish multiple
data streams received from the scheduled sensors through sub-
tracting interference generated by the superposed signals from
It should be noted that although (9) is in a closed form, the each other. In this case, the aggregate interference received at
Diophantus equation therein still makes pco,k time-consuming the eavesdroppers only consists of the signals emitted by the
to calculate when Mk goes large. More importantly, the cou- jamming sensors.
pling of various parameters, including the number of scheduled We further assume that the eavesdroppers employ the opti-
sensors K, the SIC order index k, the number of receive anten- mal linear receiver, i.e., the MMSE receiver, to improve the
nas Mk , the COP threshold βt,k , and the jamming probability quality of the received signals. According to the MMSE crite-
ρ, makes pco,k complicated to analyze. In order to circumvent rion, the weight vector of the eavesdropper located at e ∈ Φe
such a difficulty and facilitate the analysis, we focus on for decoding the signal from Sk can be devised in the form
a practical requirement of high reliability and low latency. of [39]
In particular, we examine the secure transmission in the ultra
−1
low COP regime for each sensor. Thereby, we obtain a much we,k = (Ψe + ωI Me ) he,sk , (11)
more compact expression for pco,k in the following corollary.
−α
Corollary 2: In the low COP regime with pco,k → 0, the where Ψe  z∈Φj Pj he,z hH e,z re,z . The SINR of the eaves-
COP of Sk can be approximated by dropper at e can be given by
−1 −α
δ
φλo βt,k SINRe,k = Pa hH
e,sk (Ψe + ωI Me ) he,sk re,s . (12)
pco,k ≈ Λk ΞMk , (10) k

πλc
The SOP pso,k of Sk is defined in (2) with SINRe,k given
  k−1 k−1 1
where Λk = k K k l=0 l (−1)l (K−k+l+1) 2 and above. The following proposition provides a general result for
Mk −1 1 m−1 pso,k .
ΞMk = 1 + m=1 m! i=0 (i − δ).
Proposition 2: The SOP of the secure transmission from
Proof: Please refer to Appendix C. the k-th nearest sensor Sk to the typical FC is given by
It is worth noting that by means of the approximation  
Me M e −m
given above, key parameters such as K, k, Mk , βt,k , and ζ1m−1 ζ2n ◦
pso,k = 1 − exp −πλe Ω , (13)
ρ are decoupled compared to (9), and various analytical m=1 n=0
(m − 1)!n! u
relationships between the COP and the parameters can be
extracted explicitly, some of which are particularly useful for where Ω◦u has the same form as Ωμ defined in Proposition 1
the subsequent optimization of sum secrecy throughput. For simply with μ = u = α2 (m − 1) + n, τ1 = ζ1 = ωβe,k /Pa ,
δ
example, it is clearly shown that pco,k increases as βt,k and and τ2 = ζ2 = φλj (Pj βe,k /Pa ) .
ρ become larger, as λo is a monotonically increasing function Proof: Please refer to Appendix D.
of ρ. Meanwhile, it is as expected that pco,k decreases when Proposition 2 clearly shows that the SOP pso,k exponentially
Mk grows since ΞMk ∈ (0, 1) is monotonically decreasing increases with the eavesdropper density λe . That is to say,
with Mk . secrecy is severely compromised when facing dense eaves-
Fig. 2 depicts the COP pco,k versus the SINR threshold droppers. Note that for the spacial case of α = 4, Ω◦u in (13)
βt,k for different values of the number Mc of FC anten- can be recast into the same form of (8), which further leads
nas and the number K of sensor nodes associated with the to a practically closed-form expression for the SOP pso,k .

Authorized licensed use limited to: Motilal Nehru National Institute of Technology. Downloaded on November 08,2022 at 09:40:37 UTC from IEEE Xplore. Restrictions apply.
4044 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 70, NO. 6, JUNE 2022

IV. M AXIMIZATION OF S UM S ECRECY T HROUGHPUT


This section maximizes the sum secrecy throughput for
a typical FC in the large-scale WSN with random multiple
access, by jointly determining the optimal parameters, includ-
ing the codeword rate Rt,k and the secrecy rate Rs,k of
the wiretap code for the K scheduled sensors, and the jam-
ming probability ρ of the proposed random jamming scheme.
Recalling the definition of sum secrecy throughput in (3), the
optimization problem can be formulated as

K
max T = Rs,k (1 − pco,k ) (15a)
Rt,k ,Rs,k ,∀k∈K,ρ
k=1
s.t. pco,k ≤ σ, ∀k ∈ K, (15b)
pso,k ≤ , ∀k ∈ K, (15c)
0 ≤ Re,k = Rt,k − Rs,k , ∀k ∈ K, (15d)
Fig. 3. SOP pso,k at k = 1 v.s. SINR threshold βe,k for different Me and 0 ≤ ρ ≤ 1. (15e)
λe , with Pj = 10 dBm, λc = 0.01, K = 3, and ρ = 0.05. The labels {Th,
Sim, IL} refer to the general theoretical result from (13), the Monte-Carlo Note that constraints (15b) and (15c) describe the reliability
simulated result, and the interference-limited result from (14), respectively.
and secrecy requirements, respectively; constraints (15d) and
(15e) are imposed by the wiretap code scheme and the random
D. Interference-Limited Case for SOP jamming scheme, respectively.
The original problem (15) can be decomposed into the
Proposition 2 is not so straightforward for extracting key
following two subproblems.
properties regarding the SOP, which motivates us to seek 1) We first design the optimal Rs,k and Re,k (or Rt,k )
simplifications. To this end, we consider the interference- for the k-th scheduled sensor to maximize its secrecy
limited scenario, just as the discussion for the COP, where the throughput Tk  Rs,k (1 − pco,k ) conditioned on a fixed
receiver noise at eavesdroppers is ignored. Note that this is ρ, as
reasonable since the noise power of eavesdroppers is typically
unknown to the sensors. max Tk , ∀k ∈ K, s.t. (15b) − (15d). (16)
Rs,k ,Re,k
In the following corollary, we provide an analytically
tractable expression for the SOP. 2) With the resultant maximal Tk for k ∈ K, we then design
Corollary 3: For the interference-limited WSN, the SOP of the optimal ρ to maximize T expressed in (15), i.e.,
Sk is given by max T , s.t. (15e). (17)
  δ  ρ
πλe Me Pa In the following two subsections, we first discuss an opti-
pso,k = 1 − exp − . (14)
φρλi Pj βe,k mal design scheme in which the optimal Rs,k and Re,k can
be efficiently calculated by the bisection method while the
Proof: The result follows easily by plugging ω = 0 into
optimal ρ can only be obtained by one-dimensional search.
(13) and leveraging some algebraic operations.
We then examine a sub-optimal scheme for the purpose of a
Corollary 3 reveals that the SOP pso,k exponentially
low computational complexity, where closed-form expressions
increases with Me but decreases with ρ and βe,k . This indi-
are derived for the optimal Rs,k and Re,k , and T is proved
cates that secrecy performance is dramatically degraded if
to be quasi-concave w.r.t. ρ such that the optimal ρ can be
eavesdroppers use a large number Me of receiving antennas,
computed using the bisection method.
whereas it can be significantly ameliorated by making a larger
fraction ρ of sensors send jamming signals and choosing a A. Optimal Design
larger rate redundancy Re,k for channel coding. Note that Based on the above discussion, we first examine the sub-
this is fundamentally different from the case of COP where problem (16) and design the optimal Re,k and Rs,k suc-
increasing the jammer fraction ρ becomes harmful, which cessively. Consider a fixed Rs,k , it is apparent from (1)
reflects an intrinsic trade-off between reliability and secrecy that the COP pco,k monotonically decreases with Re,k as
when introducing jamming signals. Rt,k = Rs,k + Re,k . This suggests that the optimal Re,k for
The monotonicity of the SOP pso,k w.r.t. the SINR threshold maximizing Tk should be the minimal Re,k while satisfying
βe,k , the number Me of eavesdropping antennas, and the the secrecy constraint pso,k ≤ . Note that pso,k decreases
density λe of eavesdroppers is validated by both numerical with Re,k (since βe,k = 2Re,k − 1 shown in (2)), the optimal
and simulated results as shown in Fig. 3. Different from the Re,k is given as the inverse of pso,k (Re,k ) at , which is
situation of COP, the interference-limited SOP is apparently
larger than the general one. This implies that the interference-

