On Achieving High PHY-Layer Security of D2D-Enabled Heterogeneous Networks

Chun Hung Liu, Di Chun Liang, Rung Hung Gau

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

This paper aims to study how to achieve high transmission security in the physical (PHY) layer of a multi-tier heterogeneous network (HetNet) through a simple device-to- device (D2D) enabling scheme. For the HetNet, we propose a simple D2D-enabling scheme with low complexity for users to opportunistically enable their D2D mode and become either D2D or cellular users by exploiting the diversity of all user association signals from all base stations (BSs). To evaluate whether the proposed D2D enabling scheme improves the PHY-layer security of the HetNet, the secrecy outage probability of the HetNet is defined and analyzed from two different perspectives of BSs and users. We define the BS- centric and user-centric security outage events and derive the explicit lower bound on their probability when the proposed D2D enabling scheme is adopted. Our analytical and numerical results not only show that the proposed D2D-enabling scheme can achieve high PHY-layer security but also reveal how densely the BSs should be deployed in the HetNet in order to achieve the high PHY-layer security from the perspectives of BSs and users.

Original languageEnglish
Title of host publication2019 IEEE 90th Vehicular Technology Conference, VTC 2019 Fall - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781728112206
DOIs
StatePublished - Sep 2019
Event90th IEEE Vehicular Technology Conference, VTC 2019 Fall - Honolulu, United States
Duration: 22 Sep 201925 Sep 2019

Publication series

NameIEEE Vehicular Technology Conference
Volume2019-September
ISSN (Print)1550-2252

Conference

Conference90th IEEE Vehicular Technology Conference, VTC 2019 Fall
Country/TerritoryUnited States
CityHonolulu
Period22/09/1925/09/19

Fingerprint

Dive into the research topics of 'On Achieving High PHY-Layer Security of D2D-Enabled Heterogeneous Networks'. Together they form a unique fingerprint.

Cite this