1,620 research outputs found

    Security Performance Analysis of Physical Layer over Fisher-Snedecor F\mathcal{F} Fading Channels

    Full text link
    In this letter, the performance analysis of physical layer security over Fisher-Snedecor F\mathcal{F} fading channels is investigated. In particular, the average secrecy capacity (ASC), the secure outage probability (SOP), the lower bound of the SOP (SOPL^L), and the strictly positive secure capacity (SPSC) are derived in exact closed-from expressions. The Fisher-Snedecor F\mathcal{F} fading channel is a composite of multipath/shadowed fading that are represented by the Nakagami-mm distribution. Moreover, it provides close results to the practical measurements than the generalised KK (KGK_G) fading channels. To validate our analysis, the numerical results are affirmed by the Monte Carlo simulations.Comment: 4 pages, 5 figure

    Secrecy Outage Analysis over Correlated Composite Nakagami-mm/Gamma Fading Channels

    Full text link
    The secrecy outage performance of wireless communication systems operating over spatially correlated composite fading channels is analyzed in this paper. We adopt a multiplicative composite channel model for both the legitimate communication link and the link between the eavesdropper and the legitimate transmitter, consisting of Nakagami-mm distributed small-scale fading and shadowing (large-scale fading) modeled by the Gamma distribution. We consider the realistic case where small-scale fading between the links is independent, but shadowing is arbitrarily correlated, and present novel analytical expressions for the probability that the secrecy capacity falls below a target secrecy rate. The presented numerically evaluated results, verified by equivalent computer simulations, offer useful insights on the impact of shadowing correlation and composite fading parameters on the system's secrecy outage performance.Comment: 5 pages; 2 figures; accepted to IEEE journal 201

    Secure Analysis Over Generalized-K Channels

    Full text link
    In this letter, we adopt the SOP definition in [4] and the simplified model of [8], and derive a closed-form expression for the proposed SOP over GK fading channels. To simplify this expression and obtain additional insights, we also perform an asymptotic analysis of the main link in the high SNR region.Comment: 1 figure, 3 page

    Information-Theoretic Security of MIMO Networks under κ\kappa-μ\mu Shadowed Fading Channels

    Full text link
    This paper investigates the impact of realistic propagation conditions on the achievable secrecy performance of multiple-input multiple-output systems in the presence of an eavesdropper. Specifically, we concentrate on the κ\kappa-μ\mu shadowed fading model because its physical underpinnings capture a wide range of propagation conditions, while, at the same time, it allows for much better tractability than other state-of-the-art fading models. By considering transmit antenna selection and maximal ratio combining reception at the legitimate and eavesdropper's receiver sides, we study two relevant scenarios (i)(i) the transmitter does not know the eavesdropper's channel state information (CSI), and (ii)(ii) the transmitter has knowledge of the CSI of the eavesdropper link. For this purpose, we first obtain novel and tractable expressions for the statistics of the maximum of independent and identically distributed (i.i.d.) variates related to the legitimate path. Based on these results, we derive novel closed-form expressions for the secrecy outage probability (SOP) and the average secrecy capacity (ASC) to assess the secrecy performance in passive and active eavesdropping scenarios, respectively. Moreover, we develop analytical asymptotic expressions of the SOP and ASC at the high signal-to-noise ratio regime. In all instances, secrecy performance metrics are characterized in closed-form, without requiring the evaluation of Meijer or Fox functions. Some useful insights on how the different propagation conditions and the number of antennas impact the secrecy performance are also provided

    Effective Capacity in Wireless Networks: A Comprehensive Survey

    Full text link
    Low latency applications, such as multimedia communications, autonomous vehicles, and Tactile Internet are the emerging applications for next-generation wireless networks, such as 5th generation (5G) mobile networks. Existing physical-layer channel models, however, do not explicitly consider quality-of-service (QoS) aware related parameters under specific delay constraints. To investigate the performance of low-latency applications in future networks, a new mathematical framework is needed. Effective capacity (EC), which is a link-layer channel model with QoS-awareness, can be used to investigate the performance of wireless networks under certain statistical delay constraints. In this paper, we provide a comprehensive survey on existing works, that use the EC model in various wireless networks. We summarize the work related to EC for different networks such as cognitive radio networks (CRNs), cellular networks, relay networks, adhoc networks, and mesh networks. We explore five case studies encompassing EC operation with different design and architectural requirements. We survey various delay-sensitive applications such as voice and video with their EC analysis under certain delay constraints. We finally present the future research directions with open issues covering EC maximization

