1. Introduction
With the anticipated arrival of sixth generation (6G) technology, a highly intelligent society and lifestyle are on the horizon, driven by extensive wireless information exchanges between massive devices including sensors, Internet of Things (IoT) devices, mobile phones, and vehicles [1]. This proliferation of devices is expected to accelerate exponentially [2]. In particular, data sharing between legitimate yet unspecified neighboring nodes not only facilitates the detection of nearby devices [3,4,5] but also serves as a foundation for advanced proximity-based services. These services encompass a wide range of emerging applications, including geographic content sharing between nearby users or IoT devices [6], user- or device-aware services using Bluetooth low energy (BLE) beacons [7], social community detection in mobile social networks [8], and dissemination of driving safety information in vehicle-to-vehicle (V2V) networks [9,10]. This process, termed “wireless mutual broadcast (WMB)” [11] in this study, typically begins by broadcasting information to unspecified devices and gathering data from those in close proximity. However, this WMB is inherently vulnerable to eavesdropping because a transmitter ingenuously disseminates its broadcast message (BM) to unknown nodes. On the other hand, physical layer security (PLS) ensures nonzero secrecy capacity by maintaining the link quality of eavesdroppers below that of legitimate nodes [12], gaining significant attention as an effective alternative or complement to traditional cryptographic methods [13,14]. This approach is particularly useful in large-scale distributed networks where managing and sharing security keys may be challenging [14,15]. Recently, its applications have been being extended to various networks, including satellite–terrestrial integrated networks [16], simultaneous wireless information and power transfer networks [17], and covert mmWave communication networks [18]. From this perspective, this paper conducts an analytical exploration of the spatial PLS performances of the WMB.
In PLS, for a nonzero secrecy capacity [12], the connection quality for unauthorized eavesdroppers (Eves) needs to be kept below the performance of legitimate receivers, and this strategy may require knowledge about nearby legitimate nodes [13,14]. However, a WMB operation often commences without such prior information, and this poses significant challenges in integrating WMB with PLS strategies [11]. The work of [11] investigated the PLS performances of a random-access-based WMB (RA-WMB) network with half-duplex (HD) nodes, where nodes probabilistically alternate between transmitting and receiving broadcast messages (BMs). Although the work of [11] attempted to quantify the contribution of PLS on RA-WMB, it is still questionable whether or not the PLS performance of WMB can be further improved, and if so, how it can be achieved. The works in [19,20,21,22,23] demonstrated that full-duplex (FD) jamming can contribute to enhancing network-wide PLS performance depending on the self-interference cancellation (SIC) capability. This benefit motivates us to investigate the potential of SIC and to examine mediating HD and FD, in terms of enhancing the PLS performance of WMB.
1.1. Related Works
The data broadcast between neighbor nodes, i.e., WMB, supports a wide range of applications, including ambient data sharing [1,6], mobile social networking [8], intelligent transportation [9,10,24], and emergency communications [25,26]. Like any wireless network with performance limited by mutual interference [27], interference in WMB networks similarly impairs system performance. Stochastic geometry facilitates the mathematical tractability of wireless network performances through stochastically modeling the spatial radio interaction among devices [27], and several literatures have quantified and improved network-wide performances of WMB [24,28,29,30,31,32,33,34,35,36], under stochastic geometry frameworks. The works in [28,29] mathematically quantified the average number of successfully discovered nodes, and they proposed the design principles for improving performance. The peer discovery is a representative example of WMB when a BM is used for proximity awareness. The work in [31] studied the resource allocation method to mitigate interference through geo-location-based access in V2V WMB networks, and it demonstrated the performance gain through modeling vehicular networks based on stochastic geometry. The study on WMB has been further extended in conjunction with various issues including low power design [32], full duplex [33,34], and energy harvesting [35], in terms of network-wide performances. The works in [33,34] demonstrated that SIC significantly affects RA-WMB performance depending on the level of residual self-interference (RSI). In particular, the work of [34] showed that adjusting the proportions of simultaneous transceiving nodes and receiving-only nodes may improve RA-WMB performance compared to a scenario where all nodes are simultaneously transceiving with SIC, especially at high RSI levels. Furthermore, the work of [36] analytically examined the use of device-to-device (D2D) multicast for emergency information dissemination of a flying central station. Furthermore, the work of [24] analytically designed the broadcast period of vehicles in cooperative vehicle systems where vehicles periodically broadcast such information as position and speed via random access, using stochastic geometry theory. However, all of those works did not deal with the PLS performances of WMB.
The PLS offers advantages in the context of wireless networks by leveraging the inherent characteristics of physical medium [13], thus providing security that is inherently robust against eavesdropping without the complexities and vulnerabilities associated with key management and algorithmic encryption in conventional cryptographic methods. This makes PLS particularly suitable for dynamic and resource-constrained environments, such as wireless sensor, IoT, V2V, and D2D networks [14,15]. In order to confound Eves more actively, a legitimate transmitter and friendly jammer send artificial noise (AN) for impairing Eves’ link [14,15,37]. However, AN may be rather harmful to other nearby legitimate nodes in wireless networks because jamming signals raise interference. In this regard, through applying stochastic geometry theory, network-wide secrecy performances have been analytically quantified in various scenarios, e.g., the millimeter wave ad hoc network [38], three dimensional IoT networks [39], covert communication in D2D networks [40], vehicular networks [41], and uncoordinated random jamming in wireless sensor networks [42]. Further, several studies investigated the effect of an FD jamming approach, where FD nodes receive informative data from their transmitter while simultaneously sending AN for confounding Eves [19,20], in terms of strengthening network-wide secrecy performances in wireless distributed networks [21,22], under stochastic geometry frameworks. In particular, the work of [22] demonstrated that FD jamming impacts PLS performance depending on RSI level and proposed a switchable FD/HD mode. Hence, they concentrated on enhancing security by impairing the connections to these Eves while preserving the quality of the link to an intended receiver. In contrast, the WMB studied in this paper experiences inevitable performance degradation due to jamming, because both receivers and eavesdroppers remain unknown. This lack of information significantly makes the PLS in WMB challenging. The work of [11] analytically investigated the spatial secrecy performance of RA-WMB networks and demonstrated that simply adjusting a fraction of transmitters, by controlling transmission probability (TxPr), improved PLS performance. However, it did not consider FD operations with SIC.
1.2. Contributions and Organization
This paper investigates the performance and design principles of the secure RA-WMB that uses SIC for enhancing PLS performance. In particular, this study analytically quantifies the impact of SIC, through adjusting the proportion of legitimate HD receiving (i.e., not using SIC) and FD transceiving (i.e., using SIC) nodes, and this mixture of HD receiving and FD transceiving is referred to as the hybrid duplex (HBD). Even though a more advanced access method, such as carrier sense multiple access (CSMA), can further improve the performance, for mathematical tractability of network-wide PLS performance, this paper focuses on exploring the PLS of the HBD RA-WMB, and more complex WMB issues will remain as future works. This secure RA-WMB can serve as a baseline for evaluating the performance of more advanced secure WMB systems. The key contributions of this paper are highlighted as follows:
Comprehensive analysis of secrecy performance for HBD RA-WMB: This study analytically expresses the PLS performance of the HBD RA-WMB and quantitatively elucidates its inherent properties regarding the spatial radio interaction among legitimate FD transceving and HD receiving nodes, Eves, and friendly jammers. In particular, the analysis and numerical results demonstrate that the significant differences in the secrecy performance between secure HBD RA-WMB and conventional approaches, such as nonsecure RA-WMB [28,29,34] and secure HD RA-WMB [11]. These conventional methods can be regarded as special cases within the scope of the comprehensive results investigated herein.