Re,k = p−1
so,k (). (18)

limited SOP embodies an overestimation of eavesdropping Obviously, Re,k monotonically decreases with , which means
capability, which is generally preferred when investigating that a larger rate redundancy is required to combat the eaves-
physical layer security for the purpose of robustness designs. dropper in order to meet a more rigorous secrecy constraint.

Authorized licensed use limited to: Motilal Nehru National Institute of Technology. Downloaded on November 08,2022 at 09:40:37 UTC from IEEE Xplore. Restrictions apply.
ZHENG et al.: PHYSICAL LAYER SECURITY IN LARGE-SCALE RANDOM MULTIPLE ACCESS WSNs 4045


Although it is intractable to express Re,k in an explicit form

due to the complicated expression of pso,k , the value of Re,k
can be efficiently obtained through bisection search with the
equation pso,k (Re,k ) = .
For designing the optimal Rs,k , we focus on the low COP
regime and substitute the approximate COP pco,k given in (10)

into problem (16). Moreover, since Rt,k = Re,k + Rs,k ⇒
∗ ∗
βt,k = βe,k + (1 + βe,k )βs,k with βs,k  2 Rs,k
− 1, problem
(16) can be equivalently
 translated into 
δ
max max
Tk = 1 − Ak (βs,k + Bk ) log2 (1 + βs,k ),
0≤βs,k ≤βs,k
(19)
where Ak  φλ πλc∗Λk ΞMk with Λk and ΞMk defined in Corol-
o

βe,k max −α/2


lary 2, Bk  1+β ∗ , and βs,k  Ak − Bk . It is notewor-
e,k
max
thy that βs,k is introduced to guarantee a non-negative value
of Tk . The solution to the above problem is provided by the Fig. 4. Secrecy throughput Tk at k = 1 v.s. secrecy rate Rs,k for different
λc and λe , with Pj = 0 dBm, ρ = 0.01, Mc = 16, Me = 2, K = 4,
following proposition.  = 0.1, and σ = 0.1.
Proposition 3: The secrecy throughput Tk given in (19) is

a concave function of βs,k , and the optimal βs,k maximizing
Tk satisfies the following equation,
dTk upper bound, and (c) follows from the fact ln(1 + β ◦ ) ≤ β ◦ .
|β =β ∗ = 0, (20) The above result indicates that Tk is a quasi-concave function
dβs,k s,k s,k
of β [42], and β ◦ is the unique zero-crossing point of dT k
dβ and
i.e., it is the unique zero-crossing point βs,k of the derivative
dTk is also the solution to problem (19).
dβs,k given below Due to the quasi-concavity of Tk on βs,k , the value of the
dTk 1 − Ak (βs,k + Bk )δ Ak δ log2 (1 + βs,k ) ∗
optimal βs,k can be efficiently calculated using the bisection
= − .
dβs,k (1 + βs,k ) ln 2 (βs,k + Bk )1−δ method with (20). After that, by substituting the obtained
∗ ∗
(21) optimal Re,k and Rs,k for k ∈ K into (15), the optimal jam-

ming probability ρ can be numerically searched by solving
Proof: For brevity, the subscripts of βs,k , Ak , and Bk are
problem (17).
omitted. It is intractable to prove the concavity of Tk on β
2 Fig. 4 depicts the secrecy throughput Tk as a function of the
by determining the sign of the second-order derivative ddβT2k .
secrecy rate Rs,k . Just as analyzed in Proposition 3, we see that
Instead, it can be easily confirmed that the two boundary val-
Tk indeed initially increases and then decreases with Rs,k , and
ues of β yield dTdβ |β=0 > 0 and dβ |β=βs,k < 0. Combined
k dTk max
there is a unique Rs,k for maximizing Tk . It is expected that
with the fact that Tk is continuously differentiable on β, there
◦ increasing the density λe of eavesdroppers is harmful to the
at least exists one zero-crossing point of dT k
dβ . Let β denote improvement of secrecy throughput. We also observe that, with
dβ |β=β = 0, and then the second-
an arbitrary one such that dT k

2
our proposed random access scheme, the secrecy throughput
order derivative ddβT2k at β = β ◦ can be calculated as can be dramatically increased with the increase of FC density
d2 Tk λc . This seemingly counter-intuitive result can be understood
|β=β ◦ if one can realize that although deploying more FCs will
dβ 2
accommodate more sensor nodes resulting in more severe
2Aδ(β ◦ + B)δ−1 1 − A(β ◦ + B)δ
= − − network interference, it will reduce the distances between
(1 + β ◦ ) ln 2 (1 + β ◦ )2 ln 2 the FC and its associated sensor nodes making transmission

+ Aδ(1 − δ)(β + B) δ−2
log2 (1 + β ◦ ) reliability significantly enhanced.


