Wireless physical-layer security with multiple receivers and eavesdroppers: Outage probability and average secrecy capacity

The wiretap channel model in a wireless scenario is analyzed where there is a transmitter, multiple legitimate receivers, non-colluding and colluding eavesdroppers; each of them is equipped with one antenna. Furthermore, all the channels are mutually independent and experiencing quasi-static Nakagami-m fading. We derive closed-form expressions for the exact secrecy outage probability as well as the average secrecy capacity with both non-colluding and colluding eavesdroppers. Such performance metrics are used to analyze the impacts of the number of receivers and eavesdroppers on the system. Remarkably, our results reveal that, for non-colluding eavesdroppers, increasing the number of users will cause greater secrecy degradation than the number of eavesdroppers, especially when the main channel is far superior to the wiretap channel or the value of the fading parameter is high. And for the colluding case, it turns out to be the opposite.

[1]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[2]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[3]  R. Negi,et al.  Secret communication in presence of colluding eavesdroppers , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.

[4]  Guanding Yu,et al.  On the Secrecy Capacity of Fading Wireless Channel with Multiple Eavesdroppers , 2007, 2007 IEEE International Symposium on Information Theory.

[5]  Mathini Sellathurai,et al.  Secure wireless multicasting through Rayleigh fading channels — A secrecy tradeoff , 2009, 2009 First UK-India International Workshop on Cognitive Wireless Systems (UKIWCWS).

[6]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[7]  Tharmalingam Ratnarajah,et al.  Enhancing Security in Correlated Channel With Maximal Ratio Combining Diversity , 2012, IEEE Transactions on Signal Processing.

[8]  Branka Vucetic,et al.  Error performance of maximal-ratio combining with transmit antenna selection in flat Nakagami-m fading channels , 2006, IEEE Transactions on Wireless Communications.

[9]  Iain B. Collings,et al.  Transmit Antenna Selection for Security Enhancement in MIMO Wiretap Channels , 2013, IEEE Transactions on Communications.

[10]  David Tse,et al.  Fundamentals of Wireless Communication , 2005 .

[11]  Hong Man,et al.  Maximal Ratio Diversity Combining Enhanced Security , 2011, IEEE Communications Letters.

[12]  Moe Z. Win,et al.  Secure Communication in Stochastic Wireless Networks—Part II: Maximum Rate and Collusion , 2012, IEEE Transactions on Information Forensics and Security.

[13]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2007, ISIT.

[14]  Kai-Kit Wong,et al.  Secrecy Performance Analysis for TAS-MRC System With Imperfect Feedback , 2015, IEEE Transactions on Information Forensics and Security.

[15]  Mohamed-Slim Alouini,et al.  Digital Communication Over Fading Channels: A Unified Approach to Performance Analysis , 2000 .

[16]  Yunfei Chen,et al.  Physical-Layer Security Over Non-Small-Scale Fading Channels , 2016, IEEE Transactions on Vehicular Technology.

[17]  Hyuckjae Lee,et al.  Bounds on Secrecy Capacity Over Correlated Ergodic Fading Channels at High SNR , 2011, IEEE Transactions on Information Theory.

[18]  Jing Huang,et al.  Secure Transmission With Antenna Selection in MIMO Nakagami- $m$ Fading Channels , 2014, IEEE Transactions on Wireless Communications.

[19]  Candice King,et al.  Fundamentals of wireless communications , 2013, 2014 67th Annual Conference for Protective Relay Engineers.

[20]  Miguel R. D. Rodrigues,et al.  On Wireless Channels with M-Antenna Eavesdroppers: Characterization of the Outage Probability and Outage Secrecy Capacity , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[21]  Miguel R. D. Rodrigues,et al.  On Wireless Channels With ${M}$-Antenna Eavesdroppers: Characterization of the Outage Probability and $\varepsilon $-Outage Secrecy Capacity , 2011, IEEE Transactions on Information Forensics and Security.

[22]  Ming Li,et al.  Waveform Design for Secure SISO Transmissions and Multicasting , 2013, IEEE Journal on Selected Areas in Communications.

[23]  Chau Yuen,et al.  Physical Layer Security of TAS/MRC With Antenna Correlation , 2013, IEEE Transactions on Information Forensics and Security.

[24]  M. Lavanya,et al.  Secure Transmission in MIMO Wiretap Channels Using General-Order Transmit Antenna Selection with outdated CSI , 2017 .

[25]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[26]  Emad K. Al-Hussaini,et al.  Performance of MRC Diversity Systems for the Detection of Signals with Nakagami Fading , 1985, IEEE Trans. Commun..