Proposition of design principles for secure HBD RA-WMB: This study proposes the design principles of the key operation parameters including TxPr and friendly jammer density, in terms of maximizing the secrecy performance. In particular, the TxPr determines the operation method of nodes, such as FD transceving and HD receiving, through comprehensively considering the imperfections of SIC and beneficial and harmful effects of interference, with the aim of enhancing the secrecy performance of WMB. The analytical expression of the TxPr in secure HBD operation design explicitly distinguishes itself from the conventional non-secure RA-WMB design. In contrast, it is demonstrated that friendly jammers are not quite beneficial.
Quantification of required SIC capability: This study endeavors to quantitatively examine the RSI condition in imperfect SIC that are required for FD transceiving to significantly enhance secrecy performance, through identifying the conditions for the FD optimality and superiority. FD optimality denotes that it is optimal for all nodes to work in FD, while FD superiority indicates that FD outperforms HD in terms of secrecy performance. The FD optimality and superiority are addressed in terms of Eves density as well as RSI amount and wireless channels. It is remarkably interesting that these conditions increasingly become loose as Eves becomes dense.
Based on the comprehensive findings presented in this paper, Table 1 provides a concise summary and comparison of the design principles of TxPr, which determines the operations of WMB nodes for various RSI levels ranging from 0 to ∞, between secure and nonsecure RA-WMB approaches. Note that the HD performance in [11] is equivalent to the HBD performance with an infinite RSI level in the model analyzed in this paper. In this table, and denote the spatial densities of legitimate nodes and Eves, respectively, and and denote the optimal proportion of legitimate nodes transceiving with SIC (i.e., TxPr) and the amount of RSI, respectively. (Hence, the proportion of legitimate nodes receiving without SIC becomes . Furthermore, the properties of are inferred from its suboptimal values and numerical results.) Further, and denote the values of required for the FD optimality and superiority, respectively. The notations are described in Table 2, which also lists the parameter values used for the numerical results in Section 6.
The remainder of this paper is organized as follows. Section 2 describes the system model for the HBD RA-WMB and defines the secrecy performance metric. Section 3 analytically quantifies the secrecy performance, which unveils the inherent properties of HBD RA-WMB and the impact of AN. Section 4 proposes the design method of the HBD RA-WMB in terms of improving the secrecy performance. Section 5 further elaborates on the condition for FD operation as a special yet typical duplex scenario. Then, Section 6 discusses the numerical results, and Section 7 concludes the paper.
Notations: denotes the expectation of random variable X and represents the probability of event E. is an indicator function whose value is 1 if while becoming 0 otherwise.
2. Secrecy Performance Models for Hybrid Duplex RA-WMB Networks
This section describes the HBD RA-WMB models where each legitimate node independently chooses either HD receiving or FD transceiving with a designed probability and defines the network-wide secrecy performance.
2.1. System Model
This paper considers RA-WMB networks, where legitimate nodes broadcast and gather their BMs, while Eves attempt to overhear those legitimate BMs. This study assumes that Eves try to decode BMs without any interference cancellation and any collusion among Eves, and more advanced operations by Eves will remain as future works. In order to safeguard BMs against Eves, the RA-WMB network employs Wyner’s wiretap encoding [12]. This method sets the rates for a transmitted codeword and confidential BM at and , respectively, with the difference serving as the rate redundancy to ensure secrecy against Eves. Perfect secrecy is achieved if exceeds the capacity of the most capable Eve’s link. Given that BMs must be decodable by nearby unspecified legitimate nodes, the data rate for BMs is usually fixed, making it feasible to establish predetermined values for and . As a result, a node can securely receive a BM provided that it avoids the following two types of outages [11,22]: (i) a connection outage, where a legitimate receiver’s capacity drops below , and (ii) a secrecy outage, where the capacity of the most malicious Eve exceeds . Further, the network may consider deploying jamming nodes that transmit artificial noise (AN) to degrade the link quality for Eves. However, the AN transmission of these friendly jammers affects all nodes because they lack information about legitimate receivers. As a result, the AN broadcast may have a negative effect on legitimate nodes as well as Eves. In order to construct an analytically tractable network model, it is assumed that legitimate nodes and Eves are spatially distributed according to homogeneous Poisson point processes (HPPPs) with density and , respectively.
Figure 1 presents the operation model for the secure HBD RA-WMB. Each legitimate node either receives BMs from other nodes without SIC, or simultaneously transmits its own BM while receiving BMs from other nodes using SIC. The model assumes that all nodes are synchronized for this operation [28,29,33,35]. In this network, a legitimate node works in either of the following three modes:
(i). RxOnly (denoted by ): A node only gathers BMs broadcast by other legitimate nodes and it does not transmit any signal.
(ii). TxRx (denoted by ): A node transmits the BM that it generates as an information source, using transmit power p, and simultaneously attempts to decode BMs generated from other nodes through canceling the self-interference from its own transmission.
(iii). JamRx (denoted by ): A part of legitimate nodes transmit AN with transmit power in order to confound unknown Eves, and they also attempt to receive BMs from other legitimate nodes employing SIC, similar to the TxRx mode.
Each node determines its operation mode in a probabilistic manner, that is, a legitimate node works in one mode of the RxOnly, TxRx, and JamRx with probability of , , and . In particular, denotes the TxPr, which is a primary design parameter for the RA-WMB [11,28,29,34]. Note that and are constrained by , , and . The TxRx and JamRx employ SIC, and FD operation can be readily modeled by setting to . In particular, this paper also refers to the TxRx mode as FD transceiving. Further, the RxOnly mode, also known as HD receiving, does not utilize SIC. Original HD operation includes BM transmission without SIC in addition to RxOnly operation. Although these three operation modes for HBD do not exactly represent these HD operations due to the absence of a transmission-only mode, HBD can simulate HD performance when RSI is sufficiently large to fail to decode any BM in the TxRx and JamRx modes; thus, the HD results in [11] can be regarded as a specific instance of this study characterized by an excessively large RSI. As a result, the HBD with these three modes provides a comprehensive model of the duplexing methods, spanning from HD and FD to a pure HBD configuration where HD receiving and FD transceiving nodes coexist.
