Physical layer secrecy performance over Rayleigh/Rician fading channels

In this paper, we investigate the physical layer secrecy performance of a single-input single-output system that consists of single antenna devices and operates in the presence of a single antenna passive eavesdropper over dissimilar fading channels. In particular, we consider two scenarios in terms of dissimilar fading channel arrangements: the legal/illegal channels are subject to Rayleigh/Rician fading, respectively; and the legal/illegal channels are subject to Rician/Rayleigh fading, respectively. Specifically, analytical expressions for the probability of the existence of a non-zero secrecy capacity and the secrecy outage probability are derived by using statistical characteristics of the signal-to-noise ratio. Numerical results are provided for selected scenarios to illustrate applications of the developed analytical expressions.

[1]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[2]  Wade Trappe,et al.  Information-Theoretically Secret Key Generation for Fading Wireless Channels , 2009, IEEE Transactions on Information Forensics and Security.

[3]  Miguel R. D. Rodrigues,et al.  Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.

[4]  Roy D. Yates,et al.  Secret Communication with a Fading Eavesdropper Channel , 2007, 2007 IEEE International Symposium on Information Theory.

[5]  Chau Yuen,et al.  Physical Layer Security of TAS/MRC With Antenna Correlation , 2013, IEEE Transactions on Information Forensics and Security.

[6]  Ueli Maurer,et al.  Secret key agreement by public discussion , 1993 .

[7]  Aggelos Kiayias,et al.  Robust key generation from signal envelopes in wireless networks , 2007, CCS '07.

[8]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2007, ISIT.

[9]  George K. Karagiannidis,et al.  Performance analysis of the dual-hop asymmetric fading channel , 2009, IEEE Transactions on Wireless Communications.

[10]  Ueli Maurer,et al.  Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.

[11]  Mehdi Bennis,et al.  Performance of Transmit Antenna Selection Physical Layer Security Schemes , 2012, IEEE Signal Processing Letters.

[12]  T. Aono,et al.  Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels , 2005, IEEE Transactions on Antennas and Propagation.

[13]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.