Skip to main content
Erschienen in: Wireless Networks 6/2020

22.04.2020

Physical layer security for space–time-block-coded MIMO system in Rician fading in the presence of imperfect feedback

verfasst von: Rajiv Kumar, Sudakar Singh Chauhan

Erschienen in: Wireless Networks | Ausgabe 6/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

We investigate physical layer security (PLY) of space–time-block-coded (STBC)–multi-input–multi-output (MIMO) wiretap channel in the presence of imperfect channel state information (ICSI) over Rician fading channel. Secrecy for data transmission to legitimate user in the presence of eavesdropper is metered in terms of average secrecy capacity (ASC), probability of non-zero secrecy rate (PNZSR) and secrecy outage probability (SOP). We derive the closed form expression for security parameter by using the probability distribution function and cumulative distribution function of output signal to noise ratio (SNR). Simulation results are presented to validate our analytical results and demonstrate the impact of ICSI on the secrecy performance of STBC–MIMO system.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Literatur
2.
Zurück zum Zitat Tekin, E., & Yener, A. (2008). The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming. IEEE Transactions on Information Theory,54(6), 2735–2751.MathSciNetCrossRef Tekin, E., & Yener, A. (2008). The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming. IEEE Transactions on Information Theory,54(6), 2735–2751.MathSciNetCrossRef
3.
Zurück zum Zitat Leung-Yan-Cheong, S. K., & Hellman, M. E. (1987). The Gaussian wire-tap channel. IEEE Transactions on Information Theory,24(4), 451–456.MathSciNetCrossRef Leung-Yan-Cheong, S. K., & Hellman, M. E. (1987). The Gaussian wire-tap channel. IEEE Transactions on Information Theory,24(4), 451–456.MathSciNetCrossRef
4.
Zurück zum Zitat Bloch, M., Barros, J., Rodrigues, M., & MaLaughlin, S. (2008). Wireless information-theoretic security. IEEE Transactions on Information Theory,54(6), 2515–2534.MathSciNetCrossRef Bloch, M., Barros, J., Rodrigues, M., & MaLaughlin, S. (2008). Wireless information-theoretic security. IEEE Transactions on Information Theory,54(6), 2515–2534.MathSciNetCrossRef
5.
Zurück zum Zitat Oggier, F., & Hassibi, B. (2010). The secrecy capacity of the MIMO wiretap channel. IEEE Transactions on Information Theory,57(8), 4961–4972.MathSciNetCrossRef Oggier, F., & Hassibi, B. (2010). The secrecy capacity of the MIMO wiretap channel. IEEE Transactions on Information Theory,57(8), 4961–4972.MathSciNetCrossRef
6.
Zurück zum Zitat Prabhu, V. U., & Rodrigues, M. R. (2011). On wireless channels with M-antenna eavesdroppers: Characterization of the outage probability and outage secrecy capacity. IEEE Transactions on Information Forensics and Security,6(3), 853–860.CrossRef Prabhu, V. U., & Rodrigues, M. R. (2011). On wireless channels with M-antenna eavesdroppers: Characterization of the outage probability and outage secrecy capacity. IEEE Transactions on Information Forensics and Security,6(3), 853–860.CrossRef
7.
Zurück zum Zitat Khisti, A., & Wornell, G. W. (2010). Secure transmission with multiple antennasI: The MISOME wiretap channel. IEEE Transactions on Information Theory,56(7), 3088–3104.MathSciNetCrossRef Khisti, A., & Wornell, G. W. (2010). Secure transmission with multiple antennasI: The MISOME wiretap channel. IEEE Transactions on Information Theory,56(7), 3088–3104.MathSciNetCrossRef
8.
Zurück zum Zitat Khisti, A., & Wornell, G. W. (2010). Secure transmission with multiple antennas—Part 2: The MIMOME wiretap channel. IEEE Transactions on Information Theory,56(11), 5515–5532.MathSciNetCrossRef Khisti, A., & Wornell, G. W. (2010). Secure transmission with multiple antennas—Part 2: The MIMOME wiretap channel. IEEE Transactions on Information Theory,56(11), 5515–5532.MathSciNetCrossRef
9.
