Secrecy outage analysis for downlink transmissions in the presence of randomly located eavesdroppers

We analyze the secrecy outage probability in the downlink for wireless networks with spatially (Poisson) distributed eavesdroppers (EDs) under the assumption that the base station employs transmit antenna selection (TAS) to enhance secrecy performance. We compare the cases where the receiving user e...

Full description

Bibliographic Details
Main Authors: Coon, J, Chen, G, Di Renzo, M
Format: Journal article
Published: Institute of Electrical and Electronics Engineers 2017
_version_ 1826261609196027904
author Coon, J
Chen, G
Di Renzo, M
author_facet Coon, J
Chen, G
Di Renzo, M
author_sort Coon, J
collection OXFORD
description We analyze the secrecy outage probability in the downlink for wireless networks with spatially (Poisson) distributed eavesdroppers (EDs) under the assumption that the base station employs transmit antenna selection (TAS) to enhance secrecy performance. We compare the cases where the receiving user equipment (UE) operates in half-duplex (HD) mode and full-duplex (FD) mode. In the latter case, the UE simultaneously receives the intended downlink message and transmits a jamming signal to strengthen secrecy. We investigate two models of (semi)passive eavesdropping: (1) EDs act independently and (2) EDs collude to intercept the transmitted message. For both of these models, we obtain expressions for the secrecy outage probability in the downlink for HD and FD UE operation. The expressions for HD systems have very accurate approximate or exact forms in terms of elementary and/or special functions for all path loss exponents. Those related to the FD systems have exact integral forms for general path loss exponents, while exact closed forms are given for specific exponents. A closed-form approximation is also derived for the FD case with colluding EDs. The resulting analysis shows that the reduction in the secrecy outage probability is logarithmic in the number of antennas used for TAS and identifies conditions under which HD operation should be used instead of FD jamming at the UE. These performance trends and exact relations between system parameters can be used to develop adaptive power allocation and duplex operation methods in practice. Examples of such techniques are alluded to herein.
first_indexed 2024-03-06T19:24:04Z
format Journal article
id oxford-uuid:1b1e27a4-1645-40d1-87f8-277728f55167
institution University of Oxford
last_indexed 2024-03-06T19:24:04Z
publishDate 2017
publisher Institute of Electrical and Electronics Engineers
record_format dspace
spelling oxford-uuid:1b1e27a4-1645-40d1-87f8-277728f551672022-03-26T10:58:34ZSecrecy outage analysis for downlink transmissions in the presence of randomly located eavesdroppersJournal articlehttp://purl.org/coar/resource_type/c_dcae04bcuuid:1b1e27a4-1645-40d1-87f8-277728f55167Symplectic Elements at OxfordInstitute of Electrical and Electronics Engineers2017Coon, JChen, GDi Renzo, MWe analyze the secrecy outage probability in the downlink for wireless networks with spatially (Poisson) distributed eavesdroppers (EDs) under the assumption that the base station employs transmit antenna selection (TAS) to enhance secrecy performance. We compare the cases where the receiving user equipment (UE) operates in half-duplex (HD) mode and full-duplex (FD) mode. In the latter case, the UE simultaneously receives the intended downlink message and transmits a jamming signal to strengthen secrecy. We investigate two models of (semi)passive eavesdropping: (1) EDs act independently and (2) EDs collude to intercept the transmitted message. For both of these models, we obtain expressions for the secrecy outage probability in the downlink for HD and FD UE operation. The expressions for HD systems have very accurate approximate or exact forms in terms of elementary and/or special functions for all path loss exponents. Those related to the FD systems have exact integral forms for general path loss exponents, while exact closed forms are given for specific exponents. A closed-form approximation is also derived for the FD case with colluding EDs. The resulting analysis shows that the reduction in the secrecy outage probability is logarithmic in the number of antennas used for TAS and identifies conditions under which HD operation should be used instead of FD jamming at the UE. These performance trends and exact relations between system parameters can be used to develop adaptive power allocation and duplex operation methods in practice. Examples of such techniques are alluded to herein.
spellingShingle Coon, J
Chen, G
Di Renzo, M
Secrecy outage analysis for downlink transmissions in the presence of randomly located eavesdroppers
title Secrecy outage analysis for downlink transmissions in the presence of randomly located eavesdroppers
title_full Secrecy outage analysis for downlink transmissions in the presence of randomly located eavesdroppers
title_fullStr Secrecy outage analysis for downlink transmissions in the presence of randomly located eavesdroppers
title_full_unstemmed Secrecy outage analysis for downlink transmissions in the presence of randomly located eavesdroppers
title_short Secrecy outage analysis for downlink transmissions in the presence of randomly located eavesdroppers
title_sort secrecy outage analysis for downlink transmissions in the presence of randomly located eavesdroppers
work_keys_str_mv AT coonj secrecyoutageanalysisfordownlinktransmissionsinthepresenceofrandomlylocatedeavesdroppers
AT cheng secrecyoutageanalysisfordownlinktransmissionsinthepresenceofrandomlylocatedeavesdroppers
AT direnzom secrecyoutageanalysisfordownlinktransmissionsinthepresenceofrandomlylocatedeavesdroppers