{"id":"https://openalex.org/W2028375661","doi":"https://doi.org/10.1109/wcnc.2013.6554947","title":"On the physical layer security in large scale cellular networks","display_name":"On the physical layer security in large scale cellular networks","publication_year":2013,"publication_date":"2013-04-01","ids":{"openalex":"https://openalex.org/W2028375661","doi":"https://doi.org/10.1109/wcnc.2013.6554947","mag":"2028375661"},"language":"en","primary_location":{"id":"doi:10.1109/wcnc.2013.6554947","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wcnc.2013.6554947","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 IEEE Wireless Communications and Networking Conference (WCNC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://openresearch-repository.anu.edu.au/bitstreams/fbb4b64a-b2a7-499c-9021-5e567c2a7008/download","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100351665","display_name":"He Wang","orcid":"https://orcid.org/0000-0002-3065-393X"},"institutions":[{"id":"https://openalex.org/I118347636","display_name":"Australian National University","ror":"https://ror.org/019wvm592","country_code":"AU","type":"education","lineage":["https://openalex.org/I118347636"]},{"id":"https://openalex.org/I42894916","display_name":"Data61","ror":"https://ror.org/03q397159","country_code":"AU","type":"other","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I42894916","https://openalex.org/I4387156119"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"He Wang","raw_affiliation_strings":["National ICT Australia Limited, ACT, Australia","Research School of Engineering, Australian National University, ACT, Australia"],"affiliations":[{"raw_affiliation_string":"National ICT Australia Limited, ACT, Australia","institution_ids":["https://openalex.org/I42894916"]},{"raw_affiliation_string":"Research School of Engineering, Australian National University, ACT, Australia","institution_ids":["https://openalex.org/I118347636"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085818373","display_name":"Xiangyun Zhou","orcid":"https://orcid.org/0000-0001-8973-9079"},"institutions":[{"id":"https://openalex.org/I118347636","display_name":"Australian National University","ror":"https://ror.org/019wvm592","country_code":"AU","type":"education","lineage":["https://openalex.org/I118347636"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Xiangyun Zhou","raw_affiliation_strings":["Research School of Engineering, Australian National University, ACT, Australia"],"affiliations":[{"raw_affiliation_string":"Research School of Engineering, Australian National University, ACT, Australia","institution_ids":["https://openalex.org/I118347636"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5054563831","display_name":"Mark C. Reed","orcid":"https://orcid.org/0000-0002-8766-324X"},"institutions":[{"id":"https://openalex.org/I118347636","display_name":"Australian National University","ror":"https://ror.org/019wvm592","country_code":"AU","type":"education","lineage":["https://openalex.org/I118347636"]},{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Mark C. Reed","raw_affiliation_strings":["Research School of Engineering, Australian National University, ACT, Australia","University of New South Wales, ACT, Australia"],"affiliations":[{"raw_affiliation_string":"Research School of Engineering, Australian National University, ACT, Australia","institution_ids":["https://openalex.org/I118347636"]},{"raw_affiliation_string":"University of New South Wales, ACT, Australia","institution_ids":["https://openalex.org/I31746571"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100351665"],"corresponding_institution_ids":["https://openalex.org/I118347636","https://openalex.org/I42894916"],"apc_list":null,"apc_paid":null,"fwci":1.4187,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.83422006,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10148","display_name":"Advanced MIMO Systems Optimization","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/base-station","display_name":"Base station","score":0.8389942049980164},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7770800590515137},{"id":"https://openalex.org/keywords/cellular-network","display_name":"Cellular network","score":0.7528409361839294},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7043091058731079},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.6862254738807678},{"id":"https://openalex.org/keywords/stochastic-geometry","display_name":"Stochastic geometry","score":0.6840136051177979},{"id":"https://openalex.org/keywords/physical-layer","display_name":"Physical layer","score":0.6530162692070007},{"id":"https://openalex.org/keywords/telecommunications-link","display_name":"Telecommunications link","score":0.5371559262275696},{"id":"https://openalex.org/keywords/information-exchange","display_name":"Information exchange","score":0.4966900944709778},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.48567402362823486},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.46705877780914307},{"id":"https://openalex.org/keywords/mobile-telephony","display_name":"Mobile telephony","score":0.4665856957435608},{"id":"https://openalex.org/keywords/secure-transmission","display_name":"Secure transmission","score":0.4222068190574646},{"id":"https://openalex.org/keywords/artificial-noise","display_name":"Artificial noise","score":0.4186200797557831},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.35583657026290894},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2894755005836487},{"id":"https://openalex.org/keywords/mobile-radio","display_name":"Mobile radio","score":0.27818363904953003},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.2752094268798828},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.21655872464179993},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.10368114709854126},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.0873289704322815}],"concepts":[{"id":"https://openalex.org/C68649174","wikidata":"https://www.wikidata.org/wiki/Q1379116","display_name":"Base station","level":2,"score":0.8389942049980164},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7770800590515137},{"id":"https://openalex.org/C153646914","wikidata":"https://www.wikidata.org/wiki/Q535695","display_name":"Cellular network","level":2,"score":0.7528409361839294},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7043091058731079},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.6862254738807678},{"id":"https://openalex.org/C31243852","wikidata":"https://www.wikidata.org/wiki/Q1666739","display_name":"Stochastic