Ergodic secrecy capacity ofMRC/SC in single-inputmultiple-output wiretap systems with imperfect channel state information

Hui ZHAO, You-yu TAN, Gao-feng PAN, Yun-fei CHEN

PDF(511 KB)
PDF(511 KB)
Front. Inform. Technol. Electron. Eng ›› 2017, Vol. 18 ›› Issue (4) : 578-590. DOI: 10.1631/FITEE.1500430
Article

Ergodic secrecy capacity ofMRC/SC in single-inputmultiple-output wiretap systems with imperfect channel state information

Author information +
History +

Abstract

This paper investigates the secrecy performance of maximal ratio combining (MRC) and selection combining (SC) with imperfect channel state information (CSI) in the physical layer. In a single-input multipleoutput (SIMO) wiretap channel, a source transmits confidential messages to the destination equipped withM antennas using the MRC/SC scheme to process the received multiple signals. An eavesdropper equipped with N antennas also adopts the MRC/SC scheme to promote successful eavesdropping. We derive the exact and asymptotic closed-form expressions for the ergodic secrecy capacity (ESC) in two cases: (1) MRC with weighting errors, and (2) SC with outdated CSI. Moreover, two important indicators, namely high signal-to-noise ratio (SNR) slope and high SNR power offset, which govern ESC at the high SNR region, are derived. Finally, simulations are conducted to validate the accuracy of our proposed analytical models. Results indicate that ESC rises with the increase of the number of antennas and the received SNR at the destination, and fades with the increase of those at the eavesdropper. Another finding is that the high SNR slope is constant, while the high SNR power offset is correlated with the number of antennas at both the destination and the eavesdropper.

Keywords

Ergodic secrecy capacity (ESC) / Maximal ratio combining (MRC) / Weighting errors / Physical layer security / Selection combining (SC) / Single-input multiple-output (SIMO)

Cite this article

Download citation ▾
Hui ZHAO, You-yu TAN, Gao-feng PAN, Yun-fei CHEN. Ergodic secrecy capacity ofMRC/SC in single-inputmultiple-output wiretap systems with imperfect channel state information. Front. Inform. Technol. Electron. Eng, 2017, 18(4): 578‒590 https://doi.org/10.1631/FITEE.1500430

