In this paper, we investigate and analyze the performance of a wireless system with caching capabilities while imposing secrecy constraints at one of the users. A dedicated user with secrecy constraints is always served by a helper/access point that transmits its external non-cacheable bursty traffic. A second user, with no secrecy constraints, receives cacheable content either from the helper or the core network through a macrocell base station. This non-dedicated user is served by the cellular network if it cannot find the requested content in the helpers cache. The presence of an eavesdropper trying to decode the content for the dedicated user affects the performance of the system in terms of average throughput and delay while allocated transmission power, request, and caching characteristics vary.
Funding Agencies|Horizon 2020 Marie Sklodowska-Curie Actions project WiVi-2020 [H2020-MSCA-ITN-2014-EID 642743-WiVi-2020]; ELLIIT; CENIIT; Swedish Foundation for Strategic ResearchSwedish Foundation for Strategic Research