In the HBD RA-WMB networks, legitimate nodes in the JamRx mode are selected from all legitimate nodes and referred to as internal jammers. The network regulates the proportion of these internal jammers through adjusting . Additionally, the system may employ external jammers, which do not possess any BM and solely transmit AN. External jammers are expected to be beneficial when interference only from legitimate nodes is insufficient to prevent Eves from overhearing BMs. It is assumed that these external jammers are also distributed according to an HPPP with density and continuously send AN with transmit power all the time.
The model considers wireless channels where a transmitted signal undergoes standard power loss propagation with path loss exponent and Rayleigh fading with unit mean. When the spatial distribution of nodes follows an HPPP, the effects of independent and identically distributed shadowing can be expressed as another equivalent HPPP [28,43]; thus, the results in this paper can be straightforwardly extended to incorporate the impact of shadowing, similar to those in [28,29,34], even though this paper does not explicitly consider shadowing. The spatial node distributions of legitimate nodes, external jammers, and Eves are denoted by , , and , respectively, where denotes an HPPP with density , where . Furthermore, denotes the RSI normalized by p.
In this paper, denotes the location of node l that belongs to the set of legitimate nodes or external jammers, i.e., or . In addition, , K, and denote the Rayleigh fading gain from nodes i to node l, the path loss gain at a unit distance, and where is noise power. When the typical node located at the origin works in mode d where , the signal to interference plus noise ratio (SINR) of the link from a tagged node located at to the typical node is given by
(1)
where , , and means the operation mode of node b. It is noteworthy that and . Further, , which models the effect of imperfect SIC in operation mode d.On the other hand, an Eve located at experiences the following SINR for node i:
(2)
where and .2.2. Network-Wide Secrecy Performance
In RA-WMB networks, because all legitimate nodes become an information source, performance can be measured by counting the number of successfully decoded BMs from arbitrary legitimate nodes [28,34], which is denoted by . Unlike this , secure RA-WMB networks have to count the number of BMs securely received at a legitimate node [11], which represents the BM that suffers from neither connection nor secrecy outage. This means the average number of the BMs that a legitimate node successfully decodes but all Eves fail to decode, which is denoted by . A legitimate node receives BMs in either of , , or , as described in Section 2.1, and as a result,
(3)
where , , . In (3), and represent the minimum SINR thresholds for a legitimate node’s and an Eve’s successful receiving, respectively. Note that nonsecure performance is for [28,34], and the secure performance only for HD (denoted by ) is equal to for [11]. Further, when all legitimate nodes operate only in FD, this performance (denoted by ) becomes for . Because legitimate receiving (Rx) nodes and Eves receive signals from the same transmitters, events and are inherently correlated. This correlation further complicates the analysis of . For ease of analysis, similar to the approach only for HD studied in [11], this paper approximates by disregarding the interference correlation, as follows:(4)
Then, in (6) also embraces the performances of nonsecure, only HD, and only FD operations as special cases, as follows:
(5)
The numerical and simulation results in Section 6 will demonstrate that provide quite close approximations of , even though these approximations exhibit small deviations from the original secrecy performances.
3. Spatial Secrecy Performance Analysis of Hybrid Duplex RA-WMB
This section investigates the secrecy performance and its inherent properties for secure HBD RA-WMB networks. The following result analytically expresses in (4).
When ,
(6)
where(7)
(8)
, and .See Appendix A. □
In Lemma 1, can be interpreted as the area where a receiver can successfully decode BMs if transmitters are located therein when the SINR threshold is . Therefore, means the average number of the legitimate transmitting (Tx) nodes that are located in the receiving area of the typical node but not in the overhearing area of any Eve, like Figure 1.
3.1. Properties of Spatial Secrecy Performance
This subsection explores the inherent properties of in (6).
in (6) has the following properties:
-
(i). When and , where
(9)
(10)
and . -
(ii). When , in an interference-limited scenario,
(11)
As a result,(12)
In particular, when and are given, for is maximized at . -
(iii). Assuming that Eve’s receiver capability is not less than that of a legitimate node, i.e., ,
(13)
where . -
(iv). In a coverage-limited scenario without any interference,
(14)
where(15)
In particular, when and , is maximized at(16)
-
(v). When and , there exists such that as long as .
See Appendix B. □
It is not straightforward to deal with in (6), which includes the sum of numerical integrals. In this regard, Proposition 1-(i) and (iii) provide the lower and upper bounds of that have further simplified forms. From Proposition 1-(ii), it is expected that the lower bound in Proposition 1-(i) becomes tighter as the interference becomes increasingly dominant. In particular, for an ideal SIC (i.e., ), these lower bounds become exactly the same as . From these properties, for a small value of and , it is expected that provides a tight lower bound of . It is worth noting that the bounds in Proposition 1-(i) and (iii) serve as crucial tools for designing (to be discussed in Section 4.1) and for analyzing the influence of external jammers (to be addressed in Section 3.2).
In a coverage-limited scenario where the impact of interference is ignored, e.g., a sparse node distribution scenario, can be expressed in a quite simple form like (14) and (15). Interestingly, Proposition 1-(iv) also gives the optimal for and , which does not depend on . This signifies that there is no difference between secure and nonsecure designs when legitimate nodes are sparse. Section 6 will demonstrate that secure design plays a more crucial role in improving secrecy performance as interference increases. However, designing in nonzero interference scenarios is not straightforward, which will be thoroughly addressed in Section 4.1. The optimal in (16) increases with , and this implies that the HBD RA-WMB moves toward the FD RA-WMB as RSI decreases. On the other hand, as , goes to zero, and this leads that the optimal for HD RA-WMB becomes . This result is consistent with the design in [29] that maximizes the nonsecure performance of HD RA-WMB.
Propositions 1-(v) indicate the FD superiority, which denotes that FD outperforms HD in terms of secrecy performance. This FD superiority significantly depends on RSI, and this issue will be addressed in more detail in Section 5.
3.2. Impact of Internal and External Jammers
To begin with, the following result demonstrates the ineffectiveness of internal jammers.
An internal jamming signal does not contribute to improving .
From (7), note that , where means that internal jammers do not send an AN signal but transmit their BM with transmit power . □
From Corollary 1, the maximization of can be achieved through adjusting and for . This result is consistent with the result in Corollary 3.1 in [11] for HD. From now, if not stated otherwise, this paper assumes that from Corollary 1.
The following result addresses the contribution of the external jammers.
An external jamming signal may contribute to increasing . In particular, is useful for a high Eve density. For example, in an interference-limited scenario with and , when , is maximized at and , where .
When and , from (13), . Through setting to , achieves . □
From the above result, this study continues to explore scenarios where . Further, it is worth noting that Corollary 2 offers the results for HBD including FD, while Corollary 3.1 in [11] was only for HD.
4. Design Principles for Secrecy Performance Improvement in RA-WMB Networks
Although Section 3 highlights the intriguing properties of the secure HBD RA-WMB, the results do not clearly delineate the impact of key parameters such as TxPr and RSI on the secrecy performance, because in (6) remains complex. Therefore, this section further explicitly quantifies the properties of through approximating the secrecy performance and proposes the design methods of the key parameters, including , , and .
