47 research outputs found

    A New Secure Transmission Scheme With Outdated Antenna Selection

    Get PDF
    We propose a new secure transmission scheme in the multi-input multi-output multi-eavesdropper wiretap channel. In this channel, the NA-antenna transmitter adopts transmit antenna selection (TAS) to choose the antenna that maximizes the instantaneous signal-to-noise ratio (SNR) at the receiver to transmit, while the NB-antenna receiver and the NE-antenna eavesdropper adopt maximal-ratio combining (MRC) to combine the received signals. We focus on the practical scenario where the channel state information (CSI) during the TAS process is outdated. In this scenario, we propose a new transmission scheme to prevent the detrimental effect of the outdated CSI on the wiretap codes design at the transmitter. To thoroughly assess the secrecy performance achieved by the proposed scheme, we derive new closed-form expressions for the exact secrecy outage probability and the probability of non-zero secrecy capacity for arbitrary SNRs. We also derive new compact expressions for the asymptotic secrecy outage probability at high SNRs. Notably, in the analysis we take spatial correlation at the receiver into consideration. Apart from the advantage of our scheme over the conventional TAS/MRC scheme, we demonstrate that the outdated TAS reduces the secrecy diversity order from NANB to NB. We also demonstrate that antenna correlation improves the secrecy performance at low SNR but deteriorates the secrecy performance at medium and high SNRs, by affecting the secrecy array gain only.ARC Discovery Projects Grant DP150103905

    Secure Multiple Amplify-and-Forward Relaying Over Correlated Fading Channels

    Get PDF
    This paper quantifies the impact of correlated fading on secure communication of multiple amplify-and-forward (AF) relaying networks. In such a network, the base station (BS) is equipped with multiple antennas and communicates with the destination through multiple AF relays, while the message from the relays can be overheard by an eavesdropper. We focus on the practical communication scenario, where the main and eavesdropper’s channels are correlated. In order to enhance the transmission security, transmit antenna selection (TAS) is performed at the BS, and the best relay is chosen according to the full or partial relay selection criterion, which relies on the dualhop relay channels or the second-hop relay channels, respectively. For these criteria, we study the impact of correlated fading on the network secrecy performance, by deriving an analytical approximation for the secrecy outage probability (SOP) and an asymptotic expression for the high main-to-eavesdropper ratio (MER). From these results, it is concluded that the channel correlation is always beneficial to the secrecy performance of full relay selection. However, it deteriorates the secrecy performance if partial relay selection is used, when the number of antennas at the BS is less than the number of relays.ARC Discovery Projects Grant DP150103905

    Secrecy of WSN Data Over Nakagami m Fading Channels with Selection Combining Diversity

    Get PDF
    We consider the security of wireless sensor network (WSN) data over Nakagami – m fading channels at the physical layer. A WSN in which the fusion center performs selection diversity has been considered for better quality reception. The links between the WSN node and fusion center are assumed to follow Nakagami-m fading distribution. Closed-form expressions for secrecy outage probability (SOP) are derived, and it is established that SOP analysis also leads to the analysis of the existence of secrecy as a special case of SOP. The analytical expressions have been validated through results from simulations. The analysis is valid for all positive real values of the fading parameter, m. The limits on the signal-to-noise ratio can be obtained to secure the transmitted data against eavesdropping with the required SOP and secrecy rate using the analysis presented in this paper

    Secrecy Performance of Wirelessly Powered Wiretap Channels

    Get PDF

    Probability of Secrecy Outage in Cognitive Radio Networks over Rician-Fading Channels

    Get PDF
    In Rician-fading scenario, cognitive radio networks (CRNs) with a source (S) in a secondary system transmitting its confidential information to a legitimate destination (D) in the presence of an eavesdropper, are considered in this paper. Under CRNs, the interference power reaching at primary user (PU) is limited by some pre-defined threshold. Secrecy outage not only occurs when the achievable secrecy capacity for S-D link is smaller than a target rate, but also occurs in the case that the interference power at PU is greater than that threshold. Analytical expression of secrecy outage probability has been derived and verified with simulation results. In addition, we have also derived the analytical expression for probability of non-zero secrecy capacity

    Physical layer security for machine type communication networks

    Get PDF
    Abstract. We examine the physical layer security for machine type communication networks and highlight a secure communication scenario that consists of a transmitter Alice, which employs Transmit Antenna Selection, while a legitimate receiver Bob that uses Maximum Ratio Combining, as well as an eavesdropper Eve. We provide a solution to avoid eavesdropping and provide ways to quantify security and reliability. We obtain closed-form expressions for Multiple-Input Multiple-Output and Multi-antenna Eavesdropper (MIMOME) scenario. The closed{-}form expressions for three useful variations of MIMOME scenario, i.e., MISOME, MIMOSE, and MISOSE are also provided. A low cost and less complex system for utilizing the spatial diversity in multiple antennas system, while guaranteeing secrecy and reliability. Similarly, it is also assumed that Alice, Bob, and Eve can estimate their channel state information, and then we evaluate the performance of closed-form expressions in terms of secrecy outage probability and provide Monte Carlo simulations to corroborate the proposed analytical framework
    corecore