Zurück zum Zitat Liu, T., & Shamai, S. (2009). A note on the secrecy capacity of multiple antenna wiretap channel. IEEE Transactions on Information Theory,55(6), 2547–2533.MathSciNetCrossRef Liu, T., & Shamai, S. (2009). A note on the secrecy capacity of multiple antenna wiretap channel. IEEE Transactions on Information Theory,55(6), 2547–2533.MathSciNetCrossRef
10.
Zurück zum Zitat Shafiee, S., & Ulukus, S. (2007). Achievable rate in Gaussian MISO channels with secrecy constraints. In Proceedings of IEEE international symposium information theory (ISIT, pp. 2466–2470). Shafiee, S., & Ulukus, S. (2007). Achievable rate in Gaussian MISO channels with secrecy constraints. In Proceedings of IEEE international symposium information theory (ISIT, pp. 2466–2470).
11.
Zurück zum Zitat Gerbracht, S., Scheunert, C., & Jorswieck, E. A. (2012). Secrecy outage in MISO systems with partial channel information. IEEE Transactions on Information Forensics and Security,7(2), 704–716.CrossRef Gerbracht, S., Scheunert, C., & Jorswieck, E. A. (2012). Secrecy outage in MISO systems with partial channel information. IEEE Transactions on Information Forensics and Security,7(2), 704–716.CrossRef
12.
Zurück zum Zitat Sarkar, M. Z., & Ratnarajah, T. (2012). Enhancing security in correlated channel with maximal ratio combining diversity. IEEE Transactions on Signal Processing,60(12), 6745–6751.MathSciNetCrossRef Sarkar, M. Z., & Ratnarajah, T. (2012). Enhancing security in correlated channel with maximal ratio combining diversity. IEEE Transactions on Signal Processing,60(12), 6745–6751.MathSciNetCrossRef
13.
Zurück zum Zitat Yang, N., Yeoh, P. L., Elkashlan, M., Schober, R., & Collings, I. B. (2012). Secure transmission via transmit antenna selection in MIMO wiretap channels. In IEEE GLOBECOM, Anaheim, CA (pp. 807–812). Yang, N., Yeoh, P. L., Elkashlan, M., Schober, R., & Collings, I. B. (2012). Secure transmission via transmit antenna selection in MIMO wiretap channels. In IEEE GLOBECOM, Anaheim, CA (pp. 807–812).
14.
Zurück zum Zitat Yang, N., Yeoh, P. L., Elkashlan, M., Schober, R., & Collings, I. B. (2012). Transmit antenna selection for security enhancement in MIMO wiretap channels. IEEE Transactions on Communications,61(1), 144–154.CrossRef Yang, N., Yeoh, P. L., Elkashlan, M., Schober, R., & Collings, I. B. (2012). Transmit antenna selection for security enhancement in MIMO wiretap channels. IEEE Transactions on Communications,61(1), 144–154.CrossRef
15.
Zurück zum Zitat Wang, L., Elkashlan, M., Huang, J., Schober, R., & Mallik, R. K. (2014). Secure transmission with antenna selection in MIMO Nakagami-m fading channels. IEEE Transactions on Wireless Communications,13(11), 6054–6067.CrossRef Wang, L., Elkashlan, M., Huang, J., Schober, R., & Mallik, R. K. (2014). Secure transmission with antenna selection in MIMO Nakagami-m fading channels. IEEE Transactions on Wireless Communications,13(11), 6054–6067.CrossRef
16.
Zurück zum Zitat Alves, H., Souza, R. D., Debbah, M., & Bennis, M. (2012). Performance of transmit antenna selection physical layer security schemes. IEEE Signal Processing Letters,19(6), 372–375.CrossRef Alves, H., Souza, R. D., Debbah, M., & Bennis, M. (2012). Performance of transmit antenna selection physical layer security schemes. IEEE Signal Processing Letters,19(6), 372–375.CrossRef
17.
Zurück zum Zitat Zhu, J., Zou, Y., Wang, G., Yao, Y. D., & Karagiannidis, G. K. (2016). On secrecy performance of antenna-selection-aided MIMO systems against eavesdropping. IEEE Transactions on Vehicular Technology,65(1), 214–225.CrossRef Zhu, J., Zou, Y., Wang, G., Yao, Y. D., & Karagiannidis, G. K. (2016). On secrecy performance of antenna-selection-aided MIMO systems against eavesdropping. IEEE Transactions on Vehicular Technology,65(1), 214–225.CrossRef
18.
Zurück zum Zitat Wang, W., Teh, K. C., Luo, S., & Li, K. H. (2018). Physical layer security in heterogeneous networks with pilot attack: A stochastic geometry approach. IEEE Transactions on Communications,66(12), 6437–6449.CrossRef Wang, W., Teh, K. C., Luo, S., & Li, K. H. (2018). Physical layer security in heterogeneous networks with pilot attack: A stochastic geometry approach. IEEE Transactions on Communications,66(12), 6437–6449.CrossRef