4.1. Tx Probability Design for Secure RA-WMB
As clarified in Section 3.2, internal jamming does not contribute to increasing while external jamming may be helpful for high . In other words, the design can be simplified through setting to 0, and it is also expected that is sensible if the Eve density is not quite large. Hence, this subsection focuses on the design of for increasing when and . When defining the optimal for a given as
(17)
the design objective in this subsection is to approximate . The following results provide the fundamentals on the design of through examining in Proposition 1-(i).Assume that and . Furthermore, let , , , and . Then, have the following properties:
-
(i). There exists a such that monotonically increases with if . That is, if , .
-
(ii). If , is log-concave for , and becomes or 1, where is the unique solution of if there exists a solution of for , and
(18)
-
(iii). For a finite , or 1, where , and is defined in (A10).
See Appendix C. □
Proposition 2-(i) means that FD operation with is recommended for RSI below a certain level. Furthermore, Proposition 2-(ii) derives to maximize for an infinite RSI, which serves as the lower bound of the secrecy performance of HD RA-WMB. This result aligns with the result in Proposition 3.1 of [11]. Proposition 2-(iii) provides a necessary condition for , but it is not easy to derive for general when considering that in (A10) has a complex form.
Therefore, this paper devises the design method of through comprehensively considering the following important values of in terms of maximizing :
: FD optimality from Propositions 1-(ii) and 2-(i) and the FD superiority from Proposition 1-(v).
: ease of deriving for HD RA-WMB from Proposition 2-(ii) [11]
: importance of attentive listening from Proposition 1-(iv) and [29].
As a result, when and , the design method for is proposed in terms of increasing , as follows:
(19)
where , and if does not exist.4.2. FD Optimality for Secure RA-WMB without Any Jamming Signal
This subsection focuses on the condition for . This FD optimality condition can be expressed in terms of RSI, but it is not straightforward to derive this condition directly from in (6).
The following result gives the FD optimality condition in an extreme scenario where the effect of interference is ignored.
In a coverage-limited scenario without any interference, becomes one if
(20)
which is equivalent to(21)
From (16), note that if , becomes one. From this FD optimality condition and (15), (20) and (21) are derived. □
It is worth noting that the performance becomes less sensitive to as interference increases from (1); hence, it is sensible to consider in (21) as the lowest RSI threshold for the FD optimality. In other words, for the FD optimality, RSI does not need to be below .
For a general scenario with nonzero interference, it is not easy to express the FD optimality condition analytically. It is highly likely that in (19) is a nonincreasing function of because simultaneous transceiving using SIC is increasingly preferred as decreases, which can be demonstrated through the numerical results. As a result, the FD optimality condition is approximated as
(22)
where can be found between and a certain upper limit (e.g., ) for a given HBD RA-WMB environment, via the bisection method, from Proposition 2-(i) and the nonincreasing property of with respect to .4.3. Deployment of External Jamming Nodes for Secure RA-WMB
Corollary 2 demonstrated that may contribute to increasing for a high . In other words, when the amount of interference from legitimate nodes is not large enough to prevent Eves from overhearing BMs, the external jamming further raises interference for disturbing Eves’ reception. In contrast, also degrades the legitimate link quality because of the unspecified radiation of jamming signals. As a result, it seems to be sensible that the increase in is first preferred to the increase in . Therefore, this paper designs for increasing , through fixing to one. The following result suggests the value of for through approximating as .
Assume that and . Then, can be maximized at
(23)
where is the unique solution of = 0,(24)
and and Ω are defined in Proposition 2.See Appendix D. □
However, because deviates from for a non-small and , the design of in Proposition 3 works well only for a small . Then, one has a question about how to set more accurately. The numerical results in Section 6 demonstrate that primarily contributes to the increase in only when Eves are dense, e.g., . This excessive Eve density makes secure WMB operation difficult, and one should avoid this scenario. Further, the contribution of is quite marginal, which will be presented via the numerical results in Section 6.
5. Design Principles of Secure RA-WMB for Full Duplex Case
The analytical exploration of in Section 3 and Section 4 is for the HBD operations that are a mixture of HD and FD modes. Hence, this section discusses a specific but useful extreme case with , where all legitimate nodes work in FD mode. For the other extreme scenario, where and all legitimate nodes operates in HD mode, the relevant findings were detailed in [11], which can be regarded as a specific instance of the broader results discussed in this paper. From the assumption of as a result of Corollary 1, the secrecy performance of the FD RA-WMB in (5) can be recast into
(25)
The impact of external jamming signals has been already clarified in Corollary 2 because they include the case of , that is, marginally contributes to improving for a large . Therefore, this subsection further focuses on the FD superiority stated in Section 3.1 through setting to 0, which is given by
(26)
This FD superiority is a basic motivation of applying SIC in order to enhance the secrecy performance.
In a coverage-limited scenario, the FD superiority condition is expressed laconically as follows.
In a coverage-limited scenario, the FD superiority condition is
(27)
This condition is equivalent to
(28)
Because from (16), . Hence, from (26), . Through substituting (14) into this condition, (27) is obtained. Finally, from (15) and (27), (28) is derived. □
Note that in (28) is larger than in (21). Even though a coverage-limited scenario is an extreme scenario, this result explicitly reveals the difference between the FD optimality and superiority.
In a general scenario with nonzero interference, it is not easy to analytically express the condition of RSI for the FD superiority. Therefore, through approximating as , (26) is now replaced with the following equation:
(29)
For FD superiority, when defining as
(30)
this can be numerically found via the bisection method because is a monotonic decreasing function of . It is expected that , where was defined in (22), because the FD superiority is a more relaxed condition compared with the FD optimality. Further, when considering that the impact of becomes less dominant as interference increases, it is expected that and .6. Numerical Results and Discussion
This section numerically evaluates and discusses the spatial secrecy performances of the HBD RA-WMB and its design methods that were investigated in the previous sections. The evaluation models comply with the system model described in Section 2, and if not stated otherwise, the system parameters are set to the values presented in Table 2.
Figure 2 exhibits the properties of analyzed in Section 3.1. To begin with, the results demonstrate that ignoring interference correlation agrees well with the simulation results that exactly reflect correlated interference. In Figure 2a, it is evident that Eves degrade from and HBD outperforms HD. When examining the performances of HBD at , which denotes FD operation, FD is preferable at a higher , while a pure HBD strategy incorporating both HD receiving (i.e., in the RxOnly mode) and FD transceiving (i.e., in the TxRx mode) nodes is more advantageous at a lower . Further, in (19) traces quite well the peak point of in various interference scenarios (including both small and large impacts of ), even though deviates from . In particular, when , Figure 2a presents that the optimal operation for is a mixture of FD transceiving and HD receiving with , while the maximization of for is achieved at FD operation with , and this implies that Eves significantly affect the optimal TxPr design. In contrast, as expected in Proposition 1-(iv), in scenarios with sparse legitimate nodes and Eves (e.g., , ), the impact of Eves on the TxPr design becomes relatively smaller. In Figure 2a, because the effect of is small for while it is large for ; thus, the optimal TxPr for is around . On the other hand, Figure 2b further explicitly reveals the significant impact of on the optimal TxPr. It signifies that as Eves becomes denser, the legitimate nodes needs to generate more interference for confounding Eves. Further, Figure 2b presents that affects the TxPr design, where in (19) was obtained using derived from in (A11) for . In this subfigure, degrades and the optimization and impact of this will be presented and discussed in Figure 6 in more detail.