    Physical Layer Security over Fluctuating Two-Ray Fading Channels

    Full text link
    Ensuring the physical layer security (PHY-security) of millimeter wave (mmWave) communications is one of the key factors for the success of 5G. Recent field measurements show that conventional fading models cannot accurately model the random fluctuations of mmWave signals. To tackle this challenge, the fluctuating two-ray (FTR) fading model has been proposed. In this correspondence, we comprehensively analyze the PHY-security in mmWave communications over FTR fading channels. More specifically, we derive analytical expressions for significant PHY-security metrics, such as average secrecy capacity, secrecy outage probability, and the probability of strictly positive secrecy capacity, with simple functions. The effect of channel parameters on the PHY-security has been validated by numerical results.Comment: 5 pages, 4 figures, to appear in IEEE Transactions on Vehicular Technolog

    Closed-Form Expressions for Secrecy Capacity over Correlated Rayleigh Fading Channels

    Full text link
    We investigate the secure communications over correlated wiretap Rayleigh fading channels assuming the full channel state information (CSI) available. Based on the information theoretic formulation, we derive closed-form expressions for the average secrecy capacity and the outage probability. Simulation results confirm our analytical expressions.Comment: 2 figure

    Enhanced Transmit Antenna Selection Scheme for Secure Throughput Maximization Without CSI at the Transmitter and its Applications on Smart Grids

    Full text link
    This paper addresses the establishment of secure communication links between smart-meters (Alice) and an aggregator (Bob) in the presence of an eavesdropper (Eve). The proposed scenario assumes: (i) MIMOME wiretap channel; (ii) transmit antenna selection at the Alice; (iii) no channel state information at the transmitter; (iv) fixed Wyner codes; and (v) guarantee of secure throughput by both quality of service and secrecy outage constraints. We propose a simple protocol to enhance security via transmit antenna selection, and then assess its performance in closed-form by means of secrecy outage and successful transmission probabilities. We assume these probabilities are our constraints and then maximize the secure throughput, establishing a security-reliability trade-off for the proposed scenario. Our numerical results illustrate the effect of this trade-off on the secure throughput as well as on the number of antennas at Alice, Bob and Eve. Interestingly, a small sacrifice in reliability allows secrecy enhancement in terms of secure bps/Hz. We apply this idea in our smart grid application to exemplify that, although Eve may acquire some samples of the average power demand of a household, it is not enough to properly reconstruct such curve

    Secrecy Analysis of Random MIMO Wireless Networks over α\alpha-μ\mu Fading Channels

    Full text link
    In this paper, we investigate the secrecy performance of stochastic MIMO wireless networks over small-scale α\alpha-μ\mu fading channels, where both the legitimate receivers and eavesdroppers are distributed with two independent homogeneous Poisson point processes (HPPPs). Specifically, accounting for the presence of non-colluding eavesdroppers, secrecy performance metrics, including the connection outage probability (COP), the probability of non-zero secrecy capacity (PNZ) and ergodic secrecy capacity, are derived regarding the kk-th nearest/best user cases. The index for the kk-th nearest user is extracted from the ordering, in terms of the distances between transmitters and receivers, whereas that for the kk-th best user is based on the combined effects of path-loss and small-scale fading. In particular, the probability density functions (PDFs) and cumulative distribution functions (CDFs) of the composite channel gain, for the kk-th nearest and best user, are characterized, respectively. Benefiting from these results, closed-form representations of the COP, PNZ and ergodic secrecy capacity are subsequently obtained. Furthermore, a limit on the maximal number of the best-ordered users is also computed, for a given secrecy outage constraint. Finally, numerical results are provided to verify the correctness of our derivations. Additionally, the effects of fading parameters, path-loss exponent, and density ratios are also analyzed

    On Secure Mixed RF-FSO Systems With TAS and Imperfect CSI

    Full text link
    In this work, we analyze the secrecy outage performance of a dual-hop relay system composed of multiple-input-multiple-output radio-frequency (RF) links and a free-space optical (FSO) link while a multiple-antenna eavesdropper wiretaps the confidential information by decoding the received signals from the resource node. The channel state information (CSI) of the RF and FSO links is considered to be outdated. We propose three transmit antenna selection (TAS) schemes to enhance the secrecy performance of the considered systems. The secrecy outage performance with different TAS schemes is analyzed and the effects of misalignment and detection technology on the secrecy outage performance of mixed systems are studied. We derive the closed-form expressions for probability density function (PDF) and cumulative distribution function (CDF) over M\'alaga channel with imperfect CSI. Then the closed-form expressions for the CDF and PDF of the equivalent signal-to-noise ratio (SNR) at the legitimate receiver over Nakagami-mm and M\'alaga channels are derived. Furthermore, the lower bound of the secrecy outage probability (SOP) with different TAS schemes are derived. Besides, the asymptotic results for SOP are investigated by exploiting the unfolding of Meijer's GG-function when the electrical SNR of FSO link approaches infinity. Finally, Monte-Carlo simulation results are presented to testify the correctness of the proposed analysis. The results illustrate that the outdated CSI shows a strong effect on the secrecy outage performance. In addition, increasing the number of antennas at the source cannot significantly enhance the secrecy performance of the considered systems.Comment: 14 pages, to appear in the IEEE Transactions on Communication
    • …
    corecore