Impact of Mobility on Physical Layer Security over Wireless Fading Channels

Jie Tang,Monireh Dabaghchian,Kai Zeng,Hong Wen
DOI: https://doi.org/10.1109/twc.2018.2868935
IF: 10.4
2018-01-01
IEEE Transactions on Wireless Communications
Abstract:Wireless physical layer security has attracted great attention in recent years. Although mobility is an intrinsic property of wireless networks, most of the existing works only consider static scenarios and the impact of mobility on wireless physical layer security is not well understood. To fill this gap, in this paper, we investigate physical layer security in the scenario with a random mobile receiver under Rayleigh fading channel. We consider a common scenario where a base station or access point communicates to a random mobile receiver with a passive eavesdropper in a circular region. The secrecy performances under three typical random mobility models are studied: random waypoint model (RWP); random direction model (RD); and border move model. We investigate the secrecy characteristics of the mobile user under steady-state running and provide a general analytical framework for computing the ergodic secrecy capacity. We derive tractable closed-form expressions of positive secrecy capacity probability and secrecy outage probability for RWP and RD mobility users, respectively. By comparing the secrecy performance of mobility with static case, we find that the RWP mobile user can achieve much better secrecy performance than the others. We then investigate the secrecy performance of RWP mobile user with pause time. Furthermore, the two types of secrecy improvement strategies for random mobile users are proposed. In the first strategy, a transmit subcell for RWP users is bounded. We allow the transmitter to communicate with the mobile user only when he is moving within the subcell. In the other strategy, the transmitter is turned on only when the evaluated secrecy performance reaches to a required level. We strike a good trade-off between the secrecy improvements and transmit outage probability. Extensive simulation results validate our theoretical analysis. Finally, we extend our framework to other realistic scenarios, including nodes moving in other shapes of areas, and multiple non-cooperative and cooperative eavesdroppers.
What problem does this paper attempt to address?