Figure 3 demonstrates the effect and motivation of the secure design in the RA-WMB network. When TxPrs are securely and nonsecurely designed to increase and according to (19), respectively, Figure 3a compares the secrecy performances of the two designs. In the nonsecure design, recall that the TxPr for increasing can be derived through setting to zero in (19), and the value of for this TxPr is measured. In the interference-dominant scenario with , the secure design is outstandingly superior to the nonsecure one. It is interesting that the proposed secure design still significantly improves the secrecy performance even when legitimate nodes are not quite dense, e.g., when . The nonsecure design increasingly degrades the secrecy performance as legitimate nodes become dense because the nonsecure design tends to decrease TxPr for mitigating interference [28,29,34] even if interference needs to be increased to confound Eves. Figure 3b clearly exhibits the difference between these TxPr designs. As increases, the secure design more aggressively transmits BMs through increasing , while the nonsecure design becomes more silent through decreasing . Further, the nonsecure design does not respond to the increase in Eve density. In contrast, the secure design more rapidly reaches the FD operation as Eves become dense. This signifies that SIC can play a key role in increasing as well as improving [34].
Figure 4 quantitatively presents the contribution of SIC to the improvement of and the design of TxPr, through parameterizing the RSI level. In Figure 4a, the y-axis denotes the gain of the secure design with respect to the nonsecure design, i.e., , when ’s are designed to increase and , respectively. In the scenarios with , which represent scenarios where legitimate nodes are not quite dense, the secure design provides a significant gain even when Eves are not dense, e.g., about 3–18 % for . This gain substantially increases as RSI decreases, e.g., increases by when . As interference becomes more dominant, the gain becomes dramatically large. Further, it is interesting that even when legitimate nodes are sparse (e.g., when ), the secure design is beneficial if low RSI is implemented. On the other hand, Figure 4b exhibits the impact of RSI on the suboptimal TxPr for secure designs in the same scenarios, demonstrating that the coexistence of nodes in the RxOnly and TxRx modes becomes preferable over scenarios where all nodes operate exclusively in the TxRx mode, as RSI increases. This highlights that when the SIC capability is not excellent, balancing the beneficial and harmful effects of interference is more important than simply maximizing the simultaneous transceiving of individual nodes through SIC, due to non-negligible self-interference.
Figure 5 examines the impact of and on the RSI threshold for the FD optimality and superiority. To begin with, the results demonstrate that and in Corollaries 3 and 4 provide the exact lower bounds for the FD optimality and superiority condition, each of which guides a reference value for SIC design. In this figure, and for nonzero interference are numerically obtained through the bisection method, as described in Section 4.2 and Section 5. The results reveal that the condition for and become looser as the impact of interference increases, and this is consistent with the result in [34]. On the other hand, the results demonstrate that and in the secure design are significantly affected by the Eve density. As Eves are dense, the FD optimality and superiority conditions become increasingly loose because the RA-WMB tends to work at a higher interference level for confounding Eves. As a result, the contribution of SIC can become further important in the secure RA-WMB.
Figure 6 evaluates the effect of external jammers on increasing . The value on y-axis denotes a suboptimal value of , which is obtained through applying for a given where in (19) comes from in (A11), and this is denoted by in this figure; thus, the peak of the curves in Figure 6 represents a suboptimal value for the joint optimization of over and . The results demonstrate that designed in Proposition 3 works well in HBD with a low RSI (e.g., ) scenario. As RSI increases, in (23) deviates from the exact peak, as already expected in Section 4.3. Further, Figure 6 argues that the effect of is quite marginal in terms of increasing , from the observation that monotonically decreases with or the gap between the maximum value and the value for is not significant, even when the Eve density is large (in this figure, note that and ). This effect is similar to those for HD scenarios, which were obtained from Proposition 3.2 of [11]. As a result, one does not need to consider seriously the deployment of the external jammers for secure RA-WMB because they are marginally helpful when Eves are extremely dense.
7. Conclusions
This paper investigated the performance and design principles of the secure random-access-based wireless mutual broadcast (RA-WMB), with the objective of enhancing physical layer security (PLS) performance through self-interference cancellation (SIC). The analysis focused on the impact of SIC on the hybrid duplex (HBD) operation that balances the proportion of legitimate half-duplex (HD) receiving and full-duplex (FD) transceiving nodes. The analytical and numerical results demonstrated that the design of secure HBD RA-WMB differs significantly from conventional designs for nonsecure RA-WMB or secure HD RA-WMB. The deliberate increase in interference in the design, aimed at confounding eavesdroppers, reduced the sensitivity of secrecy performance to residual self-interference. This facilitated a more confident use of SIC, and this paper also examined the condition favoring this FD operation. In contrast, friendly jammers were not helpful in improving PLS performance due to their negative or quite marginal gain, which was similar to the conventional HD-WMB design. Further, this paper proposed a simple method for designing transmission probability, factoring in eavesdropper density and SIC impairment, to enhance the PLS performance. In future work, it would be interesting to expand the study into more interactive scenarios, such as carrier sensing multiple access and Eve collusion, to further generalize scenarios.
Conceptualization, T.K.; methodology, T.K. and H.L.; software, T.K.; validation, T.K.; formal analysis, T.K.; investigation, T.K.; resources, T.K. and H.L.; data curation, T.K.; writing—original draft preparation, T.K. and H.L.; writing—review and editing, T.K. and H.L.; visualization, T.K.; supervision, T.K.; project administration, T.K.; funding acquisition, T.K. All authors have read and agreed to the published version of the manuscript.
Data are contained within the article.
The authors declare no conflicts of interest.
The following abbreviations are used in this manuscript:
6G | 6th generation |
AN | Artificial noise |
BM | Broadcast message |
CSMA | Carrier sense multiple access |
D2D | Device-to-device |
Eve | Eavesdropper |
FD | Full duplex |
HBD | Hybrid duplex |
HD | Half duplex |
HPPP | Homogeneous Poisson point process |
IoT | Internet of things |
PLS | Physical layer security |
pgfl | Probability generating functional |
PPP | Poisson point process |
RA-WMB | Random access based wireless mutual broadcast |
RSI | Residual self-interference |
SIC | Self-interference cancellation |
TxPr | Transmission probability |
V2V | Vehicle-to-vehicle |
WMB | Wireless mutual broadcast |
Footnotes
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Figure 2. Properties of [Forumla omitted. See PDF.] [lines: analysis; open symbols: simulation ([Forumla omitted. See PDF.]); solid symbols: suboptimal [Forumla omitted. See PDF.] given by [Forumla omitted. See PDF.] in (19)]: (a) [Forumla omitted. See PDF.] and its approximations ([Forumla omitted. See PDF.], [Forumla omitted. See PDF.]). (b) Impact of Eves and external jammers.
