Performance of Transmit Antenna Selection Physical Layer Security Schemes

We analyze the physical layer (PHY) security of a communication scheme consisting of a multiple antenna transmitter with a single radio frequency (RF) chain using transmit antenna selection (TAS) and a single antenna receiver, in the presence of a sophisticated multiple antenna eavesdropper. We develop closed-form expressions for the analysis of the secrecy outage probability, and we show that the PHY security can be considerably enhanced when multiple antennas are available at the legitimate transmitter. Moreover, a single RF chain multiple antenna transmitter reduces cost, complexity, size and power consumption at the expense of a slight loss in performance with respect to a multiple RF chain transmitter.

[1]  Miguel R. D. Rodrigues,et al.  On Wireless Channels with M-Antenna Eavesdroppers: Characterization of the Outage Probability and Outage Secrecy Capacity , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[2]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[3]  Zhi Ding,et al.  On Secrecy of Codebook-Based Transmission Beamforming under Receiver Limited Feedback , 2011, IEEE Transactions on Wireless Communications.

[4]  Aria Nosratinia,et al.  Antenna selection in MIMO systems , 2004, IEEE Communications Magazine.

[5]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2007, IEEE Transactions on Information Theory.

[6]  Fadhel M. Ghannouchi,et al.  Single RF front-end MIMO transceivers , 2011, IEEE Commun. Mag..

[7]  M. Abramowitz,et al.  Handbook of Mathematical Functions With Formulas, Graphs and Mathematical Tables (National Bureau of Standards Applied Mathematics Series No. 55) , 1965 .

[8]  Shiva Prakash,et al.  Effects of Channel Prediction for Transmit Antenna Selection With Maximal-Ratio Combining in Rayleigh Fading , 2011, IEEE Transactions on Vehicular Technology.

[9]  Miguel R. D. Rodrigues,et al.  Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.

[10]  Branka Vucetic,et al.  Analysis of transmit antenna selection/maximal-ratio combining in Rayleigh fading channels , 2005, IEEE Transactions on Vehicular Technology.

[11]  Miguel R. D. Rodrigues,et al.  On Wireless Channels With ${M}$-Antenna Eavesdroppers: Characterization of the Outage Probability and $\varepsilon $-Outage Secrecy Capacity , 2011, IEEE Transactions on Information Forensics and Security.

[12]  Hong Man,et al.  Maximal Ratio Diversity Combining Enhanced Security , 2011, IEEE Communications Letters.

[13]  D. Owen Handbook of Mathematical Functions with Formulas , 1965 .

[14]  Milton Abramowitz,et al.  Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables , 1964 .

[15]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[16]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.