{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T01:07:40Z","timestamp":1760144860219,"version":"build-2065373602"},"reference-count":43,"publisher":"MDPI AG","issue":"11","license":[{"start":{"date-parts":[[2024,5,24]],"date-time":"2024-05-24T00:00:00Z","timestamp":1716508800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"SeoulTech (Seoul National University of Science and Technology)"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>With the increasing demand for data exchange between nearby devices in proximity-based services, enhancing the security of wireless mutual broadcast (WMB) networks is crucial. However, WMB networks are inherently vulnerable to eavesdropping due to the open broadcast nature of their communication. This paper investigates the improvement of secrecy performance in random-access-based WMB (RA-WMB) networks by integrating physical layer security (PLS) techniques with hybrid duplex (HBD) operations under a stochastic geometry framework. The HBD method balances half-duplex (HD) receiving and full-duplex (FD) transceiving, utilizing self-interference cancellation (SIC) to enhance PLS performance. Key operational parameters, including transmission probability (TxPr), friendly jammer density, and conditions for FD operation, are designed to maximize secrecy performance. The analytical and numerical results demonstrate significant improvements in PLS performance, with SIC playing a critical role, particularly in scenarios with dense legitimate nodes, and with TxPr adjusted to balance HD receiving and FD transceiving based on SIC imperfections. The proposed design principles provide a comprehensive framework for enhancing the security of WMB networks, addressing the complex interplay of interference and SIC in various network configurations.<\/jats:p>","DOI":"10.3390\/s24113389","type":"journal-article","created":{"date-parts":[[2024,5,24]],"date-time":"2024-05-24T11:17:52Z","timestamp":1716549472000},"page":"3389","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Secrecy Performance Enhancement Using Self-Interference Cancellation in Wireless Mutual Broadcast Networks for Proximity-Based Services"],"prefix":"10.3390","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6624-4863","authenticated-orcid":false,"given":"Taesoo","family":"Kwon","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Seoul National University of Science and Technology (SeoulTech), Seoul 01811, Republic of Korea"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2988-3874","authenticated-orcid":false,"given":"HyeonWoo","family":"LEE","sequence":"additional","affiliation":[{"name":"Department of Mobile Systems Engineering, Dankook University, Yongin 16890, Republic of Korea"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"1968","published-online":{"date-parts":[[2024,5,24]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3571072","article-title":"Five Facets of 6G: Research Challenges and Opportunities","volume":"55","author":"Shen","year":"2023","journal-title":"ACM Compt. Surv."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"11123","DOI":"10.1109\/JIOT.2021.3051603","article-title":"Supporting IoT With Rate-Splitting Multiple Access in Satellite and Aerial-Integrated Networks","volume":"8","author":"Lin","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"131114","DOI":"10.1109\/ACCESS.2019.2941138","article-title":"Device Discovery in D2D Communication: A Survey","volume":"7","author":"Hayat","year":"2019","journal-title":"IEEE Access"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"84584","DOI":"10.1109\/ACCESS.2020.2991459","article-title":"A Survey on Security and Privacy Challenges in Device Discovery for Next-Generation Systems","volume":"8","author":"Hayat","year":"2020","journal-title":"IEEE Access"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"370","DOI":"10.1109\/TDSC.2020.2989784","article-title":"EAP-DDBA: Efficient Anonymity Proximity Device Discovery and Batch Authentication Mechanism for Massive D2D Communication Devices in 3GPP 5G HetNet","volume":"19","author":"Sun","year":"2022","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"12260","DOI":"10.1109\/ACCESS.2018.2808356","article-title":"A Neighbor-Based Probabilistic Broadcast Protocol for Data Dissemination in Mobile IoT Networks","volume":"8","author":"Liu","year":"2018","journal-title":"IEEE Access"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"811","DOI":"10.1109\/JIOT.2017.2788449","article-title":"BLE Beacons for Internet of Things Applications: Survey, Challenges, and Opportunities","volume":"5","author":"Jeon","year":"2018","journal-title":"IEEE Internet Things J."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"3932","DOI":"10.1109\/JSYST.2017.2764479","article-title":"A Survey of Mobile Social Networks: Applications, Social Characteristics, and Challenges","volume":"12","author":"Qiu","year":"2018","journal-title":"IEEE Syst. J."