Figure 3. Comparison of secure and nonsecure designs for HBD RA-WMB: (a) Effect of Eve density on suboptimal [Forumla omitted. See PDF.]. (b) Effect of Eve density on suboptimal [Forumla omitted. See PDF.].
Figure 4. Contribution of SIC capability to secure RA-WMB (a) Effect of RSI on gain of secure RA-WMB design. (b) Effect of RSI on suboptimal [Forumla omitted. See PDF.].
Figure 5. RSI threshold for FD optimality [solid lines] and FD superiority [dashed lines].
Figure 6. Contribution of external jammers to secure RA-WMB [y-axis: [Forumla omitted. See PDF.] applying [Forumla omitted. See PDF.]; solid symbols: [Forumla omitted. See PDF.] in (23) for HBD and [Forumla omitted. See PDF.] derived in [11] for HD].
Design principles for secure HBD RA-WMB based on SIC capability.
SIC Capability | Recommended Duplexing | Nonsecure vs. Secure Design | Key Designs |
---|---|---|---|
None or bad | Half duplex (HD) † | ||
(high RSI; e.g., | (RxOnly + TxRx with | | |
Good | Pure hybrid duplex (HBD) | ||
(Medium RSI; e.g., | (RxOnly + TxRx) | | |
Excellent | Full duplex (FD) | ||
(Low RSI; | (TxRx, i.e., | |
† The results for HD are equivalent to the results in [
Notations and their description for secure HBD RA-WMB.
Notations | Descriptions | Expressions or Values |
---|---|---|
| Average number of securely received BMs per node | In ( |
| Approximation of | In ( |
Lower and upper bounds of | In Proposition 1-(i) and (iii) | |
| Average number of nonsecurely received BMs per node | |
In ( | ||
RxOnly, TxRx, JamRx modes | - | |
Sets of legitimate nodes, external jammers, and eavesdroppers | - | |
| Probability of operation mode | In ( |
Area where a receiver can successfully decode BMs if transmitters are located therein, in | In ( | |
Spatial densities of legitimate nodes, external jammers, Eves | ||
p, | Tx power of BM, internal jamming, external jamming | |
| Path loss exponent | 3.5 |
K | Path loss gain at a unit distance | |
| Normalized noise power ( | |
| Rayleigh fading gain from node i to node l | Unit mean |
SINR at legitimate receiver in modes | In ( | |
| SINR at Eve | In ( |
SINR thresholds of legitimate receiver and Eve | | |
| Residual self-interference (RSI) normalized by p | |
RSI thresholds for FD optimality and FD superiority | In ( | |
In ( | ||
Transmission probability (TxPr), internal jamming probability | ||
Optimal and suboptimal TxPrs for HBD, | In ( | |
| Suboptimal TxPr candidate for HD when | In Proposition (2)-(ii) |
Appendix A. Proof of Lemma 1
In (
Furthermore,
On the other hand,
As a result, from (
Appendix B. Proof of Proposition 1
-
follows from where (a) follows from . Furthermore,
follows from where (a) follows from the definition of random variable U that is exponentially distributed with the mean of , (b) follows from the Jensen’s inequality, and (c) follows from . -
If
, as , the lower bounds in ( A4 ) and (A5 ) approach the original value.Further, when
and are fixed, from ( 12 ),for increases with ; thus, maximizes for a given and , when . -
This proof is similar to the one for Lemma 3.1(ii) of [
11 ] which is only for HD. However, the result and proof in this paper are for a more general case, i.e., HBD. The inequalities in (13 ) are indexed as follows:Note that
from ( 8 ) and; thus, (a) holds. Further, from the assumption of , (b) holds. For the proof of (c), consider . Because , if , while if ; thus, the maximum value of over is which is achieved when . Furthermore, this upperbound, i.e., , is maximized at . As a result, (iii) holds. -
In (
6 ), a scenario with no interference can be expressed through settingto 0; thus, from ( 8 ) for, ( 15 ) is obtained.If
and , When considering that both
and are now independent of , is log-concave for . As a result, can be maximized at or such that From (
A8 ), (16) is derived. -
Consider that
and . From Propositons 1(i) and 1(iii) of [
34 ], when, for FD always outperforms the maximum for HD, i.e., for any . Further, for because decreases as transmitter density increases. Therefore, when , . Furthermore,
is continuous and monotonically decreases with respect to , and . As a result, Proposition 1-(v) holds.
Appendix C. Proof of Proposition 2
Proposition 2 assumes that
When
-
From (
A10 ), when, for all because . Further, note that is continuous with respect to ; thus, there exists an such that it always holds that if . -
This is the same as the result in Proposition 3.1 of [
11 ]. The proof is fully provided due to its completeness and differences in notation. Assume that. Then, each term of in ( A9 ) is concave for; thus, is log-concave for , and if the solution of exists between 0 and 1, it is unique. Note that can be recast into , where Similarly, if there exists a
such that for , it is unique. When , is equivalent to . As a result, if , can be maximized through setting to or one. -
is a necessary condition for maximizing .
