Physical Layer Security Enhancement Using Artificial Noise in Cellular Vehicle-to-Everything (C-V2X) Networks

التفاصيل البيبلوغرافية
العنوان: Physical Layer Security Enhancement Using Artificial Noise in Cellular Vehicle-to-Everything (C-V2X) Networks
المؤلفون: Yulong Zou, Chao Wang, Jiangbo Si, Xiang-Gen Xia, Jia Shi, Zan Li
المصدر: IEEE Transactions on Vehicular Technology. 69:15253-15268
بيانات النشر: Institute of Electrical and Electronics Engineers (IEEE), 2020.
سنة النشر: 2020
مصطلحات موضوعية: FOS: Computer and information sciences, Computer Networks and Communications, Computer science, business.industry, Computer Science - Information Theory, Information Theory (cs.IT), Physical layer, Aerospace Engineering, 020302 automobile design & engineering, Throughput, 02 engineering and technology, Telecommunications network, Cellular communication, Base station, 0203 mechanical engineering, Robustness (computer science), Automotive Engineering, Artificial noise, Electrical and Electronic Engineering, business, Secure transmission, Computer network
الوصف: The secure transmission of confidential information in cellular vehicle-to-everything (C-V2X) communication networks is vitally important for user's personal safety. However, for C-V2X, there have not been many studies on the physical layer security (PLS). Since artificial noise (AN) and secure beamforming are popular PLS techniques for cellular communications, in this paper we investigate the potential of these PLS techniques for enhancing the security of C-V2X networks. In particular, leveraging stochastic geometry, we study the PLS of an AN assisted C-V2X network, where the locations of legitimate vehicular nodes, malicious vehicular nodes and road side units (RSUs) are modeled by Cox processes driven by a common Poisson line process (PLP), and the locations of cellular base stations (BSs) are modeled by a two-dimensional (2D) Poisson point process (PPP). Based on the maximum signal-to-interference-ratio (SIR) association scheme, we calculate the coverage probability of the network. We also derive bounds on the secrecy probability, which are validated by simulation results. Moreover, we obtain an analytical result of the effective secrecy throughput for characterizing the reliability and security of wiretap channels. Simulation results are given to validate the analytical result, and provide interesting insights into the impact of network parameters on the achievable secrecy performance. Simulation results show that a larger array antenna can provide a better robustness of the secure transmission strategy, and the optimal power allocation ratio between confidential information and AN remains almost unchanged for different numbers of antennas.
تدمد: 1939-9359
0018-9545
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::18c163a81ce44fcc32dc2eb893497af8
https://doi.org/10.1109/tvt.2020.3037899
حقوق: OPEN
رقم الأكسشن: edsair.doi.dedup.....18c163a81ce44fcc32dc2eb893497af8
قاعدة البيانات: OpenAIRE