Professional Documents
Culture Documents
Physical Layer Security in Large-Scale Random Multiple Access Wireless Sensor Networks: A Stochastic Geometry Approach
Physical Layer Security in Large-Scale Random Multiple Access Wireless Sensor Networks: A Stochastic Geometry Approach
Physical Layer Security in Large-Scale Random Multiple Access Wireless Sensor Networks: A Stochastic Geometry Approach
6, JUNE 2022
Abstract— This paper investigates physical layer security for connection outage probability and secrecy outage probability
a large-scale WSN with random multiple access, where each to characterize transmission reliability and secrecy, respectively.
fusion center in the network randomly schedules a number of Based on the obtained analytical results, we formulate an opti-
sensors to upload their sensed data subject to the overhearing mization problem for maximizing the sum secrecy throughput
of randomly distributed eavesdroppers. We propose an unco- subject to both reliability and secrecy constraints, considering
ordinated random jamming scheme in which those unscheduled a joint design of the wiretap code rates for each scheduled
sensors send jamming signals with a certain probability to defeat sensor and the jamming probability for the unscheduled sensors.
the eavesdroppers. With the aid of stochastic geometry theory We provide both optimal and low-complexity sub-optimal algo-
and order statistics, we derive analytical expressions for the rithms to tackle the above problem, and further reveal various
properties on the optimal parameters which are useful to guide
Manuscript received August 12, 2021; revised March 3, 2022; accepted practical designs. In particular, we demonstrate that the proposed
April 5, 2022. Date of publication April 13, 2022; date of current ver- random jamming scheme is beneficial for improving the sum
sion June 16, 2022. The work of Tong-Xing Zheng and Xin Chen was secrecy throughput, and the optimal jamming probability is the
supported in part by the National Natural Science Foundation of China result of trade-off between secrecy and throughput. We also
under Grant 61701390, in part by the Open Research Fund of National show that the throughput performance of the sub-optimal scheme
Mobile Communications Research Laboratory, Southeast University, under approaches that of the optimal one when facing a stringent
Grant 2021D07, in part by the China Postdoctoral Science Foundation under reliability constraint or a loose secrecy constraint.
Grants 2021M702631, in part by the Natural Science Basic Research Plan of
Shaanxi Province under Grant 2022JM-320, and in part by the Fundamental Index Terms— Physical layer security, wireless sensor net-
Research Funds for the Central Universities under Grant xzy012021033. The works, random multiple access, outage probability, sum secrecy
work of Chao Wang was supported in part by the National Natural Science throughput, stochastic geometry.
Foundation of China under Grant 61801518, in part by the Key Research
and Development Program of Shaanxi under Grant 2022KW-03, in part I. I NTRODUCTION
by the Defense Industrial Technology Development Program under Grant
JCKY2021608B001, in part by the Zhejiang Lab’s International Talent Fund
for Young Professionals, in part by the China Postdoctoral Science Foundation
under Grant 2020M683428, in part by the open research fund of the Ministry
W IRELESS sensor networks (WSNs) have drawn promi-
nent research interests from both academia and
industry in recent years and have been envisioned as key
of Education Key Lab of Broadband Wireless Communication and Sensor technologies for Internet-of-Things (IoTs) [1]. With a massive
Network Technology, Nanjing University of Posts and Telecommunications,
and in part by the Open Research Fund of National Mobile Communi- number of sensors deployed in a network, collecting and
cations Research Laboratory, Southeast University, under Grant 2021D06. reporting diverse environmental data to fusion centers (FCs),
The work of Kai-Kit Wong was supported in part by the Engineering and WSNs show tremendous potential in a variety of applica-
Physical Sciences Research Council under Grant EP/T015985/1. The work
of Jinhong Yuan was supported in part by the Australia Research Council tions, including security and battlefield surveillance, disaster
Discovery Project under Grant DP220103596 and Linkage Project under Grant alert, industrial automation, traffic management, smart health-
LP200301482. The associate editor coordinating the review of this article and care and homes, etc [2]. However, delivering sensing data
approving it for publication was S. Aissa. (Corresponding authors: Tong-Xing
Zheng; Chao Wang.) over the air is prone to eavesdropping attacks due to the
Tong-Xing Zheng and Xin Chen are with the Ministry of Education Key openness of wireless channels. Moreover, it is challenging
Laboratory for Intelligent Networks and Network Security, and the School to employ key-based cryptographic techniques for WSNs,
of Information and Communications Engineering, Xi’an Jiaotong University,
Xi’an 710049, China, and also with the National Mobile Communications where the distribution, maintenance, and management of secret
Research Laboratory, Southeast University, Nanjing 210096, China (e-mail: keys are expensive under dynamic and large-scale topologies.
zhengtx@mail.xjtu.edu.cn; cx0513@stu.xjtu.edu.cn). In general, sensors are incapable of implementing complicated
Chao Wang is with the State Key Laboratory of Integrated Services Net-
works, Xidian University, Xi’an 710071, China, and also with the National cryptographic algorithms due to low energy and computing
Mobile Communications Research Laboratory, Southeast University, Nanjing power [3]. In this context, physical layer security [4]–[7] has
210096, China (e-mail: drchaowang@126.com). emerged as an appealing low-complexity paradigm to realize
Kai-Kit Wong is with the Department of Electronic and Electrical Engi-
neering, University College London, London WC1E 6BT, U.K. (e-mail: secure transmissions by exploiting wireless media character-
kai-kit.wong@ucl.ac.uk). istics, and it promises to be a powerful supplement or even
Jinhong Yuan is with the School of Electrical Engineering and Telecom- alternative to the cryptographic mechanisms for WSNs.
munications, University of New South Wales, Sydney, NSW 2052, Australia
(e-mail: j.yuan@unsw.edu.au). A. Background and Motivations
Color versions of one or more figures in this article are available at
https://doi.org/10.1109/TCOMM.2022.3167047. The research of physical layer security dates back to as
Digital Object Identifier 10.1109/TCOMM.2022.3167047 early as 1975 when Wyner postulated the information-theoretic
0090-6778 © 2022 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: Motilal Nehru National Institute of Technology. Downloaded on November 08,2022 at 09:40:37 UTC from IEEE Xplore. Restrictions apply.