Appendix D. Proof of Proposition 3
Assume that
Furthermore,
Therefore,
As a result, from the relationship between
References
1. Shen, L.H.; Feng, K.T.; Hanzo, L. Five Facets of 6G: Research Challenges and Opportunities. ACM Compt. Surv.; 2023; 55, pp. 1-39. [DOI: https://dx.doi.org/10.1145/3571072]
2. Lin, Z.; de Cola, T.; Wang, J.B.; Zhu, W.P.; Cheng, J. Supporting IoT With Rate-Splitting Multiple Access in Satellite and Aerial-Integrated Networks. IEEE Internet Things J.; 2021; 8, pp. 11123-11134. [DOI: https://dx.doi.org/10.1109/JIOT.2021.3051603]
3. Hayat, O.; Ngah, R.; Hashim, S.Z.M.; Dahri, M.H.; Malik, R.F.; Rahayu, Y. Device Discovery in D2D Communication: A Survey. IEEE Access; 2019; 7, pp. 131114-131134. [DOI: https://dx.doi.org/10.1109/ACCESS.2019.2941138]
4. Hayat, O.; Ngah, R.; Kaleem, Z.; Hashim, S.Z.M.; Rodrigues, J.J.P.C. A Survey on Security and Privacy Challenges in Device Discovery for Next-Generation Systems. IEEE Access; 2020; 8, pp. 84584-84603. [DOI: https://dx.doi.org/10.1109/ACCESS.2020.2991459]
5. Sun, Y.; Cao, J.; Ma, M.; Zhang, Y.; Li, H.; Niu, B. EAP-DDBA: Efficient Anonymity Proximity Device Discovery and Batch Authentication Mechanism for Massive D2D Communication Devices in 3GPP 5G HetNet. IEEE Trans. Dependable Secure Comput.; 2022; 19, pp. 370-387. [DOI: https://dx.doi.org/10.1109/TDSC.2020.2989784]
6. Liu, W.; Nakauchi, K.; Shoji, Y. A Neighbor-Based Probabilistic Broadcast Protocol for Data Dissemination in Mobile IoT Networks. IEEE Access; 2018; 8, pp. 12260-12268. [DOI: https://dx.doi.org/10.1109/ACCESS.2018.2808356]
7. Jeon, K.E.; She, J.; Soonsawad, P.; Ng, P.C. BLE Beacons for Internet of Things Applications: Survey, Challenges, and Opportunities. IEEE Internet Things J.; 2018; 5, pp. 811-828. [DOI: https://dx.doi.org/10.1109/JIOT.2017.2788449]
8. Qiu, T.; Chen, B.; Sangaiah, A.K.; Ma, J.; Huang, R. A Survey of Mobile Social Networks: Applications, Social Characteristics, and Challenges. IEEE Syst. J.; 2018; 12, pp. 3932-3947. [DOI: https://dx.doi.org/10.1109/JSYST.2017.2764479]
9. Ghazi, M.U.; Khattak, M.A.K.; Shabir, B.; Malik, A.W.; Ramzan, M.S. Emergency Message Dissemination in Vehicular Networks: A Review. IEEE Access; 2020; 8, pp. 38606-38621. [DOI: https://dx.doi.org/10.1109/ACCESS.2020.2975110]
10. Alghamdi, S.A. Cellular V2X With D2D Communications for Emergency Message Dissemination and QoS Assured Routing in 5G Environment. IEEE Access; 2021; 9, pp. 56049-56065. [DOI: https://dx.doi.org/10.1109/ACCESS.2021.3071349]
11. Kwon, T.; Ju, H. Design Principles for Improving Spatial Secrecy Performance in Random Access based Wireless Mutual Broadcast Networks. IEEE Commun. Lett.; 2020; 24, pp. 917-921. [DOI: https://dx.doi.org/10.1109/LCOMM.2020.2967382]
12. Wyner, A.D. The Wire-Tap Channel. Bell Syst. Tech. J.; 1975; 54, pp. 1355-1387. [DOI: https://dx.doi.org/10.1002/j.1538-7305.1975.tb02040.x]
13. Poor, H.V. Information and Inference in the Wireless Physical Layer. IEEE Wirel. Commun. Mag.; 2012; 19, pp. 40-47. [DOI: https://dx.doi.org/10.1109/MWC.2012.6155875]
14. Illi, E.; Qaraqe, M.; Althunibat, S.; Alhasanat, A.; Alsafasfeh, M.; de Ree, M.; Mantas, G.; Rodriguez, J.; Aman, W.; Al-Kuwari, S. Physical Layer Security for Authentication, Confidentiality, and Malicious Node Detection: A Paradigm Shift in Securing IoT Networks. IEEE Commun. Surv. Tutor.; 2024; 26, pp. 347-388. [DOI: https://dx.doi.org/10.1109/COMST.2023.3327327]
15. Solaija, M.S.J.; Salman, H.; Arslan, H. Towards a Unified Framework for Physical Layer Security in 5G and Beyond Networks. IEEE Open J. Veh. Technol.; 2022; 3, pp. 321-3435. [DOI: https://dx.doi.org/10.1109/OJVT.2022.3183218]
16. Lin, Z.; Lin, M.; Champagne, B.; Zhu, W.P.; Al-Dhahir, N. Secrecy-Energy Efficient Hybrid Beamforming for Satellite-Terrestrial Integrated Networks. IEEE Trans. Commun.; 2021; 69, pp. 6345-6360. [DOI: https://dx.doi.org/10.1109/TCOMM.2021.3088898]
17. Niu, H.; Chu, Z.; Zhou, F.; Zhu, Z.; Zhen, L.; Wong, K.K. Robust Design for Intelligent Reflecting Surface-Assisted Secrecy SWIPT network. IEEE Trans. Wirel. Commun.; 2022; 21, pp. 4133-4149. [DOI: https://dx.doi.org/10.1109/TWC.2021.3126833]
18. Ma, R.; Yang, W.; Guan, X.; Lu, X.; Song, Y.; Chen, D. Covert mmWave Communications with Finite Blocklength Against Spatially Random Wardens. IEEE Internet Things J.; 2024; 11, pp. 3402-3416. [DOI: https://dx.doi.org/10.1109/JIOT.2023.3296414]
19. Mohammadi, M.; Mobini, Z.; Galappaththige, D.; Tellambura, C. A Comprehensive Survey on Full-Duplex Communication: Current Solutions, Future Trends, and Open Issues. IEEE Commun. Surv. Tutor.; 2023; 25, pp. 2190-2244. [DOI: https://dx.doi.org/10.1109/COMST.2023.3318198]
20. Ju, Y.; Liu, W.; Yang, M.; Liu, L.; Pei, Q.; Zhang, N.; Ota, K.; Dong, M.; Leung, V.C.M. Physical Layer Security in Full-Duplex Millimeter Wave Communication Systems. IEEE Trans. Veh. Technol.; 2024; 73, pp. 2816-2829. [DOI: https://dx.doi.org/10.1109/TVT.2023.3320907]
21. Zheng, T.X.; Wang, H.M.; Yang, Q.; Lee, M.H. Safeguarding Decentralized Wireless Networks Using Full-Duplex Jamming Receivers. IEEE Trans. Wirel. Commun.; 2017; 16, pp. 278-292. [DOI: https://dx.doi.org/10.1109/TWC.2016.2622689]
22. Zheng, T.X.; Wang, H.M.; Yuan, J.; Han, Z.; Lee, M.H. Physical Layer Security in Wireless Ad Hoc Networks Under A Hybrid Full-/Half-Duplex Receiver Deployment Strategy. IEEE Trans. Wirel. Commun.; 2017; 16, pp. 3827-3829. [DOI: https://dx.doi.org/10.1109/TWC.2017.2689005]
23. Zheng, T.X.; Wang, H.M.; Yuan, J.; Han, Z.; Lee, M.H. Physical Layer Security in Heterogeneous Networks with Jammer Selection and Full-Duplex Users. IEEE Trans. Wirel. Commun.; 2017; 16, pp. 7982-7995.