(a) Aδ(β + B)
δ−2
= (1 − δ) ln(1 + β ◦ )
ln 2

(β ◦ + B) [2 + ln(1 + β ◦ )]
− B. Sub-Optimal Design
1 + β◦

 
(b) Aδ(β + B)δ−2
◦ β ◦ [1 + ln(1 + β ◦ )] Note that the optimal code rates and optimal jamming
< ln(1 + β ) −
ln 2 1 + β◦ probability for the optimal design scheme can only be obtained

Aδ(β + B) δ−2 numerically via bisection search or exhaustive search, which
= [ln(1 + β ◦ ) − β ◦ ] not only results in high computational complexity but also
(1 + β ◦ ) ln 2
(c) makes it difficult to develop useful insights into practical
≤ 0, (22) system designs. To this end, this subsection examines a sub-
optimal solution to problem (15) by focusing on the sum
where (a) holds by noting that dβ |β=β
dTk
◦ = 0 ⇒
secrecy throughput with COP constraints pco,k = σ and SOP
1−A(β ◦ +B)δ ◦ ◦
(1+β ◦ )2 = Aδ(β +B) δ−1
ln(1+β ) in (21), (b) gives an constraints pso,k =  for k ∈ K. The corresponding sum

Authorized licensed use limited to: Motilal Nehru National Institute of Technology. Downloaded on November 08,2022 at 09:40:37 UTC from IEEE Xplore. Restrictions apply.
4046 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 70, NO. 6, JUNE 2022

secrecy throughput can be written as to prove that T (ρ) is actually first-increasing-then-decreasing


w.r.t. ρ such that the optimal ρ∗ maximizing T (ρ) must be

K ∗
1 + βt,k
T = (1 − σ) log2 unique.
∗ ,
1 + βe,k
(23)
k=1 Proposition 5: The objective function T (ρ) in (27) initially
∗ ∗ increases and then decreases with an increasing ρ, and the
where βt,k and βe,k are the unique roots of βt,k and βe,k of the
optimal ρ∗ that maximizes T (ρ) is provided as
equations pco,k (βt,k ) = σ and pso,k (βe,k ) = , respectively.
⎧ α/2+1
⎪ ρmin , Z < Y ρmin (1 − κ(ρmin ))
The rationality of devising the sub-optimal design is that the ⎪


values of σ and  are generally set small enough to guarantee ⎨ 1 + Y ρmin κ(ρmin )
∗ Y (1 − κ(1))
a high level of reliability and secrecy. Moreover, when the ρ = (28)
COP and SOP constraints can be controlled, we are able to ⎪
⎪ 1, Z≥

⎪ 1 + Y κ(1)
maximize T by finding the optimal values of σ and  in (23). ⎩ ◦
∗ ∗
ρ , otherwise
By solving the equations pco,k (βt,k ) = σ and pso,k (βe,k )=
1 K 1 ◦
 recalling pco,k in (10) and pso,k in (14), we can provide where κ(ρ)  K k=1 Xk (1+Y ρ)−α/2 +1 < 1, and ρ is the
∗ ∗ ∗ ∗
closed-form expressions for βt,k and βe,k (also Rt,k and Re,k ) unique root ρ of the equation G(ρ) = 0 with G(ρ) being a
by the following proposition. monotonically decreasing function of ρ given by
∗ ∗
Proposition 4: The values of βt,k and βe,k for k ∈ K that
∗ ∗
satisfy pco,k (βt,k ) = σ and pso,k (βe,k ) =  can be respectively Y ρα/2+1
G(ρ) = 1 + Y ρκ(ρ) − (1 − κ(ρ)). (29)
given by Z
  α2 −α Proof: Please refer to Appendix E.
2
∗ σπλc λi Pjδ Some observations regarding the design of the optimal
βt,k = 1+ ρ , (24)
λa φΛk ΞMk λa Paδ jamming probability ρ∗ can be obtained from Proposition 5:
α
  α2 1) As previously explained, the variable Z actually
∗ Pa ρ− 2 πλe Me embodies the advantage that eavesdroppers can per-
βe,k = 1 . (25)
Pj φλi ln 1− form attacks. When such advantage is marginal, i.e.,
α/2+1
Yρmin (1−κ(ρ
min ))
The next step is to design the optimal jamming proba- Z < 1+Y ρmin κ(ρmin ) , it is not necessary to activate too
bility ρ to maximize the sum secrecy throughput T . Before many sensors to radiate jamming signals to confuse the eaves-
proceeding to the optimization droppers. In this case, we can simply set the optimal ρ∗ to
 procedure,
 α we introduce three its minimal achievable value ρmin . Nevertheless, the maxi-
2 λi P δ
auxiliary variables Xk  λa φΛ σπλc
k ΞMk
, Y  λa Pjδ , and mization of sum secrecy throughput comes at the expense of
  α2 a
unfairness, since there exists at least one sensor whose secrecy
Z  Pj φλi ln 1
Pa πλe Me
for (24) and (25), with which T in
1− throughput would be reduced  to zero,
−1i.e., the sensor with
(23) can be recast as a function of a single variable ρ as given Xk δ

below: index k = arg maxk∈K Z −Y .
2) If the eavesdroppers’ superiority exceeds a certain level,

K 
K
1+Xk (1+Y ρ)− 2
α
(1−κ(1))
T = Tk = (1−σ) log2 α . (26) i.e., Z ≥ Y1+Y κ(1) , all the idle sensors have to be mobilized
k=1 k=1
1 + Zρ− 2 for anti-eavesdropping. Hence, ρ∗ = 1 is optimal for the sum
secrecy throughput maximization.
Remarkably, Xk , Y , and Z have clear physical significance.
3) Beyond the above two situations, we should properly set
Specifically, Xk can be interpreted as the ability of boosting
the jamming probability ρ to strike a good balance between
the achievable rate for the legitimate channel. For example,
throughput and secrecy. Although an explicit form of ρ◦ cannot
a looser COP constraint (a larger σ) and a larger number of
be derived, we can still develop some useful properties on ρ◦
receive antennas at the FC side (a smaller ΞMk ) will increase
to guideline practical designs, as summarized in the following
Xk and are beneficial for improving transmission reliability.
corollary.
Similarly, Z can be translated as the wiretapping capability
Corollary 4: The optimal jamming probability ρ◦ decreases
and Y reflects the jamming power level a sensor can afford.
with the maximal endurable COP σ and SOP , the number
It is obvious that in order to guarantee a non-negative
Mc of antennas at the FC side, the sensor density λs , and
secrecy throughput for each sensor, i.e., Tk ≥ 0 for k ∈ K,
α α the ratio Pj /Pa of jamming power to transmit power of a
Xk (1 + Y ρ)− 2> Zρ− 2 must −1be satisfied from (26), which
 X δ sensor, while increases with the FC density λc , the number K
produces ρ ≥ Z
k
−Y . In other words, we should of sensors associated with each FC, the eavesdropper density
 δ −1
λe , and the number Me of antennas at the eavesdropper side.
ensure ρ ≥ ρmin  maxk∈K XZk − Y . Hence, the
Proof: Please refer to Appendix F.
optimal ρ∗ maximizing T can be obtained by solving the
Fig. 5 illustrates the secrecy throughput T as a function of
following equivalent problem.
jamming probability ρ for both the optimal and sub-optimal

