12 research outputs found

    Physical Layer Security over Fluctuating Two-Ray Fading Channels

    Full text link
    Ensuring the physical layer security (PHY-security) of millimeter wave (mmWave) communications is one of the key factors for the success of 5G. Recent field measurements show that conventional fading models cannot accurately model the random fluctuations of mmWave signals. To tackle this challenge, the fluctuating two-ray (FTR) fading model has been proposed. In this correspondence, we comprehensively analyze the PHY-security in mmWave communications over FTR fading channels. More specifically, we derive analytical expressions for significant PHY-security metrics, such as average secrecy capacity, secrecy outage probability, and the probability of strictly positive secrecy capacity, with simple functions. The effect of channel parameters on the PHY-security has been validated by numerical results.Comment: 5 pages, 4 figures, to appear in IEEE Transactions on Vehicular Technolog

    Secrecy Outage Analysis Over Fluctuating Two-Ray Fading Channels

    Full text link
    In this letter, we analyze the secrecy outage probability (SOP) over fluctuating two-ray fading channels but with a different definition from the one adopted in [5]. Following the new defined SOP, we derive an analytical closed-form expression for our proposed SOP, as well as an asymptotic formula valid in the high signal-to-noise ratio region of the source to destination link. In the numerical results section, we perform some Monte-Carlo simulations to validate the accuracy of our derived expressions, and also present the probability gap between our proposed SOP and the SOP in [5].Comment: 2 Figures, 2 Page

    Different Power Adaption Methods on Fluctuating Two-Ray Fading Channels

    Full text link
    In this letter, we consider a typical scenario where the transmitter employs different power adaption methods, including the optimal rate and power algorithm, optimal rate adaption, channel inversion and truncated channel inversion, to enhance the ergodic capacity (EC) with an average transmit power constraint over fluctuating two-way fading channels. In particular, we derive exact closed-form expressions for the EC under different power adaption methods, as well as corresponding asymptotic formulas for the EC valid in the high signal-to-noise ratio (SNR) region. Finally, we compare the performance of the EC under different power adaption methods, and this also validates the accuracy of our derived expressions for the exact and asymptotic EC.Comment: 4 pages, 1 figur

    Secure mmWave Communications in Cognitive Radio Networks

    Full text link
    In this letter, the secrecy performance in cognitive radio networks (CRNs) over fluctuating two-ray (FTR) channels, which is used to model the millimetre wave channel, is investigated in terms of the secrecy outage probability (SOP). Specifically, we consider the case where a source (S) transmits confidential messages to a destination (D), and an eavesdropper wants to wiretap the information from S to D. In a CRN framework, we assume that the primary user shares its spectrum with S, where S adopts the underlay strategy to control its transmit power without impairing the quality of service of the primary user. After some mathematical manipulations, an exact analytical expression for the SOP is derived. In order to get physical and technical insights into the effect of the channel parameters on the SOP, we derive an asymptotic formula for the SOP in the high signal-to-noise ratio region of the S--D link. We finally show some selected Monte-Carlo simulation results to validate the correctness of our derived analytical expressions.Comment: 4 pages, 3 figure

    Further Applications of Wireless Communication Systems over α−η−κ−μ\alpha-\eta-\kappa-\mu Fading Channels

    Full text link
    In this letter, some applications of wireless communication systems over α−η−κ−μ\alpha-\eta-\kappa-\mu fading channels are analysed. More specifically, the effective rate and the average of both the detection probability and area under the receiver characteristics curve of energy detection based spectrum sensing are studied. Furthermore, highly accurate method to truncating the infinite summation of the probability density function of α−η−κ−μ\alpha-\eta-\kappa-\mu fading conditions for a certain number of terms is provided. To this end, novel mathematically tractable exact expressions are derived in terms of the Fox's HH-function (FHF). The asymptotic behaviour is also explained to earn further insights into the effect of the fading parameters on the system performance. A comparison between the numerical results and Monte Carlo simulations is presented to verify the validation of our analysis.Comment: 8 pages, 3 figure

    A Simple Evaluation for the Secrecy Outage Probability Over Generalized-K Fading Channels

    Full text link
    A simple approximation for the secrecy outage probability (SOP) over generalized-K fading channels is developed. This approximation becomes tighter as the average signal-to-noise ratio (SNR) of the wiretap channel decreases. Based on this simple expression, we also analyze the asymptotic SOP in the high SNR region of the main channel. Besides simplifying the SOP expression significantly, this asymptotic SOP expression reveals the secrecy diversity order in a general case. Numerical results demonstrate the high accuracy of our proposed approximation results.Comment: 5 pages, 3 figure

