TY - GEN
T1 - Novel QoS-Aware Physical Layer Security Analysis Considering Random Inter-Node Distances
AU - Ahuja, Bhawna
AU - Mishra, Deepak
AU - Bose, Ranjan
N1 - Publisher Copyright:
© 2019 IEEE.
PY - 2019/5
Y1 - 2019/5
N2 - Physical layer security (PLS) in wireless communication has gained recent attention due to the emergence of new technological breakthroughs in this space. Since the internode distances have been noted to play a key role in the desired security performance, we propose a novel quality-of-service-aware PLS model that incorporates the random spatial deployment of the legitimate users and a potential attacker. This proposed model considers practical constraints like maximum separation between legitimate users and eavesdropping capability of attacker. In this regard, a novel concept of eavesdropping zone is also introduced. Eventually, closed-form expressions are derived for secrecy outage probability using the probabilistic inter-node distance distributions between the legitimate users and attacker to shed key analytical insights like optimal parameter designing to achieve a desired secrecy performance. Lastly, specific simulation results, presented to validate the analytical claims and provide key secured system designing perspectives, corroborate the potential of the proposed framework for more accurately characterizing the desired PLS performance from both the legitimate users' and attackers point-of-view.
AB - Physical layer security (PLS) in wireless communication has gained recent attention due to the emergence of new technological breakthroughs in this space. Since the internode distances have been noted to play a key role in the desired security performance, we propose a novel quality-of-service-aware PLS model that incorporates the random spatial deployment of the legitimate users and a potential attacker. This proposed model considers practical constraints like maximum separation between legitimate users and eavesdropping capability of attacker. In this regard, a novel concept of eavesdropping zone is also introduced. Eventually, closed-form expressions are derived for secrecy outage probability using the probabilistic inter-node distance distributions between the legitimate users and attacker to shed key analytical insights like optimal parameter designing to achieve a desired secrecy performance. Lastly, specific simulation results, presented to validate the analytical claims and provide key secured system designing perspectives, corroborate the potential of the proposed framework for more accurately characterizing the desired PLS performance from both the legitimate users' and attackers point-of-view.
UR - http://www.scopus.com/inward/record.url?scp=85070224041&partnerID=8YFLogxK
U2 - 10.1109/ICC.2019.8761295
DO - 10.1109/ICC.2019.8761295
M3 - Conference contribution
AN - SCOPUS:85070224041
T3 - IEEE International Conference on Communications
BT - 2019 IEEE International Conference on Communications, ICC 2019 - Proceedings
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2019 IEEE International Conference on Communications, ICC 2019
Y2 - 20 May 2019 through 24 May 2019
ER -