K
1 + Xk (1 + Y ρ)− 2
α
schemes. As proved previously, T first increases and then
max T (ρ)  ln α . (27) decreases as ρ increases, and there exists a unique optimal
ρmin ≤ρ≤1 1 + Zρ− 2
k=1 ρ that maximizes T . We show that as either  or σ becomes
Although the above problem is not convex, in the following larger, the optimal ρ becomes smaller producing a higher T
proposition we introduce a derivative reconstruction method for both the optimal and sub-optimal schemes, which validates

Authorized licensed use limited to: Motilal Nehru National Institute of Technology. Downloaded on November 08,2022 at 09:40:37 UTC from IEEE Xplore. Restrictions apply.
ZHENG et al.: PHYSICAL LAYER SECURITY IN LARGE-SCALE RANDOM MULTIPLE ACCESS WSNs 4047

grows with increasing SOP threshold , density λc of FCs, and


number Mc of antennas at the FC side. We also show that the
gap between the optimal and sub-optimal schemes decreases
as  or λc increases or as λe decreases. The underlying reason
is that for these situations, adopting a larger secrecy rate can
be more beneficial for maximizing secrecy throughput even
sacrificing the reliability. This would make the resultant COP
for the optimal scheme approach the COP threshold σ which
is the COP for the sub-optimal case, and hence the secrecy
throughput performance for the two schemes becomes similar.

V. C ONCLUSION
Physical layer security was investigated for a large-scale
WSN with random multiple access under a stochastic geom-
etry framework. An uncoordinated jamming scheme was
Fig. 5. Secrecy throughput T v.s. jamming probability ρ for different  devised to thwart the randomly distributed eavesdroppers.
and σ, with Pj = 1 dBm, λc = 0.01, Mc = 16, K = 4, Me = 2, and Analytical expressions were derived for both the COP and
λe = 0.0001.
SOP of the secure data delivery from sensors to a typical FC
against eavesdropping. Afterwards, the optimal wiretap code
rates and the jamming probability were jointly designed to
maximize the sum secrecy throughput subject to both COP
and SOP constraints, with both optimal and sub-optimal algo-
rithms examined. Furthermore, some insights into how the
optimal parameters should be adjusted to the communication
environment and performance requirements were provided.
Numerical results were presented to validate the theoretical
fundings. In particular, it was shown that for a stringent COP
constraint or a loose SOP constraint, the performance gap
between optimal and sub-optimal schemes becomes insignifi-
cant meaning that the sub-optimal scheme can be adopted as
a low-complexity alternative to the optimal one.

A PPENDIX
A. Proof of Proposition 1
β Lα
Fig. 6. Maximal secrecy throughput T ∗ v.s. eavesdropper density λe for Let s  t,k
Pa
k
and I = Ia + Ij , the COP pco,k can be
different , λc , and Mc , with Pj = 1 dBm, K = 4, Me = 2, and σ = 0.2. computed by substituting (6) into (1),
pco,k
  
Corollary 4. The reason behind is that facing a looser SOP = 1 − ELk EI P U T † 2
k ho,sk  ≥ s(I + ω)
constraint (a larger ), fewer sensor nodes are required to send Mk −1

(a) sm (I + ω)m
jamming signals against eavesdropping; meanwhile, when a = 1 − ELk EI e−s(I+ω)
larger COP σ can be tolerable, activating less jammers sig- m=0
m!
nificantly benefits secrecy throughput via supporting a much  m   m−p m
k −1 
M
m ω s  
larger secrecy rate. We find that as ρ increases, the two = 1 − ELk e−sω EI I p e−sI
p m!
curves with different ’s but identical σ merge. This implies m=0 p=0
that the jamming probability is sufficiently large to defeat M m   m−p m p
k −1 
(b) m ω s d
eavesdroppers such that the secrecy throughput performance = 1 − ELk e−sω LI (s) ,
m=0 p=0
p (−1) m! dsp
p
is less sensitive to the variation of the SOP constraints. It is
interesting to observe that the gap between optimal and sub- (30)

optimal schemes decreases obviously as the COP threshold σ where (a) is due to U T
k ho,sk 
2
∼ Gamma(Mk , 1), and
reduces. This is because for a more stringent COP constraint, L
the feasible region of the secrecy rate for the optimal scheme (b) follows from the Laplace transform property tn f (t) ↔
dn
shrinks such that the optimal secrecy rate maximizing secrecy (−1)n ds n Lf (t) (s). Due to the independence of Ia and Ij , the

throughput approaches that of the sub-optimal scheme. Laplace transform LI (s) can be expressed as [17, eqn. (8)]
 
Fig. 6 plots the maximal secrecy throughput T ∗ of both LI (s) = EIa +Ij e−s(Ia +Ij ) = LIa (s)LIj (s)
optimal and sub-optimal schemes. It is easy to understand that
= e−φ(λa Pa +λj Pj )s = e−φλo (Pa s) ,
δ δ δ δ
T ∗ decreases with increasing density λe of eavesdroppers and (31)

Authorized licensed use limited to: Motilal Nehru National Institute of Technology. Downloaded on November 08,2022 at 09:40:37 UTC from IEEE Xplore. Restrictions apply.
4048 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 70, NO. 6, JUNE 2022

δ
where λo = λa + (Pj /Pa ) λj . The p-order derivative Note that the asymptotic region ψk → 0 reflects all possible
dp
dsp LI (s) can be obtained by [38, Eq. (51)] situations where parameters including but not limited to λc ,
λj , Pj , and Lk may produce a sufficiently small COP pco,k .
e−φλo (Pa s)  
δ p
dp n δ
LI (s) = δφλo (Pa s)δ Υp,n . (32) Invoking the first-order Taylor expansion with e−ψk βt,k in (36)

dsp (−s)p n=1 around ψk = 0 and discarding the high order terms O ψk2 ,
Substituting (32) into (30) with s = βt,k Lα pco,k is simplified as
k /Pa yields  
 n pco,k ≈ 1 − ELk 1 − ψk βt,kδ
ΞMk
M m  
k −1 
m−p  p δφλo βt,k δ
 