ZHENG et al.: PHYSICAL LAYER SECURITY IN LARGE-SCALE RANDOM MULTIPLE ACCESS WSNs 4039
foundation in his ground-breaking treatise [8]. Wyner intro- As mentioned previously, physical layer security is partic-
duced the degraded witetap channel model and showed that ularly important for WSNs, since employing traditional cryp-
the reliability and secrecy of information delivery can be tographic mechanism is rather costly and difficult. Recently,
concurrently guaranteed with appropriate secrecy channel cod- physical layer security has been advocated to protect com-
ing. This pioneering work has motivated substantial endeavors munications from eavesdropping for WSNs. The majority of
invested in developing physical layer security during the past existing literature on physical layer security in WSNs has
decade, from the viewpoints of both information theory and been concentrated on deterministic network geometry, i.e.,
signal processing. ignoring the uncertainty of nodes’ locations or large-scale path
Early research on physical layer security have been loss [27]–[29]. Given that sensors are generally randomly scat-
more concentrated on point-to-point communication links. tered, Lee et al. [30] first introduced the concept of distributed
Fundamental information-theoretic limits and optimal secrecy network secrecy and quantified the secrecy throughput and
signaling schemes have been investigated by exploiting the energy consumption for a multilevel WSN using tools from
channel state information (CSI) of both the main channel stochastic geometry. Deng et al. [31] further analyzed the
(spanning from transmitter to the intended receiver) and the average secrecy rate for a three-tier WSN. However, these
wiretap channel (spanning from transmitter to the undesired works only considered access technologies with orthogonal
receiver, or eavesdropper). When the eavesdropper’s CSI is resource blocks (RBs).
completely unavailable, Goel and Negi [9] proposed to radiate Random multiple access has the virtue of being highly con-
controllable artificial noise or jamming signals along with venient and flexible without requiring a complicated control
confidential information, through either centralized multiple scheduling, which is well-suited for the large-scale WSNs
antennas or distributed cooperative jammers, to degrade the particularly when the system load is overly heavy. Although
wiretap channel while without impairing the main channel. studies of secure multiple access have been reported for var-
With no need for the eavesdropper’s CSI, the idea of artificial ious wiretap channel models, the results cannot be directly
noise or cooperative jamming has opened a new avenue for applied for large-scale WSNs with stochastic network geom-
enhancing physical layer security and has sparked a wave of etry. In recent years, the physical layer security of non-
innovation, e.g, see [10]–[16]. orthogonal multiple access (NOMA) for large-scale networks
Different from the point-to-point scenarios, secure has received considerable attention, e.g., [32]–[34], but unfor-
communications in large-scale wireless networks suffer from tunately, at present researchers have mainly focused on two-
severe interference caused by a large amount of concurrent user pairing sharing the same RB. In fact, random multiple
transmissions, and therefore the security performance depends access with non-orthogonal RBs will significantly hamper the
heavily on the network geometry and the locations of nodes analysis of channel statistics for large-scale WSNs, since we
in the network. Against this background, stochastic geometry have to deal with the combined effect of channel fading, the
theory has offered powerful tools to study large-scale wireless random locations of external interfering sensors, as well as the
networks from a statistical point of view by modeling node uncertainty of the successive interference cancellation (SIC)
positions as some spatial distributions like Poisson point based decoding order for internal sensors belong to the same
process (PPP) [17], and the research on physical layer security FC. The intractability of analysis will in no doubt make
under a stochastic geometry framework has been extensively it challenging to design schemes to optimize the network
carried out recently. For example, for large-scale ad hoc security performance in terms of e.g., sum secrecy throughput.
networks, Zhou et al. [18] and Zhang et al. [19] respectively Our research work aims to provide an analytical framework
explored single- and multi-antenna secure transmissions and and design schemes to address the aforementioned problem.
identified the tradeoff between reliability and secrecy against
eavesdropping attacks. Zheng et al. [20], [21] explored the
great benefit of full-duplex receiver jamming in enhancing the B. Our Work and Contributions
network-wide secrecy throughput and energy efficiency. For In this paper, we study physical layer security for a large-
multi-cell cellular networks, Wang et al. [22] investigated the scale WSN consisting of randomly deployed sensors and FCs,
secure downlink transmissions and discussed the impact of coexisting with randomly distributed eavesdroppers attempting
cell association and the location information of mobile users. to intercept the data broadcast by the sensors. We establish
Geraci et al. [23] further evaluated the achievable secrecy a joint analysis and design framework to evaluate the trans-
rate with regularized channel inversion precoding under mission reliability and secrecy and optimize the network-wide
a massive multiple-input multiple-output (MIMO) system. performance in terms of the sum secrecy throughput. Our main
Wang et al. [24] comprehensively analyzed the network-wide contributions care summarized as follows:
secrecy for a multi-tier heterogeneous cellular network, where • We propose a random multiple access strategy which
a threshold-based mobile association policy was proposed associates each sensor to its nearest FC, and each FC
to balance link quality and secrecy. Wang et al. [25] further randomly selects a certain number of sensors for data
applied the artificial noise aided physical layer security to the acquisition. We then propose an uncoordinated jamming
cellular vehicle-to-everything (C-V2X) networks. Interested scheme to combat eavesdropping where those unsched-
readers are referred to [26] for a more thorough understanding uled sensors, who are not chosen for data collection at the
of the physical layer security in random wireless networks current time slot, independently radiate jamming signals
under the stochastic geometry framework. with a certain probability.
Authorized licensed use limited to: Motilal Nehru National Institute of Technology. Downloaded on November 08,2022 at 09:40:37 UTC from IEEE Xplore. Restrictions apply.
4040 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 70, NO. 6, JUNE 2022
Authorized licensed use limited to: Motilal Nehru National Institute of Technology. Downloaded on November 08,2022 at 09:40:37 UTC from IEEE Xplore. Restrictions apply.
