Abstract
Secrecy Performance is one of the focus of research on physical layer security in vehicle-to-everything (V2X). Poisson line process (PLP) is regarded as a more suitable model to study the vehicle communication performance of urban scenarios. However, due to the high theoretical difficulty in the analysis of PLP, research in this area has not been widely conducted yet. In this paper, we take a secure transmission scheme that can improve physical layer security as an example, use PLP model to model urban scenarios. We analyze the performance of coverage probability, secrecy probability and secrecy throughput and draw some effective conclusions to improve secrecy performance. We import a typical urban scenario - part of the map data of Xi’an urban area in China, compare the performance derived by PLP and two-dimensional Poisson point process (2D PPP) model with those modeled on the real urban map respectively, it is demonstrated that PLP is more suitable as the model for urban scenarios.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Chen, X., Ng, D., Gerstacker, W.H., et al.: A survey on multiple-antenna techniques for physical layer security. IEEE Commun. Surv. Tutor. 19, 1027–1053 (2017)
Furqan, H.M., Solaija, M.S.J., Arslan, H.: Intelligent physical layer security approach for V2X communication. arXiv preprint (2019). https://arxiv.org/pdf/1905.05075.pdf
ElHalawany, B.M., El-Banna, A.A.A., Wu, K.: Physical-layer security and privacy for vehicle-to-everything. IEEE Commun. Mag. 57(10), 84–90 (2019). https://doi.org/10.1109/MCOM.001.1900141
Xu, L., Yu, X., Wang, H., et al.: Physical layer security performance of mobile vehicular networks. Mob. Netw. Appl. 25(4) (2019)
Wu, Y., Qian, L.P., Mao, H.W., et al.: Secrecy-driven resource management for vehicular computation offloading networks. IEEE Netw. 32(3), 84–91 (2018)
Tolossa, Y.J., Vuppala, S., Kaddoum, G., Abreu, G.: On the uplink secrecy capacity analysis in D2D-enabled cellular network. IEEE Syst. J. 12(3), 2297–2307 (2018)
Hu, X., Mu, P., Wang, B., Li, Z.: On the secrecy rate maximization with uncoordinated cooperative jamming by single-antenna helpers. IEEE Trans. Veh. Technol. 26(5), 4457–4462 (2019)
Ma, R., Yang, S., Du, M., Ou, J.: Improving physical layer security jointly using full-duplex jamming receiver and multi-antenna jammer in wireless networks. IET Commun. 13(10), 1530–1536 (2019)
Si, J., Cheng, Z., Li, Z., Cheng, J., Wang, H.-M., Al-Dhahir, N.: Cooperative jamming for secure transmission with both active and passive eavesdroppers. IEEE Trans. Commun. 68(9), 5764–5777 (2020). https://doi.org/10.1109/TCOMM.2020.3003946
Dhillon, H.S., Chetlur, V.V.: Poisson line cox process: foundations and applications to vehicular networks (2020)
Tang, Z., Sun, Z., Li, C., et al.: Reliability performance of transmitter selection in wireless vehicular networks. In: 2020 IEEE/CIC International Conference on Communications in China (ICCC). IEEE (2020)
Hu, L., Wen, H., Wu, B., Tang, J., Pan, F., Liao, R.-F.: Cooperative jamming aided secrecy enhancement in wireless networks with passive eavesdroppers. IEEE Trans. Veh. Technol. 67(3), 2108–2117 (2018)
Yang, Y., Wang, W., Zhao, H., Zhao, L.: Transmitter beamforming and artificial noise with delayed feedback: secrecy rate and power allocation. J. Commun. Netw. 14(4), 374–384 (2012)
Qiu, B., Jing, C.: Performance analysis for cooperative jamming and artificial noise aided secure transmission scheme in vehicular communication network (2020)
Klinc, D., Ha, J., McLaughlin, S.W., Barros, J., Kwak, B.-J.: LDPC codes for the Gaussian wiretap channel. IEEE Trans. Inf. Forensics Secur. 6(3), 532–540 (2011)
Krishnan, S., Dhillon, H.S.: Spatio-temporal interference correlation and joint coverage in cellular networks. IEEE Trans. Wirel. Commun. 16(9), 5659–5672 (2017)
Sial, M.N., Deng, Y., Ahmed, J., Nallanathan, A., Dohler, M.: Stochastic geometry modeling of cellular V2X communication on shared uplink channels (2018)
Acknowledgement
This work was supported in part by the State Major Science and Technology Special Projects (Grant No. 2018ZX03001024) and in part by the National Key Research and Development Program (Grant No. 2022YFF0610303).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Shi, K., Gu, X. (2023). Safety Modeling and Performance Analysis of Urban Scenarios Based on Poisson Line Process. In: Gao, F., Wu, J., Li, Y., Gao, H. (eds) Communications and Networking. ChinaCom 2022. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 500. Springer, Cham. https://doi.org/10.1007/978-3-031-34790-0_18
Download citation
DOI: https://doi.org/10.1007/978-3-031-34790-0_18
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-34789-4
Online ISBN: 978-3-031-34790-0
eBook Packages: Computer ScienceComputer Science (R0)