m ωβt,k
pco,k = 1 − = ELk φλo L2k βt,k
δ
ΞMk , (37)
m=0 p=0
p Pa n=1
m!
  with ΞMk defined in Corollary 2. Computing the above expec-
ωβ
α(m−p)+2n − Pt,k Lα −φλ δ 2
tation by invoking (4) gives the result in (10).
× Υp,n ELk Lk e a k o β t,k L k
.
  !
Ik D. Proof of Proposition 2
(33) The SOP defined in (2) can be rewritten cas
The term Ik in (33) can be calculated as pso,k
" ∞ ωβt,k α δ 2 -
Ik = rα(m−p)+2n e− Pa r −φλo βt,k r fLk (r)dr = 1 − EΦe P {SINRe,k < βe,k |Φe }
0
 k−1   " ∞ e∈Φe
(a) K  k−1 α/2  " ∞ " 2π 
= πλc k (−1)l xμ e−τ1 x −τ2 x dx, (a)
k l = 1 − exp −λe P {SINRe,k ≥ βe,k } rdθdr ,
l=0 0  ! 0 0
Ωμ (38)
(34)
where SINRe,k is given by (12) with r  re,sk , and (a) follows
where (a) follows from invoking the PDF fLk (r) of Lk given from the probability generating functional (PGFL) over a
in (4) along with the substitution r2 → x. The proof can be PPP [41].
completed after discussing the cases p = 0 and p = 0. Defining v  rα βe,k /Pa , then P {SINRe,k ≥ βe,k } in (38)
can be calculated by invoking [39, Eq. (11)], i.e.,
B. Proof of Corollary 1 
Me
−ωv (ωv)m−1
Plugging ω = 0 into (7) yields P {SINRe,k ≥ βe,k } = e EΦ [Am (v)],
(m − 1)! j
  k−1   Mk −1 m=1
K  k−1  (−1)l (39)
pco,k = 1 − πλc k
k l m!  Me −m
c v n
l=0m=0 where Am (v) = n=0 n
with cn being the coeffi-
  ( −α
1+Pj re,z v)

m
 n z∈Φj
−α
× 1m=0 Ω0 + 1m=0 Ωn Υm,n . cient of v n in z∈Φj 1 + Pj re,z v , which is
δ
δφλo βt,k
n=1
1  - Pj
n
(35) cn = , (40)
n! rα
i=1 e,zi
Recalling Ωμ defined in Proposition 1, it is easy to obtain that Zn ⊂Φj

Ω0 = 1/τ2 and Ωn = n!/τ2n+1 . Then, the proof is completed. where Zn  {z1 , · · · , zn } denotes an arbitrary subset of n
points selected from Φj . Substituting (40) into Am (v) yields
C. Proof of Corollary 2 ⎡ ⎤
Me −m  n n n −α
1 P v r
To begin with, let us revisit pco,k in (30) and plug (32) with EΦj ⎣  i=1 e,z  ⎦.
j
EΦj [Am (v)] = −α
i

k /Pa and ω = 0 into (30). Then we obtain


s = βt,k Lα n=0
n!
Zn∈Φj z∈Φj 1+P j r e,z v
  !
pco,k C
Mk −1
 (41)
(−s) d
m m
= 1 − ELk LI (s) = 1
m! dsm Invoking Campbell-Mecke theorem [41, Theorem 4.2] with
⎡ m=0
⎤ the term C in (41) gives
⎛  n ⎞⎥  " ∞ n  " ∞ 
⎢ ϑ ϑ
⎢ Mk −1 
 m δψ β δ ⎥ C = 2πλj tdt exp −2πλj tdt
⎢ −ψk βt,k
δ
⎝1 +
k t,k ⎥ 1+ϑ 1+ϑ
− ELk ⎢e Υm,n ⎠⎥, 0 0
⎢ m! ⎥ (a)    
⎣ m=1 n=1 ⎦ n
= φλj Pjδ v δ exp −φλj Pjδ v δ , (42)
  !
Qk
where ϑ  Pj vt−α , and (a) stems from [40, Eq. (3.241.2)].
(36)
Substituting (41) with (42) into (39) and plugging the result
where ψk = φλo L2k . We observe that as ψk → 0, the term into (38), the proof can be completed after some algebraic
Qk → 1 for any Lk , which finally leads to pco,k → 0. operations.

Authorized licensed use limited to: Motilal Nehru National Institute of Technology. Downloaded on November 08,2022 at 09:40:37 UTC from IEEE Xplore. Restrictions apply.
ZHENG et al.: PHYSICAL LAYER SECURITY IN LARGE-SCALE RANDOM MULTIPLE ACCESS WSNs 4049

