1,620 research outputs found
Security Performance Analysis of Physical Layer over Fisher-Snedecor Fading Channels
In this letter, the performance analysis of physical layer security over
Fisher-Snedecor fading channels is investigated. In particular,
the average secrecy capacity (ASC), the secure outage probability (SOP), the
lower bound of the SOP (SOP), and the strictly positive secure capacity
(SPSC) are derived in exact closed-from expressions. The Fisher-Snedecor
fading channel is a composite of multipath/shadowed fading that
are represented by the Nakagami- distribution. Moreover, it provides close
results to the practical measurements than the generalised () fading
channels. To validate our analysis, the numerical results are affirmed by the
Monte Carlo simulations.Comment: 4 pages, 5 figure
Secrecy Outage Analysis over Correlated Composite Nakagami-/Gamma Fading Channels
The secrecy outage performance of wireless communication systems operating
over spatially correlated composite fading channels is analyzed in this paper.
We adopt a multiplicative composite channel model for both the legitimate
communication link and the link between the eavesdropper and the legitimate
transmitter, consisting of Nakagami- distributed small-scale fading and
shadowing (large-scale fading) modeled by the Gamma distribution. We consider
the realistic case where small-scale fading between the links is independent,
but shadowing is arbitrarily correlated, and present novel analytical
expressions for the probability that the secrecy capacity falls below a target
secrecy rate. The presented numerically evaluated results, verified by
equivalent computer simulations, offer useful insights on the impact of
shadowing correlation and composite fading parameters on the system's secrecy
outage performance.Comment: 5 pages; 2 figures; accepted to IEEE journal 201
Secure Analysis Over Generalized-K Channels
In this letter, we adopt the SOP definition in [4] and the simplified model
of [8], and derive a closed-form expression for the proposed SOP over GK fading
channels. To simplify this expression and obtain additional insights, we also
perform an asymptotic analysis of the main link in the high SNR region.Comment: 1 figure, 3 page
Information-Theoretic Security of MIMO Networks under - Shadowed Fading Channels
This paper investigates the impact of realistic propagation conditions on the
achievable secrecy performance of multiple-input multiple-output systems in the
presence of an eavesdropper. Specifically, we concentrate on the -
shadowed fading model because its physical underpinnings capture a wide range
of propagation conditions, while, at the same time, it allows for much better
tractability than other state-of-the-art fading models. By considering transmit
antenna selection and maximal ratio combining reception at the legitimate and
eavesdropper's receiver sides, we study two relevant scenarios the
transmitter does not know the eavesdropper's channel state information (CSI),
and the transmitter has knowledge of the CSI of the eavesdropper link.
For this purpose, we first obtain novel and tractable expressions for the
statistics of the maximum of independent and identically distributed (i.i.d.)
variates related to the legitimate path. Based on these results, we derive
novel closed-form expressions for the secrecy outage probability (SOP) and the
average secrecy capacity (ASC) to assess the secrecy performance in passive and
active eavesdropping scenarios, respectively. Moreover, we develop analytical
asymptotic expressions of the SOP and ASC at the high signal-to-noise ratio
regime. In all instances, secrecy performance metrics are characterized in
closed-form, without requiring the evaluation of Meijer or Fox functions. Some
useful insights on how the different propagation conditions and the number of
antennas impact the secrecy performance are also provided
Effective Capacity in Wireless Networks: A Comprehensive Survey
Low latency applications, such as multimedia communications, autonomous
vehicles, and Tactile Internet are the emerging applications for
next-generation wireless networks, such as 5th generation (5G) mobile networks.
Existing physical-layer channel models, however, do not explicitly consider
quality-of-service (QoS) aware related parameters under specific delay
constraints. To investigate the performance of low-latency applications in
future networks, a new mathematical framework is needed. Effective capacity
(EC), which is a link-layer channel model with QoS-awareness, can be used to
investigate the performance of wireless networks under certain statistical
delay constraints. In this paper, we provide a comprehensive survey on existing
works, that use the EC model in various wireless networks. We summarize the
work related to EC for different networks such as cognitive radio networks
(CRNs), cellular networks, relay networks, adhoc networks, and mesh networks.
We explore five case studies encompassing EC operation with different design
and architectural requirements. We survey various delay-sensitive applications
such as voice and video with their EC analysis under certain delay constraints.