ZHENG et al.: PHYSICAL LAYER SECURITY IN LARGE-SCALE RANDOM MULTIPLE ACCESS WSNs 4041
C. Uncoordinated Random Jamming are represented by the codeword rate Rt and the secrecy
We assume that each FC knows perfectly the instantaneous rate Rs , respectively. The rate redundancy Re Rt − Rs
CSI regarding its K scheduled sensors, whilst only has the is intentionally introduced for guaranteeing secrecy against
statistical CSI of the other sensors and of the eavesdroppers.2 eavesdropping attacks. If the capacity of the main channel
In order to combat eavesdropping effectively while avoiding falls below the codeword rate Rt , the desired receiver cannot
bringing severe interference to the FCs, an uncoordinated ran- recover the codeword correctly, which is regarded as connec-
dom jamming scheme is proposed, in which the unscheduled tion outage, and the probability that this event happens is
sensors radiate jamming signals at a probability ρ ∈ [0, 1]. termed connection outage probability (COP). If the capacity
By doing this, the distribution of the jamming sensors follows of the wiretap channel exceeds the rate redundancy Re , perfect
a PPP Φj with density λj = ρλi . secrecy is not possible, which is considered to be secrecy
We emphasize that the proposed random jamming scheme outage, and the probability of this event occurring is referred
is suitable for the energy-limited sensor networks owing to to as secrecy outage probability (SOP).
its low-level collaboration. This is fundamentally different Without loss of generality, we focus on a typical FC which is
from those higher-level collaboration schemes such as coor- placed at the origin o of the polar coordinate, and denote its K
dinated ZF jamming, which will cause high overhead and scheduled sensors as S1 , S2 , · · · , SK with an ascending sort
implementation complexity due to information sharing, beam- order of their distances. The codeword rate and the secrecy
former design, and synchronization. Moreover, the jamming rate of sensor Sk are denoted as Rt,k and Rs,k , respec-
probability ρ is carefully designed off line for maximizing the tively, and the corresponding rate redundancy is given by
network security performance, as will be discussed in Sec. Re,k = Rt,k − Rs,k . The COP of Sk can be defined as
IV, and hence our scheme can balance well between network pco,k P{SINRo,k < βt,k }, ∀k ∈ K, (1)
performance and complexity.
where SINRo,k denotes the instantaneous signal-to-
D. Multi-Stream Decoding interference-plus-noise ratio (SINR) of the typical FC
for resolving the signal from Sk , and βt,k 2Rt,k − 1 is the
At the FC side, the ZF-SIC method is employed to sep- threshold SINR for connection outage.
arate the multiple data streams received from its associated We consider the wiretap scenario in which the eavesdrop-
K sensors.3 Theoretically, the SIC order should be sorted pers do not collude with each other and decode messages
according to the instantaneous received signal strengths from individually. In this case, a secrecy outage event takes place if
the strongest to the weakest. However, given that the impact only confidential information is leaked to the most threatening
of large-scale path loss is generally more dominant on the eavesdropper of the highest SINR. Therefore, the SOP of Sk
channel impairment and is more stable compared with the can be defined as
small-scale channel fading, we schedule the SIC order based
on the sensors’ distances to the FC from the nearest to the pso,k P max SINRe,k > βe,k , ∀k ∈ K, (2)
farthest. To be more specific, the procedure of ZF-SIC can e∈Φe
be described as follows: 1) first decode the signal received where SINRe,k denotes the instantaneous SINR of the eaves-
from the nearest sensor by removing the aggregated signals dropper located at e ∈ Φe for intercepting the data from Sk ,
received from the K − 1 farther sensors through projecting and βe,k 2Re,k −1 is the threshold SINR for secrecy outage.
these signals on to the null space of the instantaneous channel This paper uses the metric sum secrecy throughput to assess
of the nearest sensor, 2) then cancel the decoded signal from the capacity of multi-access secure transmissions from the
the composite received signals, and 3) successively decode the viewpoint of secrecy outage, where the sum secrecy through-
signal from the second nearest sensor in a similar way, and put of a typical FC is defined as the total average successfully
so on. After the ZF-SIC operation, when decoding the signal received confidential information bits from its K scheduled
from any specific sensor, the FC can successfully eliminate sensors per second per Hertz per channel use subject to certain
the interfering signals generated by the other K − 1 sensors. secrecy constraints. Formally, the sum secrecy throughput can
be formulated as
E. Performance Metrics and Optimization Problem
K
In order to secure the data transmission, Wyner’s secrecy- T = Rs,k (1 − pco,k ), s.t. pso,k ≤ , ∀k ∈ K, (3)
preserving channel code, generally known as the wiretap code, k=1
is employed. In the wiretap code, the rates of the trans- where ∈ [0, 1] is a prescribed threshold representing the
mitted codewords and the embedded confidential messages maximal tolerable SOP.
In this paper, we aim to maximize the sum secrecy through-
2 Theoretically, an FC can obtain the perfect CSI of its scheduled sensors
put T via jointly designing the wiretap code rates for each
via channel estimation by letting them transmit orthogonal training sequences
simultaneously. scheduled sensor (including the codeword rate Rt,k and the
3 ZF is a typical linear filter for multi-user communication systems, and ZF- secrecy rate Rs,k ) and the jamming probability ρ for the
SIC is commonly used in an NOMA system to achieve SIC due to its ease of unscheduled sensors. Before proceeding to the optimization
implementation and low computational complexity [35], [36]. In this sense,
ZF-SIC is more subtable for the large-scale random multiple access WSN problem, we will first derive analytical expressions for the
compared with more advanced but complicated methods, e.g., MMSE-SIC. COP pco,k and SOP pso,k for k ∈ K in the following section.
Authorized licensed use limited to: Motilal Nehru National Institute of Technology. Downloaded on November 08,2022 at 09:40:37 UTC from IEEE Xplore. Restrictions apply.
4042 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 70, NO. 6, JUNE 2022
III. A NALYSES OF COP AND SOP Proposition 1: The COP of the secure transmission from
This section evaluates the reliability and secrecy perfor- the k-th nearest sensor Sk to the typical FC is given by
mance of the large-scale WSN under investigation with ran- k−1 Mk −1
m
K k−1 m (−1)l
dom multiple access. Specifically, we will analyze in detail pco,k = 1 − πλc k
k l p m!
the COP pco,k and SOP pso,k of the secure transmission l=0 m=0 p=0
from the k-th nearest sensor Sk to the typical FC located m−p
p
ωβt,k n
at the origin o, utilizing the stochastic geometry theory and × 1p=0 Ω mα
2
+1p=0 δ
δφλo βt,k
Pa
order statistics. For ease of notation, we define δ 2/α and n=1
φ πΓ(1 + δ)Γ(1 − δ) throughout the paper.
