Individual secrecy of fading homogeneous multiple access wiretap channel with successive interference cancellation

We investigate individual secrecy performance in a K-user quasi-static Rayleigh fading homogeneous multiple access wiretap channel (MAC-WT), where a legitimate receiver employs successive interference cancellation (SIC) decoding. We first evaluate individual secrecy performance under an arbitrary SIC order by deriving closed-form expressions with respect to secrecy outage probability and effective secrecy throughput (EST) as main metrics. The resulting closed-form expressions disclose a significant impact on the secrecy performance from the order of SIC decoding. Therefore, we propose three SIC decoding order scheduling schemes: (1) round-robin scheme, absolutely fair and served as a benchmark; (2) suboptimal scheme, based on each user’s main channel condition; and (3) optimal scheme, based on each user’s achievable secrecy rate. Comparison results show that the last two schemes outperform the first one with regard to both the EST and the multi-user diversity gain, whereas the performance of the suboptimal scheme is highly close to that of the optimal scheme which is usually impractical due to a requirement for the eavesdropper’s channel state information (CSI).

[1]  Zhi Chen,et al.  Robust transmit design for secure AF relay networks with imperfect CSI , 2016, EURASIP J. Wirel. Commun. Netw..

[2]  Pritam Mukherjee,et al.  Secure degrees of freedom of the MIMO multiple access wiretap channel , 2015, 2015 49th Asilomar Conference on Signals, Systems and Computers.

[3]  Li Sun,et al.  Physical layer security based on real interference alignment in K-user MIMO Y wiretap channels , 2016, 2016 IEEE International Conference on Communications Workshops (ICC).

[4]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[5]  Paul D. Alexander,et al.  List detection for the K-symmetric multiple-access channel , 2005, IEEE Transactions on Information Theory.

[6]  Hisham Dahshan,et al.  On the secure Degrees of Freedom for the K-user symmetric MIMO Wiretap MAC channel , 2016, 2016 IEEE Conference on Communications and Network Security (CNS).

[7]  Gongpu Wang,et al.  Secrecy outage probability analysis of multi-user multi-eavesdropper wireless systems , 2014, 2014 IEEE/CIC International Conference on Communications in China (ICCC).

[8]  Qimei Cui,et al.  Secure transmission with artificial noise in the multiuser downlink: Secrecy sum-rate and optimal power allocation , 2015, 2015 IEEE Wireless Communications and Networking Conference (WCNC).

[9]  Feifei Gao,et al.  Zero-forcing beamforming for physical layer security of energy harvesting wireless communications , 2015, EURASIP Journal on Wireless Communications and Networking.

[10]  Anas Chaaban,et al.  The MISO wiretap channel with channel uncertainty: Asymptotic perspectives , 2016, 2016 IEEE Global Conference on Signal and Information Processing (GlobalSIP).

[11]  Mohamed-Slim Alouini,et al.  The MISO Wiretap Channel with Noisy Main Channel Estimation in the High Power Regime , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[12]  Wei Wu,et al.  Robust secrecy beamforming for wireless information and power transfer in multiuser MISO communication system , 2015, EURASIP J. Wirel. Commun. Netw..

[13]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[14]  N. Lebedev,et al.  Capacity study of a LEO satellite link with multiple antennas user terminals , 2000, Conference Record of the Thirty-Fourth Asilomar Conference on Signals, Systems and Computers (Cat. No.00CH37154).

[15]  Bahareh Akhbari,et al.  Imperfect and Perfect Secrecy in Compound Multiple Access Channel With Confidential Message , 2016, IEEE Transactions on Information Forensics and Security.

[16]  Zhen Li,et al.  ZF-SIC Based Individual Secrecy in SIMO Multiple Access Wiretap Channel , 2017, IEEE Access.

[17]  Xiuzhen Cheng,et al.  Cooperative jamming for secure communications in MIMO Cooperative Cognitive Radio Networks , 2015, 2015 IEEE International Conference on Communications (ICC).

[18]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2007, ISIT.

[19]  Harald Haas,et al.  Asilomar Conference on Signals, Systems, and Computers , 2006 .

[20]  Pritam Mukherjee,et al.  Real interference alignment for the MIMO multiple access wiretap channel , 2016, 2016 IEEE International Conference on Communications (ICC).

[21]  Bahareh Akhbari,et al.  Multiple access channel with common message and secrecy constraint , 2014, IET Commun..

[22]  Trung Quang Duong,et al.  Optimal Transmission With Artificial Noise in MISOME Wiretap Channels , 2016, IEEE Transactions on Vehicular Technology.

[23]  Bin Li,et al.  Robust beamforming and cooperative jamming for secure transmission in DF relay systems , 2016, EURASIP J. Wirel. Commun. Netw..

[24]  Shihao Yan,et al.  Artificial Noise: Transmission Optimization in Multi-Input Single-Output Wiretap Channels , 2015, IEEE Transactions on Communications.