References

[1]
Alouini, M.S., Goldsmith , A.J., 1999. Capacity of Rayleigh fading channels under different adaptive transmission and diversity-combining techniques.IEEE Trans. Veh. Technol., 48(4):1165–1181. http://dx.doi.org/10.1109/25.775366
[2]
Alves, H., DemoSouza , R., Debbah, M. , , 2012. Performance of transmit antenna selection physical layer security schemes.IEEE Signal Process. Lett., 19(6):372–375. http://dx.doi.org/10.1109/LSP.2012.2195490
[3]
Elkashlan, M., Wang, L., Duong, T.Q. , , 2015. On the security of cognitive radio networks.IEEE Trans. Veh. Technol., 64(8):3790–3795. http://dx.doi.org/10.1109/TVT.2014.2358624
[4]
Ferdinand, N.S., da Costa , D.B., Latva-aho, M. , 2013. Effects of outdated CSI on the secrecy performance of MISO wiretap channels with transmit antenna selection.IEEE Commun. Lett., 17(5):864–867. http://dx.doi.org/10.1109/LCOMM.2013.040213.122696
[5]
Gans, M.J., 1971. The effect of Gaussian error in maximal ratio combiners.IEEE Trans. Commun. Technol., 19(4):492–500. http://dx.doi.org/10.1109/TCOM.1971.1090666
[6]
Gradshteyn, I.S., Ryzhik , I.M., 2007. Table of Integrals, Series, and Products (7th Ed.).Academic Press, Salt Lake City, USA.
[7]
He, F., Man, H., Wang, W., 2011. Maximal ratio diversity combining enhanced security.IEEE Commun. Lett., 15(5):509–511. http://dx.doi.org/10.1109/LCOMM.2011.030911.102343
[8]
Hu, Y., Tao, Y., 2015. Secrecy outage on transmit antenna selection with weighting errors at maximal-ratio combiners.IEEE Commun. Lett., 19(4):597–600. http://dx.doi.org/10.1109/LCOMM.2015.2394786
[9]
Janarthanan, S., Bhaskar , V., 2013. Capacity analysis of Rayleigh fading channels in low signal-to-noise ratio regime for maximal ratio combining diversity because of combining errors.IET Commun., 7(8):745–754. http://dx.doi.org/10.1049/iet-com.2012.0647
[10]
Khatalin, S., Fonseka , J.P., 2006. On the channel capacity in Rician and Hoyt fading environments with MRC diversity.IEEE Trans. Veh. Technol., 55(1):137–141. http://dx.doi.org/10.1109/TVT.2005.861205
[11]
Khuong, H.V., Sofotasios , P.C., 2013. Exact bit-error-rate analysis of underlay decode-and-forward multi-hop cognitive networks with estimation errors.IET Commun., 7(18):2122–2132. http://dx.doi.org/10.1049/iet-com.2013.0254
[12]
Lee, W.C.Y., 1990. Estimate of channel capacity in Rayleigh fading environment.IEEE Trans. Veh. Technol., 39(3):187–189. http://dx.doi.org/10.1109/25.130999
[13]
Lei, H., Gao, C., Guo, Y., , 2015. On physical layer security over generalized Gamma fading channels.IEEE Commun. Lett., 19(7):1257–1260. http://dx.doi.org/10.1109/LCOMM.2015.2426171
[14]
Lei, H., Zhang, H., Ansari, I.S. , , 2016. Performance analysis of physical layer security over generalized-K fading channels using a mixture gamma distribution.IEEE Commun. Lett., 20(2):408–411. http://dx.doi.org/10.1109/LCOMM.2015.2504580
[15]
Liu, H., Zhao, H., Jiang, H., , 2016. Physical-layer secrecy outage of spectrum sharing CR systems over fading channels.Sci. China Inf. Sci., 59(4):102308. http://dx.doi.org/10.1007/s11432-015-5451-2
[16]
Liu, Y., Wang, L., Duy, T.T., , 2015. Relay selection for security enhancement in cognitive relay networks.IEEE Wirel. Commun. Lett.,4(1):46–49. http://dx.doi.org/10.1109/LWC.2014.2365808
[17]
Liu, Y., Wang, L., Zaidi, R., , 2016. Secure D2D communication in large-scale cognitive cellular networks: a wireless power transfer model.IEEE Trans. Commun., 64(1):329–342. http://dx.doi.org/10.1109/TCOMM.2015.2498171
[18]
Pan, G., Tang, C., Li, T., , 2015. Secrecy performance analysis for SIMO simultaneous wireless information and power transfer systems.IEEE Trans. Commun., 63(9):3423–3433. http://dx.doi.org/10.1109/TCOMM.2015.2458317
[19]
Pan, G., Tang, C., Zhang, X., , 2016. Physical layer security over non-small scale fading channels.IEEE Trans. Veh. Technol., 65(3):1326–1339. http://dx.doi.org/10.1109/TVT.2015.2412140
[20]
Rezki, Z., Khisti, A., Alouini, M.S. , 2014. On the secrecy capacity of the wiretap channel with imperfect main channel estimation.IEEE Trans. Commun., 62(10):3652–3664. http://dx.doi.org/10.1109/TCOMM.2014.2356482
[21]
Shiu, Y.S., Chang, S.Y., Wu, H.C. , , 2011. Physical layer security in wireless networks: a tutorial.IEEE Wirel. Commun. Mag., 18(2):66–74. http://dx.doi.org/10.1109/MWC.2011.5751298
[22]
Shrestha, A.P., Kwark, K.S., 2014. On maximal ratio diversity with weighting errors for physical layer security.IEEE Commun. Lett., 18(4):580–583. http://dx.doi.org/10.1109/LCOMM.2014.043014.140071
[23]
Simon, M.K., Alouini , M.S., 2005. Digital Communications over Fading Channels (2nd Ed.).John Wiley, Hoboken, USA.
[24]
Sun, X., Wang, J., Xu, W., , 2012. Performance of secure communications over correlated fading channels.IEEE Signal Process. Lett., 19(8):479–482. http://dx.doi.org/10.1109/LSP.2012.2203302
[25]
Tomiuk, B.R., Beaulieu , N.C., Abu-Dayya, A.A. , 1999. General forms for maximal ratio diversity with weighting errors.IEEE Trans. Commun., 47(4):488–492. http://dx.doi.org/10.1109/26.764914
[26]
Wang, L., Yang, N., Elkashlan, M. , , 2014a. Physical layer security of maximal ratio combining in two-wave diffuse power fading channels.IEEE Trans. Inf. Foren. Sec., 9(2):247–258. http://dx.doi.org/10.1109/TIFS.2013.2296991
[27]
Wang, L., Elkashlan , M., Huang, J. , , 2014b. Secure transmission with antenna selection in MIMO Nakagami-m fading channels.IEEE Trans. Wirel. Commun., 13(11):6054–6067. http://dx.doi.org/10.1109/TWC.2014.2359877
[28]
Yang, N., Yeoh, P.L., Elkashlan, M. , , 2013a. MIMO wiretap channels: secure transmission using transmit antenna selection and receive generalized selection combining.IEEE Commun. Lett., 17(9):1754–1757. http://dx.doi.org/10.1109/LCOMM.2013.071813.131048
[29]
Yang, N., Suraweera , H.A., Collings, I.B. , , 2013b. Physical layer security of TAS/MRC with antenna correlation.IEEE Trans. Inf. Foren. Sec., 8(1):254–259. http://dx.doi.org/10.1109/TIFS.2012.2223681
[30]
Yang, N., Yeoh, P.L., Elkashlan, M. , , 2013c. Transmit antenna selection for security enhancement in MIMO wiretap channels.IEEE Trans. Commun., 61(1):144–154. http://dx.doi.org/10.1109/TCOMM.2012.12.110670
[31]
Yang, N., Wang, L., Geraci, G., , 2015. Safeguarding 5G wireless communication networks using physical layer security.IEEE Commun. Mag., 53(4):20–27. http://dx.doi.org/10.1109/MCOM.2015.7081071
[32]
Zhang, X., Pan, G., Tang, C., , 2014. Performance analysis of physical layer security over independent/ correlated log-normal fading channels.Telecommunication Networks and Applications Conf., p.23–27. http://dx.doi.org/10.1109/ATNAC.2014.7020868
[33]
Zhao, H., Pan, G., 2016. The analysis on secure communications for DF and RF relaying SIMO system with Gauss errors.Sci. China Inf. Sci., 46(3):350–360. http://dx.doi.org/10.1360/N112015-00074

RIGHTS & PERMISSIONS

2017 Zhejiang University and Springer-Verlag Berlin Heidelberg
PDF(511 KB)

Accesses

Citations

Detail

Sections
Recommended

/