× Ωμ Υp,n (7)
A. General Results for COP
where 1H is the indicator function with 1H = 1 when event
Denote the locations of the K sensors Sk scheduled by the H is true and 1H = 0 otherwise, λo λa + (Pj /Pa ) λj ,
δ
typical FC as sk for k ∈ K, with an ascending order of their μ = 2 (m − p) + n, Ωμ 0 x e
α ∞ μ −τ1 xα/2 −τ2 x
dx with
distances to the FC L1 ≤ L2 , · · · , ≤ LK . Note that due to τ1 = ωβt,k /Pa and τ2 = φλo βt,k
δ
+ πλc (K − k + l + 1), and
random multiple access and SIC order scheduling, the ordered
Υp,n ψj ∈comb( p−1 ) qij ∈ψj [qij − δ(qij − i + 1)],
distance Lk is a random variable, the statistics of which is p−n
i=1,··· ,p−n
characterized by the following lemma. with the
p−1convention
that Υp,p = 1 for p ≥ 1. The term
Lemma 1: The PDF of the ordered distance Lk from the comb p−n represents the set of all distinct subsets of the
typical FC to the k-th nearest sensor is given by natural numbers {1, 2, · · · , p − 1} with cardinality p − n. The
k−1 elements in each subset ψj are sorted in an ascending order
K k−1 2
fLk (r) = 2k (−1)l πλc re−πλc r (K−k+l+1) , with qij being the i-th element of ψj .
k l Proof: Please refer to Appendix A.
l=0
(4) Although (7) seems difficult to analyze due to the existence
of the integral term Ωμ , it provides a general and accurate
Proof: The PDF of Lk follows from order statistics [37],
expression for the COP without requiring time-consuming
K simulations. More importantly, it can be used as a baseline
fLk (r) = k FL (r)k−1 [1 − FL (r)]K−k fL (r), (5)
k for comparison with other approximate results. For a special
2 2 case with α = 4, Ωμ can be simplified by [40, Eq. (3.462.1)]
where fL (r) = 2πrλc e−πλc r and FL (r) = 1 − e−πλc r are as the following practically closed form,
the PDF and CDF of the unordered distance L from a sensor 2
to its nearest FC, respectively. − μ+1 τ2 τ2
Ωα=4 = (2τ 1 ) 2 Γ(μ + 1) exp D −μ−1 √ ,
According to the ZF-SIC decoding described in Sec. II-B,
μ
8τ1 2μ1
the instantaneous SINR of Sk can be formulated as (8)
2 −α
Pa |wTk ho,sk | Lk where D−μ (z) denotes the parabolic cylinder function [40,
SINRo,k = , (6)
Ia + Ij + ω Eq. (9.241.2)]. Note that with (8), the new expression of the
T 2 −α COP pco,k becomes rather computationally convenient which
where Ia = x∈Φa \o Pa |w k ho,x | ro,x denotes the inter- requires only the calculation or lookup of a D−μ (z) value.
ference generated by those sensors scheduled by the FCs
T 2 −α
other than the typical FC, Ij = y∈Φj Pj |w k ho,y | ro,y
denotes the power of the aggregated jamming signal from B. Interference-Limited Case for COP
the unscheduled sensors, with Pa and Pj being the trans- Owing to a large amount of uncoordinated concurrent
mit power of the information-bearing signals and the jam- transmissions in the network, the aggregate interference at a
ming signals, respectively, and ω denotes the power of the receiver generally dominates the thermal noise. Motivated by
U † U T h† this fact, we turn to examine the interference-limited WSN by
receiver noise. Here, w k = Uk T hk † o,sk denotes the weight
k o,sk ignoring the receiver noise at the FC side.
vector designed for the k-th sensor as per the ZF-MRC
The following corollary provides a closed-form expression
criterion, where U k ∈ CMc ×Mk , with Mk Mc −K + k,
for the COP pco,k considering the interference-limited case.
is the projection matrix onto the null space of the matrix
Corollary 1: For the interference-limited WSN, the COP of
[ho,sk+1 , · · · , ho,sK ] such that wTk ho,sj = 0 for j > k. Sk is given by
Note that the columns of U k constitute an orthogonal basis,
T † k−1
and hence |w T K k − 1 (−1)l
2 2 T 2
k ho,sk | = U k ho,sk and |w k ho,x | obey
the gamma distribution Gamma(Mk , 1) and the exponential pco,k = 1 − πλc k
k l τ2
distribution Exp(1), respectively.
l=0
n
Mk −1
m δ
The COP of sensor Sk is defined in (1) with SINRo,k given n! δφλo βt,k
× 1+ Υm,n .
in (6). Note that the COP is affected by various uncertainties, m! τ2
m=1 n=1
including fading channels, node locations, as well as the
(9)
decoding order. In the following proposition, we provide an
expression for the exact COP. Proof: Please refer to Appendix B.
Authorized licensed use limited to: Motilal Nehru National Institute of Technology. Downloaded on November 08,2022 at 09:40:37 UTC from IEEE Xplore. Restrictions apply.
ZHENG et al.: PHYSICAL LAYER SECURITY IN LARGE-SCALE RANDOM MULTIPLE ACCESS WSNs 4043
πλc
The SOP pso,k of Sk is defined in (2) with SINRe,k given
k−1 k−1 1
where Λk = k K k l=0 l (−1)l (K−k+l+1) 2 and above. The following proposition provides a general result for
Mk −1 1 m−1 pso,k .
ΞMk = 1 + m=1 m! i=0 (i − δ).