E. Proof of Proposition 5 as below by plugging ρ = ρmin into G(ρ),


We begin with re-expressing the objective function T (ρ) 
K
Y ρmin Xk (Y + 1/ρmin)
−α/2
−Z
K K Wk (ρ) G(ρmin ) = 1 − <0
in (27) as T (ρ) = k=1 Tk (ρ) = k=1 ln Q(ρ) , where KZ Xk (1 + Y ρmin ) −α/2
+1
α α k=1
Wk (ρ) = 1 + Xk (1 + Y ρ)− 2 and Q(ρ) = 1 + Zρ− 2 . For α/2+1
Y ρmin (1 − κ(ρmin ))
simplicity, we use the notations T , Tk , Wk , and Q, which are ⇔Z< . (47)
functions of ρ by default. The derivative dT 1 + Y ρmin κ(ρmin )
dρ can be calculated
as 2) Case G(1) ≥ 0: Again, due to the monotonically-
decreasing feature of G(ρ) on ρ, in this case G(ρ) or dT
   dρ
dT
K
1 dWk dQ maintains positive within ρ ∈ [ρmin , 1]. In other words, T
= Q − Wk monotonically increases with ρ and is maximized at ρ = 1.
dρ Wk Q dρ dρ
k=1
  Following (47), the condition G(1) ≥ 0 is equivalent to
(a) 
K (1−κ(1))
1 αY (Wk − 1)Q α(Q − 1)Wk Z ≥ Y1+Y κ(1) .
= − +
Wk Q 2(1 + Y ρ) 2ρ 3) Case G(1) < 0 ≤ G(ρmin ): In this case, as ρ increases
k=1
  from ρmin to 1, G(ρ) or dT dρ is initially positive and then
α K(Q − 1) 
K
Y (Wk − Q)
= − , (43) becomes negative, which implies T first increases and then
2 ρQ(1 + Y ρ) QWk (1 + Y ρ) decreases with an increasing ρ, and there exists a unique peak
k=1
value of T . Obviously, the maximal T is obtained when ρ
where (a) follows from the following two derivatives arrives at the zero-crossing point of G(ρ) or dT
dρ .
By now, the proof is completed.
dWk α α Y (Wk − 1)
= − Xk (1 + Y ρ)−α/2−1 Y = − , F. Proof of Corollary 4
dρ 2 2 1+Yρ
(44) The results provided by Corollary 4 can be obtained by
dQ α −α/2−1 α(Q − 1) examining the derivatives of ρ◦ on the variables Xk , Y , and Z,
= − Zρ =− . (45)
dρ 2 2ρ respectively, invoking the derivative rule for implicit functions
with the equation G(ρ◦ ) = 0 with G(ρ) defined in (29) [10].
dρ◦
It is difficult to prove the concavity of T w.r.t. ρ by directly To begin with, the derivative dX k
can be calculated as
judging the monotonicity of dT dρ from (43). In order to cir- dρ◦ ∂G(ρ◦ )/∂Xk
cumvent this issue, we reconstruct dT =− . (48)
dρ as below and resort to dXk ∂G(ρ◦ )/∂ρ◦
exploring the properties of its sign, ◦
)
It is easy to see that ∂G(ρ < 0 since G(ρ) is a decreasing
⎛ ⎞ ∂ρ◦
function of ρ. Besides, as κ(ρ◦ ) is a decreasing function of
⎜ ⎟ Xk and at the same time G(ρ◦ ) increases with κ(ρ◦ ), we have
dT αK(Q − 1) ⎜ K
Y ρ(Wk − Q) ⎟ ∂G(ρ◦ ) dρ◦
⎜1 − ⎟.
= (46) ∂Xk < 0, which yields dXk < 0. Similarly, we can readily
dρ 2ρQ(1 + Y ρ) ⎜
⎝ KWk (Q − 1) ⎟
⎠ ◦
dρ◦
show dρdZ > 0. We can also prove that dY < 0 by noting that
k=1
  !
G(ρ)
∂G(ρ◦ ) (ρ◦ ) (1 − κ(ρ◦ )) (a) 1
α/2+1
= ρ◦ κ(ρ◦ ) − = − < 0,
αK(Q−1) ∂Y Z Y
Clearly, the first term 2ρQ(1+Y ρ) in (46) is constantly posi- (49)
dT
tive, and therefore the sign of dρ is solely determined by that
where (a) follows from G(ρ◦ ) = 0. After obtaining
of the second term G(ρ) which unfortunately is intuitively
the above results, the proof can be completed by simply
elusive. To this end, we turn to examine the monotonicity of
determining the relationships between the key parameters
G(ρ) on ρ before determining its sign. Specifically, we rewrite
K {σ, , Mc , λs , Pj /Pa , λc , K, λe , Me } and the auxiliary vari-
G(ρ) as G(ρ) = 1 − k=1 G1,k (ρ)G2,k (ρ) with G1,k (ρ) 
Wk −Q ables {Xk , Y, Z}. Due to space limitation, we just take the
KWk and G2,k (ρ) 

Q−1 . Since both Wk and Q are SOP threshold  as an example, where we observe ◦that Z
decreasing functions of ρ, we can easily prove that G1,k (ρ) ◦
decreases with  and meanwhile dρ > 0 d < 0.
such that dρ
increases with ρ. Substituting Wk and Q into G2,k (ρ) yields dZ
 −α/2
G2,k (ρ) = XZk ρ−1 + Y − 1, which also increases with R EFERENCES
ρ. Consequently, G(ρ) is a monotonically decreasing function
[1] M. A. Razzaque, M. Milojevic-Jevric, A. Palade, and S. Clarke, “Middle-
of ρ. This result significantly facilitates the derivation of the ware for Internet of Things: A survey,” IEEE Internet Things J., vol. 3,
optimal ρ∗ that maximizes T by differentiating the following no. 1, pp. 70–95, Feb. 2016.
cases. [2] N.-S. Vo, T. Q. Duong, M. Guizani, and A. Kortun, “5G optimized
caching and downlink resource sharing for smart cities,” IEEE Access,
1) Case G(ρmin ) < 0: Since G(ρ) monotonically decreases vol. 6, pp. 31457–31468, 2018.
with ρ, in this case G(ρ) or dT dρ keeps negative within ρ ∈ [3] X. Chen, K. Makki, K. Yen, and N. Pissinou, “Sensor network security:
[ρmin , 1]. This indicates that T is a decreasing function of ρ, A survey,” IEEE Commun. Surveys Tuts., vol. 11, no. 2, pp. 52–73,
2nd Quart., 2009.
and the optimal ρ∗ reaching the maximal T is ρ∗ = ρmin . [4] K. N. Le, Physical Layer Security. Cham, Switzerland: Springer,
The condition G(ρmin ) < 0 can be equivalently transformed Jan. 2021.

Authorized licensed use limited to: Motilal Nehru National Institute of Technology. Downloaded on November 08,2022 at 09:40:37 UTC from IEEE Xplore. Restrictions apply.
4050 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 70, NO. 6, JUNE 2022

