scholarly journals On the Zero-Outage Secrecy-Capacity of Dependent Fading Wiretap Channels

Entropy ◽  
2022 ◽  
Vol 24 (1) ◽  
pp. 99
Author(s):  
Eduard Jorswieck ◽  
Pin-Hsun Lin ◽  
Karl-Ludwig Besser

It is known that for a slow fading Gaussian wiretap channel without channel state information at the transmitter and with statistically independent fading channels, the outage probability of any given target secrecy rate is non-zero, in general. This implies that the so-called zero-outage secrecy capacity (ZOSC) is zero and we cannot transmit at any positive data rate reliably and confidentially. When the fading legitimate and eavesdropper channels are statistically dependent, this conclusion changes significantly. Our work shows that there exist dependency structures for which positive zero-outage secrecy rates (ZOSR) are achievable. In this paper, we are interested in the characterization of these dependency structures and we study the system parameters in terms of the number of observations at legitimate receiver and eavesdropper as well as average channel gains for which positive ZOSR are achieved. First, we consider the setting that there are two paths from the transmitter to the legitimate receiver and one path to the eavesdropper. We show that by introducing a proper dependence structure among the fading gains of the three paths, we can achieve a zero secrecy outage probability (SOP) for some positive secrecy rate. In this way, we can achieve a non-zero ZOSR. We conjecture that the proposed dependency structure achieves maximum ZOSR. To better understand the underlying dependence structure, we further consider the case where the channel gains are from finite alphabets and systematically and globally solve the ZOSC. In addition, we apply the rearrangement algorithm to solve the ZOSR for continuous channel gains. The results indicate that the legitimate link must have an advantage in terms of the number of antennas and average channel gains to obtain positive ZOSR. The results motivate further studies into the optimal dependency structures.

2021 ◽  
Author(s):  
Shinya Sugiura

<p>In this paper, we investigate the information-theoretic secrecy performance of recent precoded faster-than-Nyquist signaling (FTN) with the aid of optimal power allocation in eigenspace. More specifically, the secrecy rate and secrecy outage probability of a fading wiretap channel, which was derived for classical Nyquist-based orthogonal signaling transmission ,is extended to those of our eigen decomposition-based FTN (E-FTN) signaling for a quasi-static frequency-flat Rayleigh fading channel. Our performance results demonstrate that the proposed E-FTN signaling scheme exhibits improvements in secrecy rate and secrecy outage probability over conventional Nyquist-based and FTN signaling transmissions. We also show that the same benefits as those of single-carrier E-FTN signaling are attainable by its non-orthogonal multicarrier counterpart, where subcarrier spacing is set lower than that of orthogonal frequency-division multiplexing.<br></p><p><br></p><p>Postprint accepted on 1 April 2021 for publication in IEEE Transactions on Wireless Communications (DOI: 10.1109/TWC.2021.3070891). (c) 2021 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.</p>


In wireless data transmission, providing security over communication channels has become a growing concern. Traditionally cryptography is used to provide secrecy. However, physical layer studies show that it allows a huge potential in providing secrecy. In this paper, secrecy outage probability is derived for Rician fading channels. A new secrecy metric Generalized Secrecy Outage Probability(GSOP) derivation is considered to overcome the limitation of traditional Outage probability for both passive and active cases of eavesdropping.


2017 ◽  
Vol 2017 ◽  
pp. 1-11
Author(s):  
Makan Zamanipour

The paper principally proposes a suboptimally closed-form solution in terms of a general asymptotic bound of the secrecy capacity in relation to MIMOME-based transceivers. Such pivotal solution is essentially tight as well, fundamentally originating from the principle convexity. The resultant novelty, per se, is strictly necessary since the absolutely central criterion imperfect knowledge of the wiretap channel at the transmitter should also be highly regarded. Meanwhile, ellipsoidal channel uncertainty set-driven strategies are physically taken into consideration. Our proposed solution is capable of perfectly being applied for other general equilibria such as multiuser ones. In fact, this in principle addresses an entirely appropriate alternative for worst-case method-driven algorithms utilising some provable inequality-based mathematical expressions. Our framework is adequately guaranteed regarding a totally acceptable outage probability (as 1 − preciseness coefficient). The relative value is almost 10% for the estimation error values (EEVs) ⩽0.5 for 2×2-based transceivers, which is noticeably reinforced at nearly 5% for EEVs  ⩽0.9 for the case 4×4. Furthermore, our proposed scheme basically guarantees the secrecy outage probability (SOP) less than 0.05% for the case of having EEVs ⩽0.3, for the higher power regime.


2021 ◽  
Vol 13 (8) ◽  
pp. 205
Author(s):  
Deemah Tashman ◽  
Walaa Hamouda

In this paper, the physical-layer security for a three-node wiretap system model is studied. Under the threat of multiple eavesdroppers, it is presumed that a transmitter is communicating with a legitimate receiver. The channels are assumed to be following cascaded κ-μ fading distributions. In addition, two scenarios for eavesdroppers’ interception and information-processing capabilities are investigated: colluding and non-colluding eavesdroppers. The positions of these eavesdroppers are assumed to be random in the non-colluding eavesdropping scenario, based on a homogeneous Poisson point process (HPPP). The security is examined in terms of the secrecy outage probability, the probability of non-zero secrecy capacity, and the intercept probability. The exact and asymptotic expressions for the secrecy outage probability and the probability of non-zero secrecy capacity are derived. The results demonstrate the effect of the cascade level on security. Additionally, the results indicate that as the number of eavesdroppers rises, the privacy of signals exchanged between legitimate ends deteriorates. Furthermore, in this paper, regarding the capabilities of tapping and processing the information, we provide a comparison between colluding and non-colluding eavesdropping.


Entropy ◽  
2019 ◽  
Vol 21 (10) ◽  
pp. 998 ◽  
Author(s):  
Sheng-Hong Lin ◽  
Rong-Rong Lu ◽  
Xian-Tao Fu ◽  
An-Ling Tong ◽  
Jin-Yuan Wang

In this paper, the physical layer security over the M-distributed fading channel is investigated. Initially, an exact expression of secrecy outage probability (SOP) is derived, which has an integral term. To get a closed-form expression, a lower bound of SOP is obtained. After that, the exact expression for the probability of strictly positive secrecy capacity (SPSC) is derived, which is in closed-form. Finally, an exact expression of ergodic secrecy capacity (ESC) is derived, which has two integral terms. To reduce its computational complexity, a closed-from expression for the lower bound of ESC is obtained. As special cases of M-distributed fading channels, the secure performance of the K, exponential, and Gamma-Gamma fading channels are also derived, respectively. Numerical results show that all theoretical results match well with Monte-Carlo simulation results. Specifically, when the average signal-to-noise ratio of main channel is larger than 40 dB, the relative errors for the lower bound of SOP, the probability of SPSC, and the lower bound of ESC are less than 1.936%, 6.753%, and 1.845%, respectively. This indicates that the derived theoretical expressions can be directly used to evaluate system performance without time-consuming simulations. Moreover, the derived results regarding parameters that influence the secrecy performance will enable system designers to quickly determine the optimal available parameter choices when facing different security risks.


Sign in / Sign up

Export Citation Format

Share Document