Proposition 2: The SOP of the secure transmission from
Proof: Please refer to Appendix C. the k-th nearest sensor Sk to the typical FC is given by
It is worth noting that by means of the approximation
Me M e −m
given above, key parameters such as K, k, Mk , βt,k , and ζ1m−1 ζ2n ◦
pso,k = 1 − exp −πλe Ω , (13)
ρ are decoupled compared to (9), and various analytical m=1 n=0
(m − 1)!n! u
relationships between the COP and the parameters can be
extracted explicitly, some of which are particularly useful for where Ω◦u has the same form as Ωμ defined in Proposition 1
the subsequent optimization of sum secrecy throughput. For simply with μ = u = α2 (m − 1) + n, τ1 = ζ1 = ωβe,k /Pa ,
δ
example, it is clearly shown that pco,k increases as βt,k and and τ2 = ζ2 = φλj (Pj βe,k /Pa ) .
ρ become larger, as λo is a monotonically increasing function Proof: Please refer to Appendix D.
of ρ. Meanwhile, it is as expected that pco,k decreases when Proposition 2 clearly shows that the SOP pso,k exponentially
Mk grows since ΞMk ∈ (0, 1) is monotonically decreasing increases with the eavesdropper density λe . That is to say,
with Mk . secrecy is severely compromised when facing dense eaves-
Fig. 2 depicts the COP pco,k versus the SINR threshold droppers. Note that for the spacial case of α = 4, Ω◦u in (13)
βt,k for different values of the number Mc of FC anten- can be recast into the same form of (8), which further leads
nas and the number K of sensor nodes associated with the to a practically closed-form expression for the SOP pso,k .
Authorized licensed use limited to: Motilal Nehru National Institute of Technology. Downloaded on November 08,2022 at 09:40:37 UTC from IEEE Xplore. Restrictions apply.
4044 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 70, NO. 6, JUNE 2022
Authorized licensed use limited to: Motilal Nehru National Institute of Technology. Downloaded on November 08,2022 at 09:40:37 UTC from IEEE Xplore. Restrictions apply.
ZHENG et al.: PHYSICAL LAYER SECURITY IN LARGE-SCALE RANDOM MULTIPLE ACCESS WSNs 4045
∗
Although it is intractable to express Re,k in an explicit form
∗
due to the complicated expression of pso,k , the value of Re,k
can be efficiently obtained through bisection search with the
equation pso,k (Re,k ) = .
For designing the optimal Rs,k , we focus on the low COP
regime and substitute the approximate COP pco,k given in (10)
∗
into problem (16). Moreover, since Rt,k = Re,k + Rs,k ⇒
∗ ∗
βt,k = βe,k + (1 + βe,k )βs,k with βs,k 2 Rs,k
− 1, problem
(16) can be equivalently
translated into
δ
max max
Tk = 1 − Ak (βs,k + Bk ) log2 (1 + βs,k ),
0≤βs,k ≤βs,k
(19)
where Ak φλ πλc∗Λk ΞMk with Λk and ΞMk defined in Corol-
o
Authorized licensed use limited to: Motilal Nehru National Institute of Technology. Downloaded on November 08,2022 at 09:40:37 UTC from IEEE Xplore. Restrictions apply.
4046 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 70, NO. 6, JUNE 2022
Authorized licensed use limited to: Motilal Nehru National Institute of Technology. Downloaded on November 08,2022 at 09:40:37 UTC from IEEE Xplore. Restrictions apply.
ZHENG et al.: PHYSICAL LAYER SECURITY IN LARGE-SCALE RANDOM MULTIPLE ACCESS WSNs 4047
V. C ONCLUSION
Physical layer security was investigated for a large-scale
WSN with random multiple access under a stochastic geom-
etry framework. An uncoordinated jamming scheme was
Fig. 5. Secrecy throughput T v.s. jamming probability ρ for different devised to thwart the randomly distributed eavesdroppers.
and σ, with Pj = 1 dBm, λc = 0.01, Mc = 16, K = 4, Me = 2, and Analytical expressions were derived for both the COP and
λe = 0.0001.
SOP of the secure data delivery from sensors to a typical FC
against eavesdropping. Afterwards, the optimal wiretap code
rates and the jamming probability were jointly designed to
maximize the sum secrecy throughput subject to both COP
and SOP constraints, with both optimal and sub-optimal algo-
rithms examined. Furthermore, some insights into how the
optimal parameters should be adjusted to the communication
environment and performance requirements were provided.
Numerical results were presented to validate the theoretical
fundings. In particular, it was shown that for a stringent COP
constraint or a loose SOP constraint, the performance gap
between optimal and sub-optimal schemes becomes insignifi-
cant meaning that the sub-optimal scheme can be adopted as
a low-complexity alternative to the optimal one.
A PPENDIX
A. Proof of Proposition 1
β Lα
Fig. 6. Maximal secrecy throughput T ∗ v.s. eavesdropper density λe for Let s t,k
Pa
k
and I = Ia + Ij , the COP pco,k can be
different , λc , and Mc , with Pj = 1 dBm, K = 4, Me = 2, and σ = 0.2. computed by substituting (6) into (1),
pco,k
Corollary 4. The reason behind is that facing a looser SOP = 1 − ELk EI P U T † 2
k ho,sk ≥ s(I + ω)
constraint (a larger ), fewer sensor nodes are required to send Mk −1
(a) sm (I + ω)m
jamming signals against eavesdropping; meanwhile, when a = 1 − ELk EI e−s(I+ω)
larger COP σ can be tolerable, activating less jammers sig- m=0
m!
nificantly benefits secrecy throughput via supporting a much m m−p m
k −1
M
m ω s
larger secrecy rate. We find that as ρ increases, the two = 1 − ELk e−sω EI I p e−sI
p m!
curves with different ’s but identical σ merge. This implies m=0 p=0
that the jamming probability is sufficiently large to defeat M m m−p m p
k −1
(b) m ω s d
eavesdroppers such that the secrecy throughput performance = 1 − ELk e−sω LI (s) ,
m=0 p=0
p (−1) m! dsp
p
is less sensitive to the variation of the SOP constraints. It is
interesting to observe that the gap between optimal and sub- (30)
†
optimal schemes decreases obviously as the COP threshold σ where (a) is due to U T
k ho,sk
2
∼ Gamma(Mk , 1), and
reduces. This is because for a more stringent COP constraint, L
the feasible region of the secrecy rate for the optimal scheme (b) follows from the Laplace transform property tn f (t) ↔
dn
shrinks such that the optimal secrecy rate maximizing secrecy (−1)n ds n Lf (t) (s). Due to the independence of Ia and Ij , the
throughput approaches that of the sub-optimal scheme. Laplace transform LI (s) can be expressed as [17, eqn. (8)]
Fig. 6 plots the maximal secrecy throughput T ∗ of both LI (s) = EIa +Ij e−s(Ia +Ij ) = LIa (s)LIj (s)
optimal and sub-optimal schemes. It is easy to understand that
= e−φ(λa Pa +λj Pj )s = e−φλo (Pa s) ,
δ δ δ δ
T ∗ decreases with increasing density λe of eavesdroppers and (31)
Authorized licensed use limited to: Motilal Nehru National Institute of Technology. Downloaded on November 08,2022 at 09:40:37 UTC from IEEE Xplore. Restrictions apply.
