Physical Layer Security over SIMO κ-μ Shadowed Fading Channels

Author(s): Sun Jiang-Feng, Li Xing-Wang*, Ding Yuan, Du Jian-He

Journal Name: Recent Advances in Electrical & Electronic Engineering
Formerly Recent Patents on Electrical & Electronic Engineering

Volume 13 , Issue 6 , 2020


Become EABM
Become Reviewer
Call for Editor

Graphical Abstract:


Abstract:

Background: Due to the openness of wireless fading channel, it is easy to be disturbed by other transmission signals and noises. Encryption and decryption can guarantee the security of signals, and Physical Layer Security (PLS) which uses the features of fading channels itself to ensure the security of signal transmission has also been widely concerned. In addition, considering the wide applications of κ-μ shadowed distribution model and the advantages of Multiple-Input Multiple- Output (MIMO) technology, the confidentiality over Single-Input Multiple-Output (SIMO) independent κ-μ shadowed model has been studied.

Objective: To introduce the factors affecting the confidentiality on SIMO independent κ-μ shadowed model.

Methods: Novel representations of the lower bound on SPSC and SOP are deduced over independent κ-μ shadowed model. The method of moment matching to deal with infinite series is adopted.

Results: Through theoretical simulation and statistical simulation, the validity of our analysis is verified. We also get the curves for SOP and SPSC when the parameters of the channel change.

Conclusion: Under the condition of larger P, large L , large μD , large mD and small kD can improve the secrecy performance on independent κ-μ shadowed network.

Keywords: Multi-antenna technology, generalized fading channel, moment matching method, SPSC, SOP, physical layer security.

