Physical layer security under Rayleigh/Weibull and Hoyt/Weibull fading

This paper investigates the information theoretic secrecy for different combinations of Rayeligh, Weibull and Hoyt fading channels. The considered communication model employs distinct channel conditions at legitimate and eavesdropping links. This scenario is deemed to be practical when the legitimate receiver and eavesdropper are placed far from each other and experience completely different type of channel fading conditions. Hence, this paper provides four scenarios when main (legitimate)/ wiretap (eavesdropping) channel undergo Weibull/Rayleigh fading, Rayleigh/Weibull fading, Weibull/Hoyt fading and Hoyt/Weibull fading. Closed-form expressions for the secrecy outage probability are derived for the given scenarios that are corroborated through extensive simulations in MATLAB.

[1]  Xian Liu Average secrecy capacity of the Weibull fading channel , 2016, 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[2]  Henry L. Bertoni,et al.  Coverage prediction for mobile radio systems operating in the 800/900 MHz frequency range , 1988 .

[3]  Furqan Jameel,et al.  Performance analysis of VANETs under Rayleigh, Rician, Nakagami-m and Weibull fading , 2017, 2017 International Conference on Communication, Computing and Digital Systems (C-CODE).

[4]  Dac-Binh Ha,et al.  Physical Layer Secrecy Performance Analysis over Rayleigh / Nakagami Fading Channels , 2014 .

[5]  Furqan Jameel,et al.  Secrecy Outage of SWIPT in the Presence of Cooperating Eavesdroppers , 2017, ArXiv.

[6]  David B. Smith,et al.  A simulator for the dynamic on-body area propagation channel , 2009, 2009 IEEE Antennas and Propagation Society International Symposium.

[7]  Juan Manuel Romero-Jerez,et al.  A New Framework for the Performance Analysis of Wireless Communications Under Hoyt (Nakagami- $q$ ) Fading , 2014, IEEE Transactions on Information Theory.

[8]  Furqan Jameel,et al.  Secrecy Outage for Wireless Sensor Networks , 2017, IEEE Communications Letters.

[9]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[10]  Victor C. M. Leung,et al.  Improving physical-layer security in wireless communications using diversity techniques , 2014, IEEE Network.

[11]  H. B. Riley,et al.  Short range forest channel modeling in the 5 GHz band , 2012, 2012 6th European Conference on Antennas and Propagation (EUCAP).

[12]  Ray S. Hoyt Probability functions for the modulus and angle of the normal complex variate , 1947 .

[13]  H. Hashemi,et al.  The indoor radio propagation channel , 1993, Proc. IEEE.

[14]  Ebrahim A. Alrashed,et al.  A Key Management Approach for Forward and Backward Secrecy in Unattended WSNs , 2017 .

[15]  Matthias Pätzold,et al.  A study on the second order statistics of Nakagami-Hoyt mobile fading channels , 2005, IEEE Transactions on Vehicular Technology.

[16]  Baoyu Zheng,et al.  Physical-Layer Security and Reliability Challenges for Industrial Wireless Sensor Networks , 2017, IEEE Access.

[17]  Trung Q. Duong,et al.  Physical layer secrecy performance over Rayleigh/Rician fading channels , 2014, 2014 International Conference on Advanced Technologies for Communications (ATC 2014).

[18]  P.T. Mathiopoulos,et al.  On the correlated weibull fading model and its applications , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..

[19]  Vijay K. Bhargava,et al.  Simple and accurate methods for outage analysis in cellular mobile radio systems-a unified approach , 2001, IEEE Trans. Commun..

[20]  David W. Matolak,et al.  Vehicle–Vehicle Channel Models for the 5-GHz Band , 2008, IEEE Transactions on Intelligent Transportation Systems.

[21]  David W. Matolak,et al.  5-GHz-Band Vehicle-to-Vehicle Channels: Models for Multiple Values of Channel Bandwidth , 2010, IEEE Transactions on Vehicular Technology.