[25]  Mounir Ghogho,et al.  Secure Communication via Sending Artificial Noise by the Receiver: Outage Secrecy Capacity/Region Analysis , 2012, IEEE Communications Letters.

[26]  Mohammad Reza Aref,et al.  Lossy transmission of correlated sources over multiple-access wiretap channels , 2015, IET Commun..

[27]  Miguel R. D. Rodrigues,et al.  Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.

[28]  Jianwei Xie,et al.  Secure degrees of freedom of the Gaussian multiple access wiretap channel , 2013, 2013 IEEE International Symposium on Information Theory.

[29]  Shun Watanabe 国際会議参加報告:IEEE International Symposium on Information Theory , 2012 .

[30]  Bang Chul Jung,et al.  On the Multi-User Diversity with Secrecy in Uplink Wiretap Networks , 2013, IEEE Communications Letters.

[31]  Zhen Li,et al.  Analysis of secrecy performance in fading multiple access wiretap channel with SIC receiver , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.

[32]  Ender Tekin,et al.  The Gaussian Multiple Access Wire-Tap Channel , 2006, IEEE Transactions on Information Theory.

[33]  Sirin Nitinawarat,et al.  On maximal error capacity regions of Symmetric Gaussian Multiple-Access Channels , 2011, 2011 IEEE International Symposium on Information Theory Proceedings.

[34]  Sennur Ulukus,et al.  Polar Coding for the General Wiretap Channel With Extensions to Multiuser Scenarios , 2016, IEEE Journal on Selected Areas in Communications.

[35]  Moritz Wiese,et al.  A Channel Under Simultaneous Jamming and Eavesdropping Attack—Correlated Random Coding Capacities Under Strong Secrecy Criteria , 2014, IEEE Transactions on Information Theory.

[36]  Ender Tekin,et al.  The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.

[37]  Di Zhao,et al.  Secrecy Balancing over Two-User MISO Interference Channels with Rician Fading , 2013 .

[38]  Raef Bassily,et al.  Ergodic Secret Alignment , 2010, IEEE Transactions on Information Theory.

[39]  E. Tekin Secrecy Sum-Rates for the Multiple-Access WireTap Channel with Ergodic Block Fading , 2007 .

[40]  Il-Min Kim,et al.  Cooperative jamming polar codes for multiple-access wiretap channels , 2016, IET Commun..

[41]  I. S. Gradshteyn,et al.  Table of Integrals, Series, and Products , 1976 .

[42]  Remi A. Chou,et al.  Uniform distributed source coding for the multiple access wiretap channel , 2014, 2014 IEEE Conference on Communications and Network Security.

[43]  Jörg Kliewer,et al.  Low-complexity channel resolvability codes for the symmetric multiple-access channel , 2014, 2014 IEEE Information Theory Workshop (ITW 2014).

[44]  Yueming Cai,et al.  Opportunistic relaying and jamming with robust design in hybrid full/half-duplex relay system , 2016, EURASIP J. Wirel. Commun. Netw..

[45]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[46]  David Tse,et al.  Fundamentals of Wireless Communication , 2005 .

[47]  Ying Wang,et al.  Distributed coalitional game for friendly jammer selection in ultra-dense networks , 2016, EURASIP J. Wirel. Commun. Netw..

[48]  L. H. Abderrahmane,et al.  Design of an Adaptive Communication System for Implementation on Board a Future Algerian LEO Satellite , 2008, 2008 IEEE Aerospace Conference.

[49]  Tomoaki Ohtsuki,et al.  Joint SVD-GSVD Precoding Technique and Secrecy Capacity Lower Bound for the MIMO Relay Wire-Tap Channel , 2012, VTC Spring.

[50]  Pritam Mukherjee,et al.  Secure degrees of freedom of the multiple access wiretap channel with no eavesdropper CSI , 2015, 2015 IEEE International Symposium on Information Theory (ISIT).

[51]  Robert A. Profet,et al.  2004 IEEE AEROSPACE CONFERENCES BOARD OF DIRECTORS , 2004 .

[52]  Matthieu R. Bloch,et al.  Physical-Layer Security: From Information Theory to Security Engineering , 2011 .

[53]  Derrick Wing Kwan Ng,et al.  Joint Beamforming and Power Allocation for Secrecy in Peer-to-Peer Relay Networks , 2015, IEEE Transactions on Wireless Communications.

[54]  Ali Ghrayeb,et al.  Achieving Full Secure Degrees-of-Freedom for the MISO Wiretap Channel With an Unknown Eavesdropper , 2016, IEEE Transactions on Wireless Communications.

[55]  Jianwei Xie,et al.  Secure degrees of freedom region of the Gaussian multiple access wiretap channel , 2013, 2013 Asilomar Conference on Signals, Systems and Computers.

[56]  Yuan Jiang,et al.  Secrecy outage analysis of multi-user cellular networks in the face of cochannel interference , 2015, 2015 IEEE 14th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC).