论文标题
大规模随机多访问无线传感器网络中的物理层安全性:一种随机几何方法
Physical layer security in large-scale random multiple access wireless sensor networks: a stochastic geometry approach
论文作者
论文摘要
本文研究了具有随机多访问的大规模WSN的物理层安全性,在该网络中,每个融合中心随机安排许多传感器,以上传其感应的数据,但要偷听随机分布的窃听器。我们提出了一个不协调的随机干扰方案,其中那些计划外的传感器发出具有一定可能性击败窃听者的障碍信号。借助随机几何理论和顺序统计,我们为连接中断概率和保密概率分别得出分析表达式,分别表征传输可靠性和保密性。根据获得的分析结果,我们制定了一个优化问题,以考虑到每个计划的传感器的窃听代码速率的联合设计,以及无需支付的传感器的窃听率,以最大程度地提高限制性和保密性约束。我们提供最佳和低复杂性子优越算法来解决上述问题,并进一步揭示了最佳参数的各种属性,这些属性可用于指导实践设计。特别是,我们证明了所提出的随机干扰方案对改善总和保密吞吐量是有益的,并且最佳的干扰概率是保密和吞吐量之间权衡取舍的结果。我们还表明,在面对严格的可靠性约束或宽松的秘密约束时,子最佳方案的吞吐量性能接近最佳方案。
This paper investigates physical layer security for a large-scale WSN with random multiple access, where each fusion center in the network randomly schedules a number of sensors to upload their sensed data subject to the overhearing of randomly distributed eavesdroppers. We propose an uncoordinated random jamming scheme in which those unscheduled sensors send jamming signals with a certain probability to defeat the eavesdroppers. With the aid of stochastic geometry theory and order statistics, we derive analytical expressions for the connection outage probability and secrecy outage probability to characterize transmission reliability and secrecy, respectively. Based on the obtained analytical results, we formulate an optimization problem for maximizing the sum secrecy throughput subject to both reliability and secrecy constraints, considering a joint design of the wiretap code rates for each scheduled sensor and the jamming probability for the unscheduled sensors. We provide both optimal and low-complexity sub-optimal algorithms to tackle the above problem, and further reveal various properties on the optimal parameters which are useful to guide practical designs. In particular, we demonstrate that the proposed random jamming scheme is beneficial for improving the sum secrecy throughput, and the optimal jamming probability is the result of trade-off between secrecy and throughput. We also show that the throughput performance of the sub-optimal scheme approaches that of the optimal one when facing a stringent reliability constraint or a loose secrecy constraint.