geometry","level":2,"score":0.6840136051177979},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.6530162692070007},{"id":"https://openalex.org/C138660444","wikidata":"https://www.wikidata.org/wiki/Q5607897","display_name":"Telecommunications link","level":2,"score":0.5371559262275696},{"id":"https://openalex.org/C189693848","wikidata":"https://www.wikidata.org/wiki/Q6031064","display_name":"Information exchange","level":2,"score":0.4966900944709778},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.48567402362823486},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.46705877780914307},{"id":"https://openalex.org/C95491727","wikidata":"https://www.wikidata.org/wiki/Q992968","display_name":"Mobile telephony","level":3,"score":0.4665856957435608},{"id":"https://openalex.org/C2779814227","wikidata":"https://www.wikidata.org/wiki/Q7444882","display_name":"Secure transmission","level":3,"score":0.4222068190574646},{"id":"https://openalex.org/C2780909371","wikidata":"https://www.wikidata.org/wiki/Q4801092","display_name":"Artificial noise","level":4,"score":0.4186200797557831},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.35583657026290894},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2894755005836487},{"id":"https://openalex.org/C2781307350","wikidata":"https://www.wikidata.org/wiki/Q6887221","display_name":"Mobile radio","level":2,"score":0.27818363904953003},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.2752094268798828},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.21655872464179993},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.10368114709854126},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0873289704322815},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/wcnc.2013.6554947","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wcnc.2013.6554947","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 IEEE Wireless Communications and Networking Conference (WCNC)","raw_type":"proceedings-article"},{"id":"pmh:oai:openresearch-repository.anu.edu.au:1885/11595","is_oa":true,"landing_page_url":"http://hdl.handle.net/1885/11595","pdf_url":"https://openresearch-repository.anu.edu.au/bitstreams/fbb4b64a-b2a7-499c-9021-5e567c2a7008/download","source":{"id":"https://openalex.org/S4306402539","display_name":"ANU Open Research (Australian National University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I118347636","host_organization_name":"Australian National University","host_organization_lineage":["https://openalex.org/I118347636"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Wireless Communications and Networking Conference (WCNC), 2013 IEEE","raw_type":"Conference paper"}],"best_oa_location":{"id":"pmh:oai:openresearch-repository.anu.edu.au:1885/11595","is_oa":true,"landing_page_url":"http://hdl.handle.net/1885/11595","pdf_url":"https://openresearch-repository.anu.edu.au/bitstreams/fbb4b64a-b2a7-499c-9021-5e567c2a7008/download","source":{"id":"https://openalex.org/S4306402539","display_name":"ANU Open Research (Australian National University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I118347636","host_organization_name":"Australian National University","host_organization_lineage":["https://openalex.org/I118347636"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Wireless Communications and Networking Conference (WCNC), 2013 IEEE","raw_type":"Conference paper"},"sustainable_development_goals":[{"score":0.6899999976158142,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320315885","display_name":"Australian Government","ror":"https://ror.org/0314h5y94"}],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2028375661.pdf"},"referenced_works_count":32,"referenced_works":["https://openalex.org/W635250944","https://openalex.org/W1971852394","https://openalex.org/W1988334478","https://openalex.org/W2023639446","https://openalex.org/W2043769961","https://openalex.org/W2047663002","https://openalex.org/W2100195693","https://openalex.org/W2102413189","https://openalex.org/W2103836868","https://openalex.org/W2104826846","https://openalex.org/W2109830484","https://openalex.org/W2115724631","https://openalex.org/W2117035673","https://openalex.org/W2118166339","https://openalex.org/W2131603212","https://openalex.org/W2145201392","https://openalex.org/W2149170915","https://openalex.org/W2150166076","https://openalex.org/W2153646424","https://openalex.org/W2156214717","https://openalex.org/W2158092196","https://openalex.org/W2158581494","https://openalex.org/W2158782014","https://openalex.org/W2163185922","https://openalex.org/W2168527529","https://openalex.org/W2296615534","https://openalex.org/W2797024182","https://openalex.org/W3099283425","https://openalex.org/W3100972703","https://openalex.org/W3105072513","https://openalex.org/W4299373987","https://openalex.org/W6697442846"],"related_works":["https://openalex.org/W2290997318","https://openalex.org/W3036307543","https://openalex.org/W4256489728","https://openalex.org/W2953177019","https://openalex.org/W2059799853","https://openalex.org/W1512838724","https://openalex.org/W3089903973","https://openalex.org/W3103244252","https://openalex.org/W2729100477","https://openalex.org/W2799637313"],"abstract_inverted_index":{"This":[0],"paper":[1],"studies":[2],"the":[3,24,41,55,69,86,93,99,102],"information-theoretic":[4],"secrecy":[5,57],"performance":[6],"in":[7],"large-scale":[8],"cellular":[9,42],"networks":[10],"based":[11],"on":[12,54,85],"a":[13,37,65],"stochastic":[14],"geometry":[15],"framework.":[16],"The":[17],"locations":[18],"of":[19,40,59,68,88,104],"both":[20],"base":[21,48,95,110],"stations":[22],"and":[23,50],"mobile":[25,70,105],"users":[26,71],"are":[27,80],"modeled":[28],"as":[29,73],"independent":[30],"two-dimensional":[31],"Poisson":[32],"point":[33],"processes.":[34],"We":[35],"consider":[36],"key":[38],"feature":[39],"network,":[43],"namely,":[44],"information":[45,91,108],"exchange":[46,103],"between":[47,109],"stations,":[49],"characterize":[51],"its":[52],"impact":[53],"achievable":[56],"rate":[58],"an":[60],"arbitrary":[61],"downlink":[62],"transmission":[63],"with":[64],"certain":[66],"portion":[67],"acting":[72],"potential":[74],"eavesdroppers.":[75],"In":[76],"particular,":[77],"analytical":[78],"results":[79],"presented":[81],"under":[82],"diverse":[83],"assumptions":[84],"availability":[87],"eavesdroppers'":[89],"location":[90,107],"at":[92],"serving":[94],"station,":[96],"which":[97],"captures":[98],"benefit":[100],"from":[101],"users'":[106],"stations.":[111]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