19.
Zurück zum Zitat Wang, W., Teh, K. C., & Li, K. H. (2016). Relay selection for secure successive AF relaying networks with untrusted nodes. IEEE Transactions on Information Forensics and Security,11(11), 2466–2476.CrossRef Wang, W., Teh, K. C., & Li, K. H. (2016). Relay selection for secure successive AF relaying networks with untrusted nodes. IEEE Transactions on Information Forensics and Security,11(11), 2466–2476.CrossRef
20.
Zurück zum Zitat Tang, X., Ren, P., & Han, Z. (2018). Hierarchical competition as equilibrium program with equilibrium constraints towards security-enhanced wireless networks. IEEE Journal on Selected Areas in Communications,36(7), 1564–1578.CrossRef Tang, X., Ren, P., & Han, Z. (2018). Hierarchical competition as equilibrium program with equilibrium constraints towards security-enhanced wireless networks. IEEE Journal on Selected Areas in Communications,36(7), 1564–1578.CrossRef
21.
Zurück zum Zitat Subramanian, A., Thangaraj, A., Bloch, M., & McLaughlin, S. W. (2011). Strong secrecy on the binary erasure wiretap channel using large-girth LDPC codes. IEEE Transactions on Information Forensics and Security,6(3), 585–594.CrossRef Subramanian, A., Thangaraj, A., Bloch, M., & McLaughlin, S. W. (2011). Strong secrecy on the binary erasure wiretap channel using large-girth LDPC codes. IEEE Transactions on Information Forensics and Security,6(3), 585–594.CrossRef
23.
Zurück zum Zitat Thangaraj, A., Dihidar, S., Calderbank, A. R., McLaughlin, S. W., & Merolla, J. M. (2007). Applications of LDPC codes to the wiretap channel. IEEE Transactions on Information Theory,53(8), 2933–2945.MathSciNetCrossRef Thangaraj, A., Dihidar, S., Calderbank, A. R., McLaughlin, S. W., & Merolla, J. M. (2007). Applications of LDPC codes to the wiretap channel. IEEE Transactions on Information Theory,53(8), 2933–2945.MathSciNetCrossRef
24.
Zurück zum Zitat Yan, S., Yang, N., Malaney, R., & Yuan, J. (2014). Transmit antenna selection with Alamouti coding and power allocation in MIMO wiretap channels. IEEE Transactions on Wireless Communications,13(3), 1656–1667.CrossRef Yan, S., Yang, N., Malaney, R., & Yuan, J. (2014). Transmit antenna selection with Alamouti coding and power allocation in MIMO wiretap channels. IEEE Transactions on Wireless Communications,13(3), 1656–1667.CrossRef
25.
Zurück zum Zitat Kumar, R., & Chauhan, S. S. (2017). Secrecy analysis of MRT/RAS system under Nakagami-m fading channels in the presence of imperfect channel state information. International Journal of Electronics and Communications (AEU),85, 68–73.CrossRef Kumar, R., & Chauhan, S. S. (2017). Secrecy analysis of MRT/RAS system under Nakagami-m fading channels in the presence of imperfect channel state information. International Journal of Electronics and Communications (AEU),85, 68–73.CrossRef
26.
Zurück zum Zitat Shin, H., & Lee, J. H. (2004). Performance analysis of space–time block codes over keyhole Nakagami-m fading channels. IEEE Transactions on Vehicular Technology,53(2), 351–362.CrossRef Shin, H., & Lee, J. H. (2004). Performance analysis of space–time block codes over keyhole Nakagami-m fading channels. IEEE Transactions on Vehicular Technology,53(2), 351–362.CrossRef
27.
Zurück zum Zitat Gradshteyn, I., & Ryzhik, M. (1994). Tables of integrals, series and products. New York: Academic.MATH Gradshteyn, I., & Ryzhik, M. (1994). Tables of integrals, series and products. New York: Academic.MATH
Metadaten
Titel
Physical layer security for space–time-block-coded MIMO system in Rician fading in the presence of imperfect feedback
verfasst von
Rajiv Kumar
Sudakar Singh Chauhan
Publikationsdatum
22.04.2020
Verlag
Springer US
Erschienen in
Wireless Networks / Ausgabe 6/2020
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-020-02327-x

Weitere Artikel der Ausgabe 6/2020

Wireless Networks 6/2020 Zur Ausgabe

Neuer Inhalt