[5] R. Chen, C. Li, S. Yan, R. Malaney, and J. Yuan, “Physical layer secu- [28] R. Soosahabi and M. Naraghi-Pour, “Scalable PHY-layer security for
rity for ultra-reliable and low-latency communications,” IEEE Wireless distributed detection in wireless sensor networks,” IEEE Trans. Inf.
Commun., vol. 26, no. 5, pp. 6–11, Oct. 2019. Forensics Security, vol. 7, no. 4, pp. 1118–1126, Aug. 2012.
[6] Y. Wu, A. Khisti, C. Xiao, G. Caire, K.-K. Wong, and X. Gao, “A survey [29] J. E. Barcelo-Llado, A. Morell, and G. Seco-Granados, “Amplify-and-
of physical layer security techniques for 5G wireless networks and chal- forward compressed sensing as a physical-layer secrecy solution in
lenges ahead,” IEEE J. Sel. Areas Commun., vol. 36, no. 4, pp. 679–695, wireless sensor networks,” IEEE Trans. Inf. Forensics Security, vol. 9,
Apr. 2018. no. 5, pp. 839–850, May 2014.
[7] N. Yang, L. Wang, G. Geraci, M. Elkashlan, J. Yuan, and [30] J. Lee, A. Conti, A. Rabbachin, and M. Z. Win, “Distributed network
M. Di Renzo, “Safeguarding 5G wireless communication networks using secrecy,” IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1889–1900,
physical layer security,” IEEE Commun. Mag., vol. 53, no. 4, pp. 20–27, Sep. 2013.
Apr. 2015. [31] Y. Deng, L. Wang, M. Elkashlan, A. Nallanathan, and R. K. Mallik,
[8] A. D. Wyner, “The wire-tap channel,” Bell Syst. Tech. J., vol. 54, no. 8, “Physical layer security in three-tier wireless sensor networks: A sto-
pp. 1355–1387, May 1975. chastic geometry approach,” IEEE Trans. Inf. Forensics Security, vol. 11,
[9] S. Goel and R. Negi, “Guaranteeing secrecy using artificial noise,” IEEE no. 6, pp. 1128–1138, Jun. 2016.
Trans. Wireless Commun., vol. 7, no. 6, pp. 2180–2189, Jun. 2008. [32] Y. Liu, Z. Qin, M. Elkashlan, Y. Gao, and L. Hanzo, “Enhanc-
[10] T.-X. Zheng, H.-M. Wang, J. Yuan, D. Towsley, and M. H. Lee, “Multi- ing the physical layer security of non-orthogonal multiple access in
antenna transmission with artificial noise against randomly distributed large-scale networks,” IEEE Trans. Wireless Commun., vol. 16, no. 3,
eavesdroppers,” IEEE Trans. Commun., vol. 63, no. 11, pp. 4347–4362, pp. 1656–1672, Mar. 2017.
Nov. 2015. [33] G. Gomez, F. J. Martin-Vega, F. J. Lopez-Martinez, Y. Liu, and
[11] S. Yan, X. Zhou, N. Yang, B. He, and T. D. Abhayapala, “Artificial- M. Elkashlan, “Physical layer security in uplink NOMA multi-antenna
noise-aided secure transmission in wiretap channels with transmitter- systems with randomly distributed eavesdroppers,” IEEE Access, vol. 7,
side correlation,” IEEE Trans. Wireless Commun., vol. 15, no. 12, pp. 70422–70435, 2019.
pp. 8286–8297, Dec. 2016. [34] S. Zhang, X. Xu, H. Wang, J. Peng, D. Zhang, and K. Huang, “Enhanc-
[12] X. Hu, P. Mu, B. Wang, and Z. Li, “On the secrecy rate maximization ing the physical layer security of uplink non-orthogonal multiple access
with uncoordinated cooperative jamming by single-antenna helpers,” in cellular Internet of Things,” IEEE Access, vol. 6, pp. 58405–58417,
IEEE Trans. Veh. Technol., vol. 66, no. 5, pp. 4457–4462, May 2017. 2018.
[13] N. Zhao, Y. Cao, F. R. Yu, Y. Chen, M. Jin, and V. C. M. Leung, “Arti- [35] K. Jiang, T. Jing, F. Zhang, Y. Huo, and Z. Li, “ZF-SIC based individual
ficial noise assisted secure interference networks with wireless power secrecy in SIMO multiple access wiretap channel,” IEEE Access, vol. 5,
transfer,” IEEE Trans. Wireless Commun., vol. 67, no. 2, pp. 1087–1098, pp. 7244–7253, 2017.
Feb. 2018. [36] K. Jiang, T. Jing, Y. Huo, F. Zhang, and Z. Li, “SIC-based secrecy
[14] S. Yan, N. Yang, I. Land, R. Malaney, and J. Yuan, “Three artificial- performance in uplink NOMA multi-eavesdropper wiretap channels,”
noise-aided secure transmission schemes in wiretap channels,” IEEE IEEE Access, vol. 6, pp. 19664–19680, 2018.
Trans. Veh. Technol., vol. 67, no. 4, pp. 3669–3673, Apr. 2018. [37] H. A. David and H. N. Nagaraja, Order Statistics, 3rd ed. Hoboken, NJ,
USA: Wiley, 2003.
[15] L. Lv, F. Zhou, J. Chen, and N. Al-Dhahir, “Secure cooperative com-
[38] A. M. Hunter, J. G. Andrews, and S. Weber, “Transmission capacity of
munications with an untrusted relay: A NOMA-inspired jamming and
ad hoc networks with spatial diversity,” IEEE Trans. Wireless Commun.,
relaying approach,” IEEE Trans. Inf. Forensics Security, vol. 14, no. 12,
vol. 7, no. 12, pp. 5058–5071, Dec. 2008.
pp. 3191–3205, Dec. 2019.
[39] H. Gao, P. J. Smith, and M. V. Clark, “Theoretical reliability of MMSE
[16] W. Wang et al., “Energy-constrained UAV-assisted secure communica-
linear diversity combining in Rayleigh-fading additive interference chan-
tions with position optimization and cooperative jamming,” IEEE Trans.
nels,” IEEE Trans. Commun., vol. 46, no. 5, pp. 666–672, May 1998.
Commun., vol. 68, no. 7, pp. 4476–4489, Jul. 2020.
[40] I. S. Gradshteyn, I. M. Ryzhik, A. Jeffrey, D. Zwillinger, and S. Tech-
[17] M. Haenggi, J. G. Andrews, F. Baccelli, O. Dousse, and
nica, Table of Integrals, Series, and Products, 7th ed. New York, NY,
M. Franceschetti, “Stochastic geometry and random graphs for the
USA: Academic, 2007.
analysis and design of wireless networks,” IEEE J. Sel. Areas Commun.,
[41] S. N. Chiu, D. Stoyan, W. S. Kendall, and J. Mecke, Stochastic Geometry
vol. 27, no. 7, pp. 1029–1046, Sep. 2009.
and its Applications, 3rd ed. New York, NY, USA: Wiley, 2013.
[18] X. Zhou, R. K. Ganti, J. G. Andrews, and A. Hjørungnes, “On the [42] S. Boyd and L. Vandenberghe, Convex Optimization. Cambridge, U.K.:
throughput cost of physical layer security in decentralized wireless net- Cambridge Univ. Press, 2004.
works,” IEEE Trans. Wireless Commun., vol. 10, no. 8, pp. 2764–2775,
Aug. 2011.
[19] X. Zhang, X. Zhou, and M. R. McKay, “Enhancing secrecy with multi-
antenna transmission in wireless ad hoc networks,” IEEE Trans. Inf.
Forensics Security, vol. 8, no. 11, pp. 1802–1814, Nov. 2013. Tong-Xing Zheng (Member, IEEE) received the
[20] T.-X. Zheng, H.-M. Wang, Q. Yang, and M. H. Lee, “Safeguarding B.S. degree in information engineering and the Ph.D.
decentralized wireless networks using full-duplex jamming receivers,” degree in information and communications engineer-
IEEE Trans. Wireless Commun., vol. 16, no. 1, pp. 278–292, Jan. 2017. ing from Xi’an Jiaotong University, Xi’an, China,
[21] T.-X. Zheng, H.-M. Wang, J. Yuan, Z. Han, and M. H. Lee, “Physical in 2010 and 2016, respectively. From 2017 to 2018,
layer security in wireless ad hoc networks under a hybrid full-/half- he was a Visiting Scholar with the School of Elec-
duplex receiver deployment strategy,” IEEE Trans. Wireless Commun., trical Engineering and Telecommunications, Univer-
vol. 16, no. 6, pp. 3827–3839, Jun. 2017. sity of New South Wales, Sydney, Australia. He is
[22] H. Wang, X. Zhou, and M. C. Reed, “Physical layer security in cellu- currently an Associate Professor with Xi’an Jiao-
lar networks: A stochastic geometry approach,” IEEE Trans. Wireless tong University. He has coauthored the book Phys-
Commun., vol. 12, no. 6, pp. 2776–2787, Jun. 2013. ical Layer Security in Random Cellular Networks
[23] G. Geraci, H. S. Dhillon, J. G. Andrews, J. Yuan, and I. B. Collings, (Springer, 2016), one book chapter, and has authored or coauthored over
“Physical layer security in downlink multi-antenna cellular networks,” 60 papers in telecommunications journals and conference proceedings. His
IEEE Trans. Commun., vol. 62, no. 6, pp. 2006–2021, Jun. 2014. current research interests include 5G&6G wireless networks and key technolo-
[24] H.-M. Wang, T.-X. Zheng, J. Yuan, D. Towsley, and M. H. Lee, “Phys- gies, physical layer security, and covert communications. He was a recipient of
ical layer security in heterogeneous cellular networks,” IEEE Trans. the Excellent Doctoral Dissertation Award of Shaanxi Province in 2019 and
Commun., vol. 64, no. 3, pp. 1204–1219, Mar. 2016. the First Prize of Science and Technology Award in Higher Institution of
[25] C. Wang, Z. Li, X.-G. Xia, J. Shi, J. Si, and Y. Zou, “Physical Shaanxi Province in 2019. He was honored as an Exemplary Reviewer of
layer security enhancement using artificial noise in cellular vehicle- IEEE T RANSACTIONS ON C OMMUNICATIONS in 2017, 2018, and 2021,
to-everything (C-V2X) networks,” IEEE Trans. Veh. Technol., vol. 69, respectively. He was a Leading Guest Editor of Frontiers in Communications
no. 12, pp. 15253–15268, Dec. 2020. and Networks for the Special Issue on Covert Communications for Next-
[26] H.-M. Wang and T.-X. Zheng, Physical Layer Security in Random Generation Wireless Networks in 2021 and a Guest Editor of Wireless
Cellular Networks. Singapore: Springer, Oct. 2016. Communications and Mobile Computing for the Special Issue on Physical
[27] S. Marano, V. Matta, and P. K. Willett, “Distributed detection with Layer Security for the Internet of Things in 2018. He is currently serving as
censoring sensors under physical layer secrecy,” IEEE Trans. Signal an Associate Editor of IET Electronic Letters and a Review Editor of Frontiers
Process., vol. 57, no. 5, pp. 1976–1986, May 2009. in Communications and Networks.

