Skip to main content
Top
Published in: Wireless Personal Communications 4/2016

10-06-2016

Secrecy Outage Probability of a Distributed Multi-Antenna Cooperative Communication System

Authors: Nan Run Zhou, Xiao Rong Liang, Zhi Juan Kang, Li Hua Gong, Zhi Xue

Published in: Wireless Personal Communications | Issue 4/2016

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

A distributed multi-antenna cooperative communication system with amplify-and-forward mode for secure communication in the presence of an eavesdropper is considered. In the communication system, there is no direct communication link between the transmitter and the intended receiver, and all nodes except relay nodes are equipped with multi-antenna. The secrecy capacity of this multiple input multiple output multiple eavesdropper system is investigated. The communication security depends on whether the noise on wiretap channel is stronger than that on main channel or not. The secrecy outage behavior of the flat Rayleigh fading channel is discussed and a relation between the strength of the channel noise and the secrecy outage probability is obtained. It is demonstrated that the secrecy outage probability is closely related to the channel noise strength and the number of the relay nodes. The thresholds for the noises received by legitimate receiver and eavesdropper are suggested, which is useful to design the secure distributed multi-antenna cooperative communication system.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Leung-Yan-Cheong, S. K., & Hellman, M. E. (1978). The Gaussian wire-tap channel. IEEE Transactions on Information Theory, 24, 451–456.MathSciNetCrossRefMATH Leung-Yan-Cheong, S. K., & Hellman, M. E. (1978). The Gaussian wire-tap channel. IEEE Transactions on Information Theory, 24, 451–456.MathSciNetCrossRefMATH
3.
go back to reference Shafiee, S., & Ulukus, S. (2007). Achievable rates in Gaussian MISO channels with secrecy constraints. IEEE International Symposium on Information Theory, 1(7), 2466–2470. Shafiee, S., & Ulukus, S. (2007). Achievable rates in Gaussian MISO channels with secrecy constraints. IEEE International Symposium on Information Theory, 1(7), 2466–2470.
4.
go back to reference Tian, M., Huang, X., Zhang, Q., & Qin, J. (2015). Robust AN-aided secure transmission scheme in MISO channels with simultaneous wireless information and power transfer. IEEE Signal Processing Letters, 22(6), 723–727.CrossRef Tian, M., Huang, X., Zhang, Q., & Qin, J. (2015). Robust AN-aided secure transmission scheme in MISO channels with simultaneous wireless information and power transfer. IEEE Signal Processing Letters, 22(6), 723–727.CrossRef
5.
go back to reference Chen, X., & Chen, H. (2014). Physical layer security in multi-cell MISO downlinks with incomplete CSI—A unified secrecy performance analysis. IEEE Transactions on Information Theory, 62(23), 6286–6297.MathSciNet Chen, X., & Chen, H. (2014). Physical layer security in multi-cell MISO downlinks with incomplete CSI—A unified secrecy performance analysis. IEEE Transactions on Information Theory, 62(23), 6286–6297.MathSciNet
6.
go back to reference Fakoorian, S. A. A., & Swindlehurst, A. L. (2011). Secrecy capacity of MISO Gaussian wiretap channel with a cooperative jammer. In IEEE 12th workshop on signal processing advance in wireless communications (pp. 416–420). Fakoorian, S. A. A., & Swindlehurst, A. L. (2011). Secrecy capacity of MISO Gaussian wiretap channel with a cooperative jammer. In IEEE 12th workshop on signal processing advance in wireless communications (pp. 416–420).
7.
go back to reference Zhu, J., Schober, R., & Bhargava, V. K. (2014). Secure transmission in multicell massive MIMO systems. IEEE Transactions on Wireless Communications, 13(9), 4766–4781.CrossRef Zhu, J., Schober, R., & Bhargava, V. K. (2014). Secure transmission in multicell massive MIMO systems. IEEE Transactions on Wireless Communications, 13(9), 4766–4781.CrossRef
8.