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"38606","DOI":"10.1109\/ACCESS.2020.2975110","article-title":"Emergency Message Dissemination in Vehicular Networks: A Review","volume":"8","author":"Ghazi","year":"2020","journal-title":"IEEE Access"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"56049","DOI":"10.1109\/ACCESS.2021.3071349","article-title":"Cellular V2X With D2D Communications for Emergency Message Dissemination and QoS Assured Routing in 5G Environment","volume":"9","author":"Alghamdi","year":"2021","journal-title":"IEEE Access"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"917","DOI":"10.1109\/LCOMM.2020.2967382","article-title":"Design Principles for Improving Spatial Secrecy Performance in Random Access based Wireless Mutual Broadcast Networks","volume":"24","author":"Kwon","year":"2020","journal-title":"IEEE Commun. Lett."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","article-title":"The Wire-Tap Channel","volume":"54","author":"Wyner","year":"1975","journal-title":"Bell Syst. Tech. J."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/MWC.2012.6155875","article-title":"Information and Inference in the Wireless Physical Layer","volume":"19","author":"Poor","year":"2012","journal-title":"IEEE Wirel. Commun. Mag."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1109\/COMST.2023.3327327","article-title":"Physical Layer Security for Authentication, Confidentiality, and Malicious Node Detection: A Paradigm Shift in Securing IoT Networks","volume":"26","author":"Illi","year":"2024","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1109\/OJVT.2022.3183218","article-title":"Towards a Unified Framework for Physical Layer Security in 5G and Beyond Networks","volume":"3","author":"Solaija","year":"2022","journal-title":"IEEE Open J. Veh. Technol."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"6345","DOI":"10.1109\/TCOMM.2021.3088898","article-title":"Secrecy-Energy Efficient Hybrid Beamforming for Satellite-Terrestrial Integrated Networks","volume":"69","author":"Lin","year":"2021","journal-title":"IEEE Trans. Commun."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"4133","DOI":"10.1109\/TWC.2021.3126833","article-title":"Robust Design for Intelligent Reflecting Surface-Assisted Secrecy SWIPT network","volume":"21","author":"Niu","year":"2022","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"3402","DOI":"10.1109\/JIOT.2023.3296414","article-title":"Covert mmWave Communications with Finite Blocklength Against Spatially Random Wardens","volume":"11","author":"Ma","year":"2024","journal-title":"IEEE Internet Things J."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"2190","DOI":"10.1109\/COMST.2023.3318198","article-title":"A Comprehensive Survey on Full-Duplex Communication: Current Solutions, Future Trends, and Open Issues","volume":"25","author":"Mohammadi","year":"2023","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"2816","DOI":"10.1109\/TVT.2023.3320907","article-title":"Physical Layer Security in Full-Duplex Millimeter Wave Communication Systems","volume":"73","author":"Ju","year":"2024","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"278","DOI":"10.1109\/TWC.2016.2622689","article-title":"Safeguarding Decentralized Wireless Networks Using Full-Duplex Jamming Receivers","volume":"16","author":"Zheng","year":"2017","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"3827","DOI":"10.1109\/TWC.2017.2689005","article-title":"Physical Layer Security in Wireless Ad Hoc Networks Under A Hybrid Full-\/Half-Duplex Receiver Deployment Strategy","volume":"16","author":"Zheng","year":"2017","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"7982","DOI":"10.1109\/TWC.2017.2755640","article-title":"Physical Layer Security in Heterogeneous Networks with Jammer Selection and Full-Duplex Users","volume":"16","author":"Zheng","year":"2017","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_24","first-page":"3360","article-title":"Theoretical Broadcast Rate Optimization for V2V Communications at Intersection","volume":"21","author":"Kimura","year":"2022","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1109\/JSAC.2015.2452585","article-title":"Enabling Device to Device Broadcast for LTE Cellular Networks","volume":"34","author":"Wu","year":"2016","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"2169","DOI":"10.1109\/ACCESS.2022.3160215","article-title":"Survey on Device to Device (D2D) Communication for 5GB\/6G Networks: Concept, Applications, Challenges, and Future Directions","volume":"10","author":"Gismalla","year":"2022","journal-title":"IEEE Access"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Haenggi, M. (2012). Stochastic Geometry for Wireless Networks, Cambridge University Press.","DOI":"10.1017\/CBO9781139043816"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"4507","DOI":"10.1109\/TWC.2014.2321142","article-title":"Spatial Performance Analysis and Design Principles for Wireless Peer Discovery","volume":"13","author":"Kwon","year":"2014","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"1603","DOI":"10.1109\/LCOMM.2014.2337304","article-title":"Transmission Probability Design for Random Access Based Wireless Peer Discovery","volume":"18","author":"Kwon","year":"2014","journal-title":"IEEE Commun. Lett."