Authorized licensed use limited to: Motilal Nehru National Institute of Technology. Downloaded on November 08,2022 at 09:40:37 UTC from IEEE Xplore. Restrictions apply.
ZHENG et al.: PHYSICAL LAYER SECURITY IN LARGE-SCALE RANDOM MULTIPLE ACCESS WSNs 4051

Xin Chen received the B.S. degree in information Kai-Kit Wong (Fellow, IEEE) received the B.Eng.,
engineering from Xi’an Jiaotong University, Xi’an, M.Phil., and Ph.D. degrees in electrical and elec-
China, in 2021, where she is currently pursuing the tronic engineering from the Hong Kong University
M.S. degree. Her current research interests include of Science and Technology, Hong Kong, in 1996,
wireless physical layer security, covert communica- 1998, and 2001, respectively. After graduation,
tions, intelligent reflecting surface, and integrated he took up academic and research positions at The
sensing and communications. University of Hong Kong; Lucent Technologies;
Bell-Labs, Holmdel; the Smart Antennas Research
Group, Stanford University; and the University of
Hull, U.K. He is currently the Chair of wireless
communications with the Department of Electronic
and Electrical Engineering, University College London, U.K. His current
research centers around 5G and beyond mobile communications. He is a
fellow of IET and also on the editorial board of several international journals.
He was a co-recipient of the 2013 IEEE S IGNAL P ROCESSING L ETTERS
Best Paper Award and the 2000 IEEE VTS Japan Chapter Award at the IEEE
Vehicular Technology Conference, Japan, in 2000. He also received a few
other international best paper awards. He has been the Editor-in-Chief of
IEEE W IRELESS C OMMUNICATIONS L ETTERS since 2020.

Jinhong Yuan (Fellow, IEEE) received the B.E. and


Ph.D. degrees in electronics engineering from the
Beijing Institute of Technology, Beijing, China, in
1991 and 1997, respectively. From 1997 to 1999,
he was a Research Fellow with the School of Electri-
cal Engineering, The University of Sydney, Sydney,
Australia. In 2000, he joined the School of Electrical
Engineering and Telecommunications, University of
New South Wales, Sydney, where he is currently
a Professor and the Head of the Telecommunica-
tion Group. He has published two books, six book
chapters, over 300 papers in telecommunications journals and conference
Chao Wang (Senior Member, IEEE) received the proceedings, and 50 industrial reports. He is a co-inventor of one patent
B.S., M.S., and Ph.D. degrees in information and on MIMO systems and two patents on low-density-parity-check codes. His
communications engineering from Xi’an Jiaotong current research interests include error control coding and information theory,
University, Xi’an, China, in 2008, 2013, and 2016, communication theory, and wireless communications. He has coauthored
respectively. He is currently a Lecturer with the State four Best Paper Awards and one Best Poster Award, including the Best
Key Laboratory of Integrated Services Networks, Paper Award from the IEEE International Conference on Communications,
School of Telecommunications Engineering, Xidian Kansas City, USA, in 2018; the Best Paper Award from IEEE Wireless
University. His current research interests include Communications and Networking Conference, Cancun, Mexico, in 2011; and
5G&6G wireless networks and key technologies, the Best Paper Award from the IEEE International Symposium on Wireless
physical-layer security, covert communications, and Communications Systems, Trondheim, Norway, in 2007. He served as the
deep learning and its application in the optimization IEEE NSW Chapter Chair of Joint Communications/Signal Processions/Ocean
of wireless communications. He was a recipient of the Excellent Doctoral Engineering Chapter from 2011 to 2014. He has served as an Associate Editor
Dissertation Award of Shaanxi Province in 2018 and the China Institute of for the IEEE T RANSACTIONS ON C OMMUNICATIONS from 2012 to 2017.
Communications in 2016. He received the best paper awards at the IEEE He is currently serving as an Associate Editor for the IEEE T RANSACTIONS
ICCC 2014 and IEEE SAGC 2020. ON W IRELESS C OMMUNICATIONS.

Authorized licensed use limited to: Motilal Nehru National Institute of Technology. Downloaded on November 08,2022 at 09:40:37 UTC from IEEE Xplore. Restrictions apply.

You might also like