[1]
C.E. Shannon, "Communication theory of secrecy systems", Bell Syst. Tech. J., vol. 28, no. 4, pp. 656-715, 1949.
[http://dx.doi.org/10.1002/j.1538-7305.1949.tb00928.x]
[2]
A.D. Wyner, "The wire-tap channel", Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, 1975.
[http://dx.doi.org/10.1002/j.1538-7305.1975.tb02040.x]
[3]
I. Csiszar, and J. Korner, "Broadcast channels with confidential messages", In: IEEE Trans. Inf. Theory, vol. 24. 1978, no. 3, pp. 339-348.
[http://dx.doi.org/10.1109/TIT.1978.1055892]
[4]
M. Bloch, J. Barros, M.R.D. Rodrigues, and S.W. McLaughlin, "Wireless information-theoretic security", In: IEEE Trans. Inf. Theory, vol. 54. 2008, no. 6, pp. 2515-2534.
[http://dx.doi.org/10.1109/TIT.2008.921908]
[5]
X. Qiu, T. Jiang, S. Wu, and M. Hayes, "Physical layer authentication enhancement using a Gaussian mixture model", IEEE Access, pp. 1-1, 2018.
[6]
L. Dong, Z. Han, A.P. Petropulu, and H.V. Poor, "Improving wireless physical layer security via cooperating relays", IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, 2010.
[http://dx.doi.org/10.1109/TSP.2009.2038412]
[7]
H. Wang, L. Xu, W. Lin, P. Xiao, and R. Wen, "Physical layer security performance of wireless mobile sensor networks in smart city", In: IEEE Access, vol. 7. 2019, no. 3, pp. 15436-15443.
[8]
S.Ö. Ata, "Secrecy performance analysis over cascaded fading channels", IET Commun., vol. 13, no. 2, pp. 259-264, 2019.
[http://dx.doi.org/10.1049/iet-com.2018.5676]
[9]
R. Zhao, Y. Yuan, L. Fan, and Y. He, "Secrecy performance analysis of cognitive decode-and-forward relay networks in nakagamim fading channels", IEEE Trans. Commun. Technol., vol. 65, no. 2, pp. 549-563, 2017.
[http://dx.doi.org/10.1109/TCOMM.2016.2618793]
[10]
N. Yang, P.L. Yeoh, M. Elkashlan, R. Schober, and I.B. Collings, "Transmit antenna selection for security enhancement in MIMO wiretap channels", IEEE Trans. Commun. Technol., vol. 61, no. 1, pp. 144-154, 2013.
[http://dx.doi.org/10.1109/TCOMM.2012.12.110670]
[11]
A. Mukherjee, and A.L. Swindlehurst, "Robust Beamforming for security in MIMO wiretap channels with imperfect CSI", IEEE Trans. Signal Process., vol. 59, no. 1, pp. 351-361, 2011.
[http://dx.doi.org/10.1109/TSP.2010.2078810]
[12]
X. Li, X. Yang, L. Li, J. Jin, N. Zhao, and C. Zhang, "Performance analysis of distributed MIMO with ZF receivers over semi-correlated K fading channels", In: IEEE Access, vol. 5. 2017, pp. 9291-9303, .
[13]
H. Lei, I.S. Ansari, H. Zhang, K.A. Qaraqe, and G. Pan, "Security performance analysis of SIMO generalized-K fading channels using a mixture gamma distribution",
[14]
J.M. Moualeu, and W. Hamouda, "On the secrecy performance analysis of simo systems over κ-μ fading channels", IEEE Commun. Lett., vol. 21, no. 11, pp. 2544-2547, 2017.
[http://dx.doi.org/10.1109/LCOMM.2017.2741458]
[15]
L. Kong, G. Kaddoum, and Z. Rezki, "Highly accurate and asymptotic analysis on the SOP over SIMO α-μ fading channels", IEEE Commun. Lett., vol. 22, no. 10, pp. 2088-2091, 2018.
[http://dx.doi.org/10.1109/LCOMM.2018.2861877]
[16]
W. Zhang, J. Chen, Y. Kuo, and Y. Zhou, "Artificial-noise-aided optimal beam forming in layered physical layer security", IEEE Commun. Lett., vol. 23, no. 1, pp. 72-75, 2019.
[http://dx.doi.org/10.1109/LCOMM.2018.2881182]
[17]
L. Wu, L. Yang, J. Chen, and M. Alouini, "Physical layer security for cooperative relaying over generalized-K fading channels", IEEE Wirel. Commun. Lett., vol. 7, no. 4, pp. 606-609, 2018.
[http://dx.doi.org/10.1109/LWC.2018.2801294]
[18]
J.M. Moualeu, and W. Hamouda, "Secrecy performance analysis over mixed α-μ and κ-μ fading channels", IEEE Wireless Communications and Networking Conference (WCNC), 2018pp. 1-6
[19]
X. Li, J. Li, Y. Liu, Z. Ding, and A. Nallanathan, "Outage performance of cooperative NOMA networks with hardware impairments", 2018 IEEE Global Communications Conference (GLOBECOM), 2018pp. 1-6
[20]
K. Rabie, B. Adebisi, G. Nauryzbayev, O.S. Badarneh, X. Li, and M. Alouini, "Full-duplex energy-harvesting enabled relay networks in generalized fading channels", IEEE Wirel. Commun. Lett., vol. 8, no. 2, pp. 384-387, 2019.
[http://dx.doi.org/10.1109/LWC.2018.2873360]
[21]
S. Jia, J. Zhang, H. Zhao, and Y. Xu, "Performance analysis of physical layer security over α-η-κ-μ fading channels", China Commun., vol. 15, no. 11, pp. 138-148, 2018.
[http://dx.doi.org/10.1109/CC.2018.8543055]
[22]
J.F. Paris, "Statistical characterization of κ-μ shadowed fading", IEEE Trans. Vehicular Technol., vol. 63, no. 2, pp. 518-526, 2014.
[http://dx.doi.org/10.1109/TVT.2013.2281213]
[23]
J. Sun, X. Li, M. Huang, Y. Ding, J. Jin, and G. Pan, "Performance analysis of physical layer security over κ-μ shadowed fading channels", IET Commun., vol. 12, no. 8, pp. 970-975, 2018.
[http://dx.doi.org/10.1049/iet-com.2017.1268]
[24]
J. Sun, H. Bie, X. Li, J. Zhang, G. Pan, and K.M. Rabie, "Secrecy performance analysis of SIMO systems over correlated κ-μ shadowed fading channels", IEEE Access, vol. 7, pp. 86090-86101, 2019.
[http://dx.doi.org/10.1109/ACCESS.2019.2924950]
[25]
J. Zhang, X. Li, I.S. Ansari, Y. Liu, and K.A. Qaraqe, "Performance analysis of dual-Hop DF satellite relaying over κ-μ shadowed fading channels", IEEE Wireless Communications and Networking Conference (WCNC), 2017pp. 1-6 San Francisco, CA, USA
[26]
X. Li, J. Li, L. Li, J. Jin, J. Zhang, and D. Zhang, "Effective rate of MISO systems over κ-μ shadowed fading channels", IEEE Access, vol. 5, pp. 10605-10611, 2017.
[27]
M.R. Bhatnagar, On the sum of correlated squared κ-μ shadowed random variables and its application to performance analysis of MRC
[28]
J. Zhang, X. Chen, K.P. Peppas, X. Li, and Y. Liu, "On high-order capacity statistics of spectrum aggregation systems over κ-μ and κ-μ shadowed fading channels", IEEE Trans. Commun., vol. 65, no. 2, pp. 935-944, 2017.
[http://dx.doi.org/10.1109/TCOMM.2016.2637926]
[29]
I.S. Gradshteyn, and I.M. Ryzhik, Table of Integrals, Series, and Products., 7th ed Academic: San Diego, CA, USA, 2007.
[30]
R. Subadar, and P.R. Sahu, Performance analysis of dual MRC receiver in correlated Hoyt fading channels
[31]
R. Subadar, and P.R. Sahu, Performance of a LMRC receiver over equally correlated η-μ fading channels
[32]
T. Liu, H. Zhang, J. Wang, H. Fu, P. Wang, and J. Li, "Performance analysis of non-identically distributed FSO systems with dual-and triple-branch based on MRC over gamma-gamma fading channels", China Commun., vol. 15, no. 1, pp. 45-51, 2018.
[http://dx.doi.org/10.1109/CC.2018.8290804]
[33]
V.S. Adamchik, and O.I. Marichev, "The algorithm for calculating integrals of hypergeometric type functions and its realization in reduce system", International Symposium on Symbolic and Algebraic Computation, 1990pp. 212-224 New York, USA


Rights & PermissionsPrintExport Cite as

Article Details

VOLUME: 13
ISSUE: 6
Year: 2020
Page: [871 - 878]
Pages: 8
DOI: 10.2174/2352096512666191108094202
Price: $25

Article Metrics

PDF: 8
HTML: 1