go back to reference Shen, C., Li, W., & Chang, T. (2014). Wireless information and energy transfer in multi-antenna interference channel. IEEE Transactions on Signal Processing, 62(23), 6249–6264.MathSciNetCrossRef Shen, C., Li, W., & Chang, T. (2014). Wireless information and energy transfer in multi-antenna interference channel. IEEE Transactions on Signal Processing, 62(23), 6249–6264.MathSciNetCrossRef
9.
go back to reference Parada, P., & Blahut, R. (2005). Secrecy capacity of SIMO and slow fading channels. IEEE international symposium on information theory (pp. 2152–2155). Parada, P., & Blahut, R. (2005). Secrecy capacity of SIMO and slow fading channels. IEEE international symposium on information theory (pp. 2152–2155).
10.
go back to reference Xiong, Q., Gong, Y., Liang, Y., & Li, K. (2014). Achieving secrecy of MISO fading wiretap channels via jamming and precoding with imperfect channel state information. IEEE Wireless Communications Letters, 3(4), 357–360.CrossRef Xiong, Q., Gong, Y., Liang, Y., & Li, K. (2014). Achieving secrecy of MISO fading wiretap channels via jamming and precoding with imperfect channel state information. IEEE Wireless Communications Letters, 3(4), 357–360.CrossRef
11.
go back to reference Gerbracht, S., Scheunert, C., & Jorwieck, A. (2012). Secrecy outage in MISO systems with partial channel information. IEEE Transactions on Information Forensics and Security, 7(2), 704–716.CrossRef Gerbracht, S., Scheunert, C., & Jorwieck, A. (2012). Secrecy outage in MISO systems with partial channel information. IEEE Transactions on Information Forensics and Security, 7(2), 704–716.CrossRef
12.
go back to reference Wang, H., Zheng, T., & Xia, X. (2015). Secure MISO wiretap channels with multiantenna passive eavesdropper: artificial noise vs. artificial fast fading. IEEE Transactions on Wireless Communications, 14(1), 94–106.CrossRef Wang, H., Zheng, T., & Xia, X. (2015). Secure MISO wiretap channels with multiantenna passive eavesdropper: artificial noise vs. artificial fast fading. IEEE Transactions on Wireless Communications, 14(1), 94–106.CrossRef
13.
go back to reference Zhang, X., Mckay, M. R., Zhou, X., et al. (2015). Artificial-noise-aided secure multi-antenna transmission with limited feedback. IEEE Transactions on Wireless Communications, 14(5), 2742–2753.CrossRef Zhang, X., Mckay, M. R., Zhou, X., et al. (2015). Artificial-noise-aided secure multi-antenna transmission with limited feedback. IEEE Transactions on Wireless Communications, 14(5), 2742–2753.CrossRef
14.
go back to reference Chang, N., Chae, C. B., Ha, J., et al. (2012). Secrecy rate for MISO Rayleigh fading channels with relative distance of eavesdropper. IEEE Communications Letters, 16(9), 1408–1411.CrossRef Chang, N., Chae, C. B., Ha, J., et al. (2012). Secrecy rate for MISO Rayleigh fading channels with relative distance of eavesdropper. IEEE Communications Letters, 16(9), 1408–1411.CrossRef
15.
go back to reference Wang, B., Mu, P., & Li, Z. (2015). Secrecy rate maximization with artificial-noise-aided beamforming for MISO wiretap channels under secrecy outage constraint. IEEE Communications Letters, 19(1), 18–21.CrossRef Wang, B., Mu, P., & Li, Z. (2015). Secrecy rate maximization with artificial-noise-aided beamforming for MISO wiretap channels under secrecy outage constraint. IEEE Communications Letters, 19(1), 18–21.CrossRef
16.
go back to reference Khisti, A., & Wornell, G. W. (2010). Secure transmission with multiple antenna I: the MISOME wiretap channel. IEEE Transactions on Information Theory, 56(7), 3088–3104.MathSciNetCrossRef Khisti, A., & Wornell, G. W. (2010). Secure transmission with multiple antenna I: the MISOME wiretap channel. IEEE Transactions on Information Theory, 56(7), 3088–3104.MathSciNetCrossRef
17.
go back to reference Khisti, A., & Wornell, G. W. (2010). Secure transmission with multiple antenna II: The MIMOME wiretap channel. IEEE Transactions on Information Theory, 56(11), 5515–5532.MathSciNetCrossRef Khisti, A., & Wornell, G. W. (2010). Secure transmission with multiple antenna II: The MIMOME wiretap channel. IEEE Transactions on Information Theory, 56(11), 5515–5532.MathSciNetCrossRef
18.