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"5695","DOI":"10.1109\/TWC.2016.2568172","article-title":"Performance Analysis of Network-Assisted D2D Discovery in Random Spatial Networks","volume":"15","author":"Xenakis","year":"2016","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"3069","DOI":"10.1109\/TVT.2017.2775249","article-title":"Geo-Location Based Access for Vehicular Communications: Analysis and Optimization via Stochastic Geometry","volume":"67","author":"Soret","year":"2018","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"1821","DOI":"10.1109\/LCOMM.2019.2926976","article-title":"Overall Energy Minimization in the Wireless Peer Discovery System With Multi-Antenna Peers","volume":"23","author":"Ashraf","year":"2019","journal-title":"IEEE Commun. Lett."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"881","DOI":"10.1109\/LCOMM.2016.2645198","article-title":"Wireless Peer Discovery in Heterogeneous Half-\/Full-Duplex Networks","volume":"21","author":"Kong","year":"2017","journal-title":"IEEE Commun. Lett."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"598","DOI":"10.1109\/LCOMM.2017.2780095","article-title":"Hybrid Duplex Wireless Peer Discovery with Imperfect Self-Interference Cancellation","volume":"22","author":"Kwon","year":"2018","journal-title":"IEEE Commun. Lett."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/LCOMM.2016.2625782","article-title":"Transmit Probability Designs for Wireless Peer Discovery with Energy Harvesting","volume":"21","author":"Kang","year":"2017","journal-title":"IEEE Commun. Lett."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"3566","DOI":"10.1109\/ACCESS.2019.2962224","article-title":"Drone-Initiated D2D-Aided Multihop Multicast Networks for Emergency Information Dissemination","volume":"8","author":"Zhou","year":"2020","journal-title":"IEEE Access"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"2180","DOI":"10.1109\/TWC.2008.060848","article-title":"Guaranteeing Secrecy Using Artificial Noise","volume":"7","author":"Goel","year":"2008","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1109\/TIFS.2021.3054507","article-title":"Secure Millimeter-Wave Ad Hoc Communications Using Physical Layer Security","volume":"17","author":"Zhang","year":"2021","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"6663","DOI":"10.1109\/JIOT.2021.3112883","article-title":"3-D Stochastic Geometry-Based Modeling and Performance Analysis of Efficient Security Enhancement Scheme for IoT Systems","volume":"9","author":"Chamkhia","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"592","DOI":"10.1109\/TWC.2023.3280464","article-title":"Securing Large-Scale D2D Networks Using Covert Communication and Friendly Jamming","volume":"23","author":"Feng","year":"2024","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Wang, C., Li, Z., Shi, J., Si, J., and Ng, D.W.K. (2020, January 7\u201311). Physical Layer Security of Vehicular Networks: A Stochastic Geometry Approach. Proceedings of the 2020 IEEE International Conference on Communications Workshops (ICC Workshops), Dublin, Ireland.","DOI":"10.1109\/ICCWorkshops49005.2020.9145312"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"4038","DOI":"10.1109\/TCOMM.2022.3167047","article-title":"Physical Layer Security in Large-Scale Random Multiple Access Wireless Sensor Networks: A Stochastic Geometry Approach","volume":"70","author":"Zheng","year":"2022","journal-title":"IEEE Trans. Commun."},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"B\u0142aszczyszyn, B., Karray, M.K., and Keeler, H.P. (2013, January 14\u201319). Using Poisson Processes to Model Lattice Cellular Networks. Proceedings of the 2013 IEEE International Conference on Computer Communications (INFOCOM), Turin, Italy.","DOI":"10.1109\/INFCOM.2013.6566864"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/24\/11\/3389\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T14:48:18Z","timestamp":1760107698000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/24\/11\/3389"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,24]]},"references-count":43,"journal-issue":{"issue":"11","published-online":{"date-parts":[[2024,6]]}},"alternative-id":["s24113389"],"URL":"https:\/\/doi.org\/10.3390\/s24113389","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2024,5,24]]}}}