24. Kimura, T.; Saito, H. Theoretical Broadcast Rate Optimization for V2V Communications at Intersection. IEEE Trans. Dependable Secure Comput.; 2022; 21, pp. 3360-3372. [DOI: https://dx.doi.org/10.1109/TMC.2021.3051956]
25. Wu, Z.; Park, V.D.; Li, J. Enabling Device to Device Broadcast for LTE Cellular Networks. IEEE J. Sel. Areas Commun.; 2016; 34, pp. 58-70. [DOI: https://dx.doi.org/10.1109/JSAC.2015.2452585]
26. Gismalla, M.S.M.; Azmi, A.I.; Salim, M.R.B.; Abdullah, M.F.L.; Iqbal, F.; Mabrouk, W.A.; Othman, M.B.; Ashyap, A.Y.I.; Supaat, A.S.M. Survey on Device to Device (D2D) Communication for 5GB/6G Networks: Concept, Applications, Challenges, and Future Directions. IEEE Access; 2022; 10, pp. 2169-3536. [DOI: https://dx.doi.org/10.1109/ACCESS.2022.3160215]
27. Haenggi, M. Stochastic Geometry for Wireless Networks; Cambridge University Press: New York, NY, USA, 2012.
28. Kwon, T.; Choi, J.W. Spatial Performance Analysis and Design Principles for Wireless Peer Discovery. IEEE Trans. Wirel. Commun.; 2014; 13, pp. 4507-4519. [DOI: https://dx.doi.org/10.1109/TWC.2014.2321142]
29. Kwon, T. Transmission Probability Design for Random Access Based Wireless Peer Discovery. IEEE Commun. Lett.; 2014; 18, pp. 1603-1606. [DOI: https://dx.doi.org/10.1109/LCOMM.2014.2337304]
30. Xenakis, D.; Kountouris, M.; Merakos, L.; Passas, N.; Verikoukis, C. Performance Analysis of Network-Assisted D2D Discovery in Random Spatial Networks. IEEE Trans. Wirel. Commun.; 2016; 15, pp. 5695-5707. [DOI: https://dx.doi.org/10.1109/TWC.2016.2568172]
31. Martin-Vega, F.J.; Soret, B.; Aguayo-Torres, M.C.; Kovacs, I.Z.; Gomez, G. Geo-Location Based Access for Vehicular Communications: Analysis and Optimization via Stochastic Geometry. IEEE Trans. Veh. Technol.; 2018; 67, pp. 3069-3084. [DOI: https://dx.doi.org/10.1109/TVT.2017.2775249]
32. Ashraf, M.; Lee, K.G. Overall Energy Minimization in the Wireless Peer Discovery System With Multi-Antenna Peers. IEEE Commun. Lett.; 2019; 23, pp. 1821-1825. [DOI: https://dx.doi.org/10.1109/LCOMM.2019.2926976]
33. Kong, H.B.; Kang, S.; Lee, I. Wireless Peer Discovery in Heterogeneous Half-/Full-Duplex Networks. IEEE Commun. Lett.; 2017; 21, pp. 881-884. [DOI: https://dx.doi.org/10.1109/LCOMM.2016.2645198]
34. Kwon, T.; Lee, H. Hybrid Duplex Wireless Peer Discovery with Imperfect Self-Interference Cancellation. IEEE Commun. Lett.; 2018; 22, pp. 598-601. [DOI: https://dx.doi.org/10.1109/LCOMM.2017.2780095]
35. Kang, S.; Kong, H.B.; Song, C.; Lee, H.; Lee, I. Transmit Probability Designs for Wireless Peer Discovery with Energy Harvesting. IEEE Commun. Lett.; 2017; 21, pp. 644-647. [DOI: https://dx.doi.org/10.1109/LCOMM.2016.2625782]
36. Zhou, X.; Durrani, S.; Guo, J. Drone-Initiated D2D-Aided Multihop Multicast Networks for Emergency Information Dissemination. IEEE Access; 2020; 8, pp. 3566-3578. [DOI: https://dx.doi.org/10.1109/ACCESS.2019.2962224]
37. Goel, S.; Negi, R. Guaranteeing Secrecy Using Artificial Noise. IEEE Trans. Wirel. Commun.; 2008; 7, pp. 2180-2189. [DOI: https://dx.doi.org/10.1109/TWC.2008.060848]
38. Zhang, Y.; Shen, Y.; Jiang, X.; Kasahara, S. Secure Millimeter-Wave Ad Hoc Communications Using Physical Layer Security. IEEE Trans. Inf. Forensics Secur.; 2021; 17, pp. 99-114. [DOI: https://dx.doi.org/10.1109/TIFS.2021.3054507]
39. Chamkhia, H.; Erbad, A.; Al-Ali, A.K.; Mohamed, A.; Refaey, A.; Guizani, M. 3-D Stochastic Geometry-Based Modeling and Performance Analysis of Efficient Security Enhancement Scheme for IoT Systems. IEEE Internet Things J.; 2022; 9, pp. 6663-6677. [DOI: https://dx.doi.org/10.1109/JIOT.2021.3112883]
40. Feng, S.; Lu, X.; Sun, S.; Niyato, D.; Hossain, E. Securing Large-Scale D2D Networks Using Covert Communication and Friendly Jamming. IEEE Trans. Wirel. Commun.; 2024; 23, pp. 592-606. [DOI: https://dx.doi.org/10.1109/TWC.2023.3280464]
41. Wang, C.; Li, Z.; Shi, J.; Si, J.; Ng, D.W.K. Physical Layer Security of Vehicular Networks: A Stochastic Geometry Approach. Proceedings of the 2020 IEEE International Conference on Communications Workshops (ICC Workshops); Dublin, Ireland, 7–11 June 2020.
42. Zheng, T.X.; Chen, X.; Wang, C.; Wong, K.K.; Yuan, J. Physical Layer Security in Large-Scale Random Multiple Access Wireless Sensor Networks: A Stochastic Geometry Approach. IEEE Trans. Commun.; 2022; 70, pp. 4038-4051. [DOI: https://dx.doi.org/10.1109/TCOMM.2022.3167047]
43. Błaszczyszyn, B.; Karray, M.K.; Keeler, H.P. Using Poisson Processes to Model Lattice Cellular Networks. Proceedings of the 2013 IEEE International Conference on Computer Communications (INFOCOM); Turin, Italy, 14–19 April 2013.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Abstract
With the increasing demand for data exchange between nearby devices in proximity-based services, enhancing the security of wireless mutual broadcast (WMB) networks is crucial. However, WMB networks are inherently vulnerable to eavesdropping due to the open broadcast nature of their communication. This paper investigates the improvement of secrecy performance in random-access-based WMB (RA-WMB) networks by integrating physical layer security (PLS) techniques with hybrid duplex (HBD) operations under a stochastic geometry framework. The HBD method balances half-duplex (HD) receiving and full-duplex (FD) transceiving, utilizing self-interference cancellation (SIC) to enhance PLS performance. Key operational parameters, including transmission probability (TxPr), friendly jammer density, and conditions for FD operation, are designed to maximize secrecy performance. The analytical and numerical results demonstrate significant improvements in PLS performance, with SIC playing a critical role, particularly in scenarios with dense legitimate nodes, and with TxPr adjusted to balance HD receiving and FD transceiving based on SIC imperfections. The proposed design principles provide a comprehensive framework for enhancing the security of WMB networks, addressing the complex interplay of interference and SIC in various network configurations.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Details


1 Department of Computer Science and Engineering, Seoul National University of Science and Technology (SeoulTech), Seoul 01811, Republic of Korea
2 Department of Mobile Systems Engineering, Dankook University, Yongin 16890, Republic of Korea;