Physical layer secrecy performance with transmitter antenna selection over dissimilar fading channels

In this paper, we investigate the physical layer secrecy performance of a multi-input single-output system. The system consists of multiple antennas at transmitter and single antenna at receiver in the presence of a passive eavesdropper with single antenna over dissimilar fading channels. On the assumption that legal channel is subject to Rayleigh fading while illegal channel undergoes Hoyt fading, expressions for the existence probabilities of secrecy capacity and secrecy outage are derived by using statistical characteristics of signal-to-noise ratio. Analytical results are verified by Monte-Carlo simulations.

[1]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[2]  Wade Trappe,et al.  Information-Theoretically Secret Key Generation for Fading Wireless Channels , 2009, IEEE Transactions on Information Forensics and Security.

[3]  Mehdi Bennis,et al.  Performance of Transmit Antenna Selection Physical Layer Security Schemes , 2012, IEEE Signal Processing Letters.

[4]  T. Aono,et al.  Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels , 2005, IEEE Transactions on Antennas and Propagation.

[5]  Miguel R. D. Rodrigues,et al.  Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.

[6]  Aggelos Kiayias,et al.  Robust key generation from signal envelopes in wireless networks , 2007, CCS '07.

[7]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[8]  George K. Karagiannidis,et al.  Performance analysis of the dual-hop asymmetric fading channel , 2009, IEEE Transactions on Wireless Communications.

[9]  Chau Yuen,et al.  Physical Layer Security of TAS/MRC With Antenna Correlation , 2013, IEEE Transactions on Information Forensics and Security.

[10]  Ueli Maurer,et al.  Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.

[11]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.

[12]  Ueli Maurer,et al.  Secret key agreement by public discussion , 1993 .