4048 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 70, NO. 6, JUNE 2022
δ
where λo = λa + (Pj /Pa ) λj . The p-order derivative Note that the asymptotic region ψk → 0 reflects all possible
dp
dsp LI (s) can be obtained by [38, Eq. (51)] situations where parameters including but not limited to λc ,
λj , Pj , and Lk may produce a sufficiently small COP pco,k .
e−φλo (Pa s)
δ p
dp n δ
LI (s) = δφλo (Pa s)δ Υp,n . (32) Invoking the first-order Taylor expansion with e−ψk βt,k in (36)
dsp (−s)p n=1 around ψk = 0 and discarding the high order terms O ψk2 ,
Substituting (32) into (30) with s = βt,k Lα pco,k is simplified as
k /Pa yields
n pco,k ≈ 1 − ELk 1 − ψk βt,kδ
ΞMk
M m
k −1
m−p p δφλo βt,k δ
m ωβt,k
pco,k = 1 − = ELk φλo L2k βt,k
δ
ΞMk , (37)
m=0 p=0
p Pa n=1
m!
with ΞMk defined in Corollary 2. Computing the above expec-
ωβ
α(m−p)+2n − Pt,k Lα −φλ δ 2
tation by invoking (4) gives the result in (10).
× Υp,n ELk Lk e a k o β t,k L k
.
!
Ik D. Proof of Proposition 2
(33) The SOP defined in (2) can be rewritten cas
The term Ik in (33) can be calculated as pso,k
" ∞ ωβt,k α δ 2 -
Ik = rα(m−p)+2n e− Pa r −φλo βt,k r fLk (r)dr = 1 − EΦe P {SINRe,k < βe,k |Φe }
0
k−1 " ∞ e∈Φe
(a) K k−1 α/2 " ∞ " 2π
= πλc k (−1)l xμ e−τ1 x −τ2 x dx, (a)
k l = 1 − exp −λe P {SINRe,k ≥ βe,k } rdθdr ,
l=0 0 ! 0 0
Ωμ (38)
(34)
where SINRe,k is given by (12) with r re,sk , and (a) follows
where (a) follows from invoking the PDF fLk (r) of Lk given from the probability generating functional (PGFL) over a
in (4) along with the substitution r2 → x. The proof can be PPP [41].
completed after discussing the cases p = 0 and p = 0. Defining v rα βe,k /Pa , then P {SINRe,k ≥ βe,k } in (38)
can be calculated by invoking [39, Eq. (11)], i.e.,
B. Proof of Corollary 1
Me
−ωv (ωv)m−1
Plugging ω = 0 into (7) yields P {SINRe,k ≥ βe,k } = e EΦ [Am (v)],
(m − 1)! j
k−1 Mk −1 m=1
K k−1 (−1)l (39)
pco,k = 1 − πλc k
k l m! Me −m
c v n
l=0m=0 where Am (v) = n=0 n
with cn being the coeffi-
( −α
1+Pj re,z v)
m
n z∈Φj
−α
× 1m=0 Ω0 + 1m=0 Ωn Υm,n . cient of v n in z∈Φj 1 + Pj re,z v , which is
δ
δφλo βt,k
n=1
1 - Pj
n
(35) cn = , (40)
n! rα
i=1 e,zi
Recalling Ωμ defined in Proposition 1, it is easy to obtain that Zn ⊂Φj
Ω0 = 1/τ2 and Ωn = n!/τ2n+1 . Then, the proof is completed. where Zn {z1 , · · · , zn } denotes an arbitrary subset of n
points selected from Φj . Substituting (40) into Am (v) yields
C. Proof of Corollary 2 ⎡ ⎤
Me −m n n n −α
1 P v r
To begin with, let us revisit pco,k in (30) and plug (32) with EΦj ⎣ i=1 e,z ⎦.
j
EΦj [Am (v)] = −α
i
Authorized licensed use limited to: Motilal Nehru National Institute of Technology. Downloaded on November 08,2022 at 09:40:37 UTC from IEEE Xplore. Restrictions apply.
ZHENG et al.: PHYSICAL LAYER SECURITY IN LARGE-SCALE RANDOM MULTIPLE ACCESS WSNs 4049
Authorized licensed use limited to: Motilal Nehru National Institute of Technology. Downloaded on November 08,2022 at 09:40:37 UTC from IEEE Xplore. Restrictions apply.
4050 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 70, NO. 6, JUNE 2022
[5] R. Chen, C. Li, S. Yan, R. Malaney, and J. Yuan, “Physical layer secu- [28] R. Soosahabi and M. Naraghi-Pour, “Scalable PHY-layer security for
rity for ultra-reliable and low-latency communications,” IEEE Wireless distributed detection in wireless sensor networks,” IEEE Trans. Inf.
Commun., vol. 26, no. 5, pp. 6–11, Oct. 2019. Forensics Security, vol. 7, no. 4, pp. 1118–1126, Aug. 2012.
[6] Y. Wu, A. Khisti, C. Xiao, G. Caire, K.-K. Wong, and X. Gao, “A survey [29] J. E. Barcelo-Llado, A. Morell, and G. Seco-Granados, “Amplify-and-
of physical layer security techniques for 5G wireless networks and chal- forward compressed sensing as a physical-layer secrecy solution in
lenges ahead,” IEEE J. Sel. Areas Commun., vol. 36, no. 4, pp. 679–695, wireless sensor networks,” IEEE Trans. Inf. Forensics Security, vol. 9,
Apr. 2018. no. 5, pp. 839–850, May 2014.