go back to reference Fakoorian, S. A. A., & Swindlehurst, A. L. (2013). Competing for secrecy in the MISO interference channel. IEEE Transaction on Signal Processing, 61(1), 170–181.MathSciNetCrossRef Fakoorian, S. A. A., & Swindlehurst, A. L. (2013). Competing for secrecy in the MISO interference channel. IEEE Transaction on Signal Processing, 61(1), 170–181.MathSciNetCrossRef
19.
go back to reference Li, J., & Petropulu, A. P. (2011). On ergodic secrecy rate for Gaussian MISO wiretap channels. IEEE Transaction on Wireless Communications, 10(4), 1176–1187.CrossRef Li, J., & Petropulu, A. P. (2011). On ergodic secrecy rate for Gaussian MISO wiretap channels. IEEE Transaction on Wireless Communications, 10(4), 1176–1187.CrossRef
20.
go back to reference Li, J., & Petropulu, A. P. (2012). Explicit solution of worst-case secrecy rate for MISO wiretap channels with spherical uncertainty. IEEE Transaction on Signal Processing, 60(7), 3892–3895.MathSciNetCrossRef Li, J., & Petropulu, A. P. (2012). Explicit solution of worst-case secrecy rate for MISO wiretap channels with spherical uncertainty. IEEE Transaction on Signal Processing, 60(7), 3892–3895.MathSciNetCrossRef
21.
go back to reference Son, P. N., & Kong, H. Y. (2014). Exact outage probability of two-way decode-and-forward scheme with opportunistic relay selection under physical layer security. IEEE Wireless Personal Communications, 51(1), 6249–6264. Son, P. N., & Kong, H. Y. (2014). Exact outage probability of two-way decode-and-forward scheme with opportunistic relay selection under physical layer security. IEEE Wireless Personal Communications, 51(1), 6249–6264.
22.
go back to reference Pinto, P. C., Barros, J., & Win, M. Z. (2009). Wireless physical-layer security: the case of colluding eavesdroppers. In IEEE international symposium on information theory (pp. 2442–2446). Pinto, P. C., Barros, J., & Win, M. Z. (2009). Wireless physical-layer security: the case of colluding eavesdroppers. In IEEE international symposium on information theory (pp. 2442–2446).
23.
go back to reference Yang, N., Yeoh, P. L., & Elkashlan, M. (2013). MIMO wiretap channels: Secure transmission using transmit antenna selection and receive generalized selection combining. IEEE Communication Letters, 17(9), 1754–1757.CrossRef Yang, N., Yeoh, P. L., & Elkashlan, M. (2013). MIMO wiretap channels: Secure transmission using transmit antenna selection and receive generalized selection combining. IEEE Communication Letters, 17(9), 1754–1757.CrossRef
24.
go back to reference Zhou, N. R., Chen, X., Li, C. S., & Xue, Z. (2014). Secrecy rate of two-hop AF relaying networks with an untrusted relay. Wireless Personal Communications, 75(1), 119–129.CrossRef Zhou, N. R., Chen, X., Li, C. S., & Xue, Z. (2014). Secrecy rate of two-hop AF relaying networks with an untrusted relay. Wireless Personal Communications, 75(1), 119–129.CrossRef
25.
go back to reference Islam, M. R. (2010). Secret data communication in a degraded practical multiple input multiple output multiple eavesdropper channel. In Proceeding of 13th international conference on computer and information technology (pp. 594–599). Islam, M. R. (2010). Secret data communication in a degraded practical multiple input multiple output multiple eavesdropper channel. In Proceeding of 13th international conference on computer and information technology (pp. 594–599).
26.
go back to reference King, C. (2014). Fundamentals of wireless communications. In IEEE-IAS/PCA cement industry technical conference (pp. 470–474). King, C. (2014). Fundamentals of wireless communications. In IEEE-IAS/PCA cement industry technical conference (pp. 470–474).
Metadata
Title
Secrecy Outage Probability of a Distributed Multi-Antenna Cooperative Communication System
Authors
Nan Run Zhou
Xiao Rong Liang
Zhi Juan Kang
Li Hua Gong
Zhi Xue
Publication date
10-06-2016
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 4/2016
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-016-3415-5

Other articles of this Issue 4/2016

Wireless Personal Communications 4/2016 Go to the issue