scholarly journals Physical-Layer Security Analysis over M-Distributed Fading Channels

Entropy ◽  
2019 ◽  
Vol 21 (10) ◽  
pp. 998 ◽  
Author(s):  
Sheng-Hong Lin ◽  
Rong-Rong Lu ◽  
Xian-Tao Fu ◽  
An-Ling Tong ◽  
Jin-Yuan Wang

In this paper, the physical layer security over the M-distributed fading channel is investigated. Initially, an exact expression of secrecy outage probability (SOP) is derived, which has an integral term. To get a closed-form expression, a lower bound of SOP is obtained. After that, the exact expression for the probability of strictly positive secrecy capacity (SPSC) is derived, which is in closed-form. Finally, an exact expression of ergodic secrecy capacity (ESC) is derived, which has two integral terms. To reduce its computational complexity, a closed-from expression for the lower bound of ESC is obtained. As special cases of M-distributed fading channels, the secure performance of the K, exponential, and Gamma-Gamma fading channels are also derived, respectively. Numerical results show that all theoretical results match well with Monte-Carlo simulation results. Specifically, when the average signal-to-noise ratio of main channel is larger than 40 dB, the relative errors for the lower bound of SOP, the probability of SPSC, and the lower bound of ESC are less than 1.936%, 6.753%, and 1.845%, respectively. This indicates that the derived theoretical expressions can be directly used to evaluate system performance without time-consuming simulations. Moreover, the derived results regarding parameters that influence the secrecy performance will enable system designers to quickly determine the optimal available parameter choices when facing different security risks.

2021 ◽  
Vol 13 (8) ◽  
pp. 205
Author(s):  
Deemah Tashman ◽  
Walaa Hamouda

In this paper, the physical-layer security for a three-node wiretap system model is studied. Under the threat of multiple eavesdroppers, it is presumed that a transmitter is communicating with a legitimate receiver. The channels are assumed to be following cascaded κ-μ fading distributions. In addition, two scenarios for eavesdroppers’ interception and information-processing capabilities are investigated: colluding and non-colluding eavesdroppers. The positions of these eavesdroppers are assumed to be random in the non-colluding eavesdropping scenario, based on a homogeneous Poisson point process (HPPP). The security is examined in terms of the secrecy outage probability, the probability of non-zero secrecy capacity, and the intercept probability. The exact and asymptotic expressions for the secrecy outage probability and the probability of non-zero secrecy capacity are derived. The results demonstrate the effect of the cascade level on security. Additionally, the results indicate that as the number of eavesdroppers rises, the privacy of signals exchanged between legitimate ends deteriorates. Furthermore, in this paper, regarding the capabilities of tapping and processing the information, we provide a comparison between colluding and non-colluding eavesdropping.


Author(s):  
Long Kong ◽  
Yun Ai ◽  
Lei Lei ◽  
Georges Kaddoum ◽  
Symeon Chatzinotas ◽  
...  

AbstractPhysical layer security (PLS) has been proposed to afford an extra layer of security on top of the conventional cryptographic techniques. Unlike the conventional complexity-based cryptographic techniques at the upper layers, physical layer security exploits the characteristics of wireless channels, e.g., fading, noise, interference, etc., to enhance wireless security. It is proved that secure transmission can benefit from fading channels. Accordingly, numerous researchers have explored what fading can offer for physical layer security, especially the investigation of physical layer security over wiretap fading channels. Therefore, this paper aims at reviewing the existing and ongoing research works on this topic. More specifically, we present a classification of research works in terms of the four categories of fading models: (i) small-scale, (ii) large-scale, (iii) composite, and (iv) cascaded. To elaborate these fading models with a generic and flexible tool, three promising candidates, including the mixture gamma (MG), mixture of Gaussian (MoG), and Fox’s H-function distributions, are comprehensively examined and compared. Their advantages and limitations are further demonstrated via security performance metrics, which are designed as vivid indicators to measure how perfect secrecy is ensured. Two clusters of secrecy metrics, namely (i) secrecy outage probability (SOP), and the lower bound of SOP; and (ii) the probability of nonzero secrecy capacity (PNZ), the intercept probability, average secrecy capacity (ASC), and ergodic secrecy capacity, are displayed and, respectively, deployed in passive and active eavesdropping scenarios. Apart from those, revisiting the secrecy enhancement techniques based on Wyner’s wiretap model, the on-off transmission scheme, jamming approach, antenna selection, and security region are discussed.


2020 ◽  
Author(s):  
Yebo Gu ◽  
Zhilu Wu ◽  
Zhendong Yin ◽  
Bowen Huang

Abstract The secure transmission problem of MIMO wireless system in fading channels is studied in this paper. We add a secrecy capacity optimization artificial noise(SCO-AN) to the transported signal for improving the security performance of the system. The closed-form expression of secrecy capacity's lower bound is obtained. Base on the closed-form expression of secrecy capacity's lower bound, We optimize the power allocation between the information-bearing signal and the SCO-AN. By calculating, the optimal ratio of power alloation betwenn the information-bearing signal and the SCO-AN is obtained. Through simulation, the results shows the secrecy capacity increases with more receiving antennas and less eavesdropping antennas.And more power should be allocated to the SCO-AN with the increase of the colluding eavedroppers.More over, we study the effect of channel estimation error on power allocation between information-bearing signal and SCO-AN and find that more power should be allocated to decrease eavesdroppers capacity if the channel estimation is not perfect.


2014 ◽  
Vol 2014 ◽  
pp. 1-8 ◽  
Author(s):  
Celia García-Corrales ◽  
Francisco J. Cañete ◽  
José F. Paris

The ergodic capacity of fading channels modeled with aκ-μshadowed distribution is investigated to derive closed-form expressions. Theκ-μshadowed distribution is of particular interest because it contains, as special cases, other classical ones like one-side Gaussian, Rayleigh, Rician, Nakagami-m,κ-μ, and Rician shadowed distributions. The paper discusses the physical meaning of the distribution parameter variations and also their impact on the channel capacity. These results can be used to study the behavior of different channels like the ones in underwater acoustic communications, land mobile satellite systems, body centric communications, and other wireless communication applications. The analytical closed-form expression results are validated with numerical simulations.


2021 ◽  
Author(s):  
Wided Hadj Alouane

Abstract In this paper, we investigate the physical layer security in cooperative non-orthogonal multiple access (NOMA) networks over Nakagamim fading channels. Both amplify-and-forward (AF) and decode-and-forward (DF) protocols are studied. More particularly, closed-form exact and asymptotic expressions for strictly positive secrecy capacity are provided considering NOMA-AF and NOMA-DF relaying systems. Numerical results are presented to justify the accuracy of the obtained theoretical analysis. These results show that NOMA-AF and NOMA-DF relaying networks have a similar secrecy performance.


Sign in / Sign up

Export Citation Format

Share Document