[7] N. Yang, L. Wang, G. Geraci, M. Elkashlan, J. Yuan, and [30] J. Lee, A. Conti, A. Rabbachin, and M. Z. Win, “Distributed network
M. Di Renzo, “Safeguarding 5G wireless communication networks using secrecy,” IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1889–1900,
physical layer security,” IEEE Commun. Mag., vol. 53, no. 4, pp. 20–27, Sep. 2013.
Apr. 2015. [31] Y. Deng, L. Wang, M. Elkashlan, A. Nallanathan, and R. K. Mallik,
[8] A. D. Wyner, “The wire-tap channel,” Bell Syst. Tech. J., vol. 54, no. 8, “Physical layer security in three-tier wireless sensor networks: A sto-
pp. 1355–1387, May 1975. chastic geometry approach,” IEEE Trans. Inf. Forensics Security, vol. 11,
[9] S. Goel and R. Negi, “Guaranteeing secrecy using artificial noise,” IEEE no. 6, pp. 1128–1138, Jun. 2016.
Trans. Wireless Commun., vol. 7, no. 6, pp. 2180–2189, Jun. 2008. [32] Y. Liu, Z. Qin, M. Elkashlan, Y. Gao, and L. Hanzo, “Enhanc-
[10] T.-X. Zheng, H.-M. Wang, J. Yuan, D. Towsley, and M. H. Lee, “Multi- ing the physical layer security of non-orthogonal multiple access in
antenna transmission with artificial noise against randomly distributed large-scale networks,” IEEE Trans. Wireless Commun., vol. 16, no. 3,
eavesdroppers,” IEEE Trans. Commun., vol. 63, no. 11, pp. 4347–4362, pp. 1656–1672, Mar. 2017.
Nov. 2015. [33] G. Gomez, F. J. Martin-Vega, F. J. Lopez-Martinez, Y. Liu, and
[11] S. Yan, X. Zhou, N. Yang, B. He, and T. D. Abhayapala, “Artificial- M. Elkashlan, “Physical layer security in uplink NOMA multi-antenna
noise-aided secure transmission in wiretap channels with transmitter- systems with randomly distributed eavesdroppers,” IEEE Access, vol. 7,
side correlation,” IEEE Trans. Wireless Commun., vol. 15, no. 12, pp. 70422–70435, 2019.
pp. 8286–8297, Dec. 2016. [34] S. Zhang, X. Xu, H. Wang, J. Peng, D. Zhang, and K. Huang, “Enhanc-
[12] X. Hu, P. Mu, B. Wang, and Z. Li, “On the secrecy rate maximization ing the physical layer security of uplink non-orthogonal multiple access
with uncoordinated cooperative jamming by single-antenna helpers,” in cellular Internet of Things,” IEEE Access, vol. 6, pp. 58405–58417,
IEEE Trans. Veh. Technol., vol. 66, no. 5, pp. 4457–4462, May 2017. 2018.
[13] N. Zhao, Y. Cao, F. R. Yu, Y. Chen, M. Jin, and V. C. M. Leung, “Arti- [35] K. Jiang, T. Jing, F. Zhang, Y. Huo, and Z. Li, “ZF-SIC based individual
ficial noise assisted secure interference networks with wireless power secrecy in SIMO multiple access wiretap channel,” IEEE Access, vol. 5,
transfer,” IEEE Trans. Wireless Commun., vol. 67, no. 2, pp. 1087–1098, pp. 7244–7253, 2017.
Feb. 2018. [36] K. Jiang, T. Jing, Y. Huo, F. Zhang, and Z. Li, “SIC-based secrecy
[14] S. Yan, N. Yang, I. Land, R. Malaney, and J. Yuan, “Three artificial- performance in uplink NOMA multi-eavesdropper wiretap channels,”
noise-aided secure transmission schemes in wiretap channels,” IEEE IEEE Access, vol. 6, pp. 19664–19680, 2018.
Trans. Veh. Technol., vol. 67, no. 4, pp. 3669–3673, Apr. 2018. [37] H. A. David and H. N. Nagaraja, Order Statistics, 3rd ed. Hoboken, NJ,
USA: Wiley, 2003.
[15] L. Lv, F. Zhou, J. Chen, and N. Al-Dhahir, “Secure cooperative com-
[38] A. M. Hunter, J. G. Andrews, and S. Weber, “Transmission capacity of
munications with an untrusted relay: A NOMA-inspired jamming and
ad hoc networks with spatial diversity,” IEEE Trans. Wireless Commun.,
relaying approach,” IEEE Trans. Inf. Forensics Security, vol. 14, no. 12,
vol. 7, no. 12, pp. 5058–5071, Dec. 2008.
pp. 3191–3205, Dec. 2019.
[39] H. Gao, P. J. Smith, and M. V. Clark, “Theoretical reliability of MMSE
[16] W. Wang et al., “Energy-constrained UAV-assisted secure communica-
linear diversity combining in Rayleigh-fading additive interference chan-
tions with position optimization and cooperative jamming,” IEEE Trans.
nels,” IEEE Trans. Commun., vol. 46, no. 5, pp. 666–672, May 1998.
Commun., vol. 68, no. 7, pp. 4476–4489, Jul. 2020.
[40] I. S. Gradshteyn, I. M. Ryzhik, A. Jeffrey, D. Zwillinger, and S. Tech-
[17] M. Haenggi, J. G. Andrews, F. Baccelli, O. Dousse, and
nica, Table of Integrals, Series, and Products, 7th ed. New York, NY,
M. Franceschetti, “Stochastic geometry and random graphs for the
USA: Academic, 2007.
analysis and design of wireless networks,” IEEE J. Sel. Areas Commun.,
[41] S. N. Chiu, D. Stoyan, W. S. Kendall, and J. Mecke, Stochastic Geometry
vol. 27, no. 7, pp. 1029–1046, Sep. 2009.
and its Applications, 3rd ed. New York, NY, USA: Wiley, 2013.
[18] X. Zhou, R. K. Ganti, J. G. Andrews, and A. Hjørungnes, “On the [42] S. Boyd and L. Vandenberghe, Convex Optimization. Cambridge, U.K.:
throughput cost of physical layer security in decentralized wireless net- Cambridge Univ. Press, 2004.
works,” IEEE Trans. Wireless Commun., vol. 10, no. 8, pp. 2764–2775,
Aug. 2011.
[19] X. Zhang, X. Zhou, and M. R. McKay, “Enhancing secrecy with multi-
antenna transmission in wireless ad hoc networks,” IEEE Trans. Inf.
Forensics Security, vol. 8, no. 11, pp. 1802–1814, Nov. 2013. Tong-Xing Zheng (Member, IEEE) received the
[20] T.-X. Zheng, H.-M. Wang, Q. Yang, and M. H. Lee, “Safeguarding B.S. degree in information engineering and the Ph.D.
decentralized wireless networks using full-duplex jamming receivers,” degree in information and communications engineer-
IEEE Trans. Wireless Commun., vol. 16, no. 1, pp. 278–292, Jan. 2017. ing from Xi’an Jiaotong University, Xi’an, China,
[21] T.-X. Zheng, H.-M. Wang, J. Yuan, Z. Han, and M. H. Lee, “Physical in 2010 and 2016, respectively. From 2017 to 2018,
layer security in wireless ad hoc networks under a hybrid full-/half- he was a Visiting Scholar with the School of Elec-
duplex receiver deployment strategy,” IEEE Trans. Wireless Commun., trical Engineering and Telecommunications, Univer-
vol. 16, no. 6, pp. 3827–3839, Jun. 2017. sity of New South Wales, Sydney, Australia. He is
[22] H. Wang, X. Zhou, and M. C. Reed, “Physical layer security in cellu- currently an Associate Professor with Xi’an Jiao-
lar networks: A stochastic geometry approach,” IEEE Trans. Wireless tong University. He has coauthored the book Phys-
Commun., vol. 12, no. 6, pp. 2776–2787, Jun. 2013. ical Layer Security in Random Cellular Networks
[23] G. Geraci, H. S. Dhillon, J. G. Andrews, J. Yuan, and I. B. Collings, (Springer, 2016), one book chapter, and has authored or coauthored over
“Physical layer security in downlink multi-antenna cellular networks,” 60 papers in telecommunications journals and conference proceedings. His
IEEE Trans. Commun., vol. 62, no. 6, pp. 2006–2021, Jun. 2014. current research interests include 5G&6G wireless networks and key technolo-
[24] H.-M. Wang, T.-X. Zheng, J. Yuan, D. Towsley, and M. H. Lee, “Phys- gies, physical layer security, and covert communications. He was a recipient of
ical layer security in heterogeneous cellular networks,” IEEE Trans. the Excellent Doctoral Dissertation Award of Shaanxi Province in 2019 and
Commun., vol. 64, no. 3, pp. 1204–1219, Mar. 2016. the First Prize of Science and Technology Award in Higher Institution of
[25] C. Wang, Z. Li, X.-G. Xia, J. Shi, J. Si, and Y. Zou, “Physical Shaanxi Province in 2019. He was honored as an Exemplary Reviewer of
layer security enhancement using artificial noise in cellular vehicle- IEEE T RANSACTIONS ON C OMMUNICATIONS in 2017, 2018, and 2021,
to-everything (C-V2X) networks,” IEEE Trans. Veh. Technol., vol. 69, respectively. He was a Leading Guest Editor of Frontiers in Communications
no. 12, pp. 15253–15268, Dec. 2020. and Networks for the Special Issue on Covert Communications for Next-
[26] H.-M. Wang and T.-X. Zheng, Physical Layer Security in Random Generation Wireless Networks in 2021 and a Guest Editor of Wireless
Cellular Networks. Singapore: Springer, Oct. 2016. Communications and Mobile Computing for the Special Issue on Physical
[27] S. Marano, V. Matta, and P. K. Willett, “Distributed detection with Layer Security for the Internet of Things in 2018. He is currently serving as
censoring sensors under physical layer secrecy,” IEEE Trans. Signal an Associate Editor of IET Electronic Letters and a Review Editor of Frontiers
Process., vol. 57, no. 5, pp. 1976–1986, May 2009. in Communications and Networks.
Authorized licensed use limited to: Motilal Nehru National Institute of Technology. Downloaded on November 08,2022 at 09:40:37 UTC from IEEE Xplore. Restrictions apply.
ZHENG et al.: PHYSICAL LAYER SECURITY IN LARGE-SCALE RANDOM MULTIPLE ACCESS WSNs 4051
Xin Chen received the B.S. degree in information Kai-Kit Wong (Fellow, IEEE) received the B.Eng.,
engineering from Xi’an Jiaotong University, Xi’an, M.Phil., and Ph.D. degrees in electrical and elec-
China, in 2021, where she is currently pursuing the tronic engineering from the Hong Kong University
M.S. degree. Her current research interests include of Science and Technology, Hong Kong, in 1996,
wireless physical layer security, covert communica- 1998, and 2001, respectively. After graduation,
tions, intelligent reflecting surface, and integrated he took up academic and research positions at The
sensing and communications. University of Hong Kong; Lucent Technologies;
Bell-Labs, Holmdel; the Smart Antennas Research
Group, Stanford University; and the University of
Hull, U.K. He is currently the Chair of wireless
communications with the Department of Electronic
and Electrical Engineering, University College London, U.K. His current
research centers around 5G and beyond mobile communications. He is a
fellow of IET and also on the editorial board of several international journals.
He was a co-recipient of the 2013 IEEE S IGNAL P ROCESSING L ETTERS
Best Paper Award and the 2000 IEEE VTS Japan Chapter Award at the IEEE
Vehicular Technology Conference, Japan, in 2000. He also received a few
other international best paper awards. He has been the Editor-in-Chief of
IEEE W IRELESS C OMMUNICATIONS L ETTERS since 2020.
Authorized licensed use limited to: Motilal Nehru National Institute of Technology. Downloaded on November 08,2022 at 09:40:37 UTC from IEEE Xplore. Restrictions apply.