We finally present the future research directions with open issues covering EC
maximization
Physical Layer Security over Fluctuating Two-Ray Fading Channels
Ensuring the physical layer security (PHY-security) of millimeter wave
(mmWave) communications is one of the key factors for the success of 5G. Recent
field measurements show that conventional fading models cannot accurately model
the random fluctuations of mmWave signals. To tackle this challenge, the
fluctuating two-ray (FTR) fading model has been proposed. In this
correspondence, we comprehensively analyze the PHY-security in mmWave
communications over FTR fading channels. More specifically, we derive
analytical expressions for significant PHY-security metrics, such as average
secrecy capacity, secrecy outage probability, and the probability of strictly
positive secrecy capacity, with simple functions. The effect of channel
parameters on the PHY-security has been validated by numerical results.Comment: 5 pages, 4 figures, to appear in IEEE Transactions on Vehicular
Technolog
Closed-Form Expressions for Secrecy Capacity over Correlated Rayleigh Fading Channels
We investigate the secure communications over correlated wiretap Rayleigh
fading channels assuming the full channel state information (CSI) available.
Based on the information theoretic formulation, we derive closed-form
expressions for the average secrecy capacity and the outage probability.
Simulation results confirm our analytical expressions.Comment: 2 figure
Enhanced Transmit Antenna Selection Scheme for Secure Throughput Maximization Without CSI at the Transmitter and its Applications on Smart Grids
This paper addresses the establishment of secure communication links between
smart-meters (Alice) and an aggregator (Bob) in the presence of an eavesdropper
(Eve). The proposed scenario assumes: (i) MIMOME wiretap channel; (ii) transmit
antenna selection at the Alice; (iii) no channel state information at the
transmitter; (iv) fixed Wyner codes; and (v) guarantee of secure throughput by
both quality of service and secrecy outage constraints. We propose a simple
protocol to enhance security via transmit antenna selection, and then assess
its performance in closed-form by means of secrecy outage and successful
transmission probabilities. We assume these probabilities are our constraints
and then maximize the secure throughput, establishing a security-reliability
trade-off for the proposed scenario. Our numerical results illustrate the
effect of this trade-off on the secure throughput as well as on the number of
antennas at Alice, Bob and Eve. Interestingly, a small sacrifice in reliability
allows secrecy enhancement in terms of secure bps/Hz. We apply this idea in our
smart grid application to exemplify that, although Eve may acquire some samples
of the average power demand of a household, it is not enough to properly
reconstruct such curve
Secrecy Analysis of Random MIMO Wireless Networks over - Fading Channels
In this paper, we investigate the secrecy performance of stochastic MIMO
wireless networks over small-scale - fading channels, where both
the legitimate receivers and eavesdroppers are distributed with two independent
homogeneous Poisson point processes (HPPPs). Specifically, accounting for the
presence of non-colluding eavesdroppers, secrecy performance metrics, including
the connection outage probability (COP), the probability of non-zero secrecy
capacity (PNZ) and ergodic secrecy capacity, are derived regarding the -th
nearest/best user cases. The index for the -th nearest user is extracted
from the ordering, in terms of the distances between transmitters and
receivers, whereas that for the -th best user is based on the combined
effects of path-loss and small-scale fading. In particular, the probability
density functions (PDFs) and cumulative distribution functions (CDFs) of the
composite channel gain, for the -th nearest and best user, are
characterized, respectively. Benefiting from these results, closed-form
representations of the COP, PNZ and ergodic secrecy capacity are subsequently
obtained. Furthermore, a limit on the maximal number of the best-ordered users
is also computed, for a given secrecy outage constraint. Finally, numerical
results are provided to verify the correctness of our derivations.
Additionally, the effects of fading parameters, path-loss exponent, and density
ratios are also analyzed
On Secure Mixed RF-FSO Systems With TAS and Imperfect CSI
In this work, we analyze the secrecy outage performance of a dual-hop relay
system composed of multiple-input-multiple-output radio-frequency (RF) links
and a free-space optical (FSO) link while a multiple-antenna eavesdropper
wiretaps the confidential information by decoding the received signals from the
resource node. The channel state information (CSI) of the RF and FSO links is
considered to be outdated. We propose three transmit antenna selection (TAS)
schemes to enhance the secrecy performance of the considered systems. The
secrecy outage performance with different TAS schemes is analyzed and the
effects of misalignment and detection technology on the secrecy outage
performance of mixed systems are studied. We derive the closed-form expressions
for probability density function (PDF) and cumulative distribution function
(CDF) over M\'alaga channel with imperfect CSI. Then the closed-form
expressions for the CDF and PDF of the equivalent signal-to-noise ratio (SNR)
at the legitimate receiver over Nakagami- and M\'alaga channels are derived.
Furthermore, the lower bound of the secrecy outage probability (SOP) with
different TAS schemes are derived. Besides, the asymptotic results for SOP are
investigated by exploiting the unfolding of Meijer's -function when the
electrical SNR of FSO link approaches infinity. Finally, Monte-Carlo simulation
results are presented to testify the correctness of the proposed analysis. The
results illustrate that the outdated CSI shows a strong effect on the secrecy
outage performance. In addition, increasing the number of antennas at the
source cannot significantly enhance the secrecy performance of the considered
systems.Comment: 14 pages, to appear in the IEEE Transactions on Communication
- …