    Unveiling the Hyper-Rayleigh Regime of the Fluctuating Two-Ray Fading Model

    Full text link
    The recently proposed Fluctuating Two-Ray (FTR) model is gaining momentum as a reference fading model in scenarios where two dominant specular waves are present. Despite the numerous research works devoted to the performance analysis under FTR fading, little attention has been paid to effectively understanding the interplay between the fading model parameters and the fading severity. According to a new scale defined in this work, which measures the hyper-Rayleigh character of a fading channel in terms of the Amount of Fading, the outage probability and the average capacity, we see that the FTR fading model exhibits a full hyper-Rayleigh behavior. However, the Two-Wave with Diffuse Power fading model from which the former is derived has only strong hyper-Rayleigh behavior, which constitutes an interesting new insight. We also identify that the random fluctuations in the dominant specular waves are ultimately responsible for the full hyper-Rayleigh behavior of this class of fading channels.Comment: This work has been submitted to the IEEE for publication. Copyright may be transferred without notice, after which this version may no longer be accesibl

    Secrecy Performance for Finite-Alphabet Inputs Over Fluctuating Two-Ray Channels in FDA Communications

    Full text link
    To provide system design insights for practical communication systems equipped with the frequency diverse array (FDA), this paper investigates the secrecy performance of FDA systems exploiting finite-alphabet inputs over fluctuating two-ray (FTR) fading channels. More specifically, closed-form expressions for the average secrecy rate (ASR) and the secrecy outage probability (SOP) are derived, while their correctness is confirmed by numerical simulations. In addition, we perform asymptotic analysis to quantify the secrecy performance gap between Gaussian and finite-alphabet inputs, for a sufficiently large average signal-to-noise ratio (SNR) of the main channel. Compared with Gaussian inputs-based research, this letter focuses on practical scenarios which sheds lights on properties of FDA systems

    On the Beneficial Role of a Finite Number of Scatterers for Wireless Physical Layer Security

    Full text link
    We show that for a legitimate communication under multipath quasi-static fading with a reduced number of scatterers, it is possible to achieve perfect secrecy even in the presence of a passive eavesdropper for which no channel state information is available. Specifically, we show that the outage probability of secrecy capacity (OPSC) is zero for a given range of average signal-to-noise ratios (SNRs) at the legitimate and eavesdropper's receivers. As an application example, we analyze the OPSC for the case of two scatterers, explicitly deriving the relationship between the average SNRs, the secrecy rate RsR_s and the fading model parameters required for achieving perfect secrecy. The impact of increasing the number of scatterers is also analyzed, showing that it is always possible to achieve perfect secrecy in this scenario, provided that the dominant specular component for the legitimate channel is sufficiently large compared to the remaining scattered waves

    Physical-Layer Security for Frequency Diverse Array Based Directional Modulation in Fluctuating Two-Ray Fading Channels

    Full text link
    The frequency diverse array (FDA) based directional modulation (DM) technology plays an important role in the implementation of the physical-layer security (PLS) transmission of 5G and beyond communication system. In order to meet the tremendous increase in mobile data traffic, a new design consuming less memory for the FDA-DM-based PLS transmission is urgently demanded. In this paper, an analytical symmetrical multi-carrier FDA model is proposed in three dimensions, namely, range, azimuth angle, and elevation angle, which differs from the conventional analytical approach with only range and azimuth angle considered. Then, a single-point (SP) artificial noise (AN) aided FDA-DM scheme is proposed, which reduces memory consumption of FDA-DM systems significantly compared with the conventional zero-forcing (ZF) and singular value decomposition (SVD) approaches. Moreover, the PLS performance of the proposed low-memory-consumption FDA-DM scheme is analyzed in fluctuating two-ray (FTR) fading channels for the first time, including bit error rate (BER), secrecy rate (SR), and secrecy outage probability (SOP). More importantly, the closed-form expressions for the lower bound of the average SR and the upper bound of the SOP are derived, respectively. The effectiveness of the analytical expressions is verified by numerical simulations. This work opens a way to lower the memory requirements for the DM-based PLS transmission of 5G and beyond communication system.Comment: 14 pages, 14 figures. arXiv admin note: text overlap with arXiv:1908.0463
    corecore