Secrecy Performance Analysis for Hybrid Wiretapping Systems Using Random Matrix Theory

In this paper, we study the secrecy performance in a hybrid wiretapping wireless system, where the half-duplex (HD) or full-duplex (FD) eavesdroppers may wiretap the confidential signal and/or transmit a jamming signal. To evaluate the secrecy performance, we derive the approximate closed-form results for the secrecy outage probability and mean secrecy rate by means of the random matrix theory (RMT). The RMT method can greatly simplify the complicated mathematical analysis with high accuracy, and can provide a useful analytical framework for other researches. The Monte Carlo simulations and numerical results are provided to validate the theoretical analysis and demonstrate the impacts of the system parameters. From the perspective of BS transmission, increasing BS transmission power can greatly improve the secrecy performance in the low transmit power region, but the secrecy performance is constant in the high BS transmit power region. Moreover, in terms of adversaries, FD eavesdroppers have better wiretapping performance than HD eavesdroppers when the jamming power is relatively low; otherwise, this result is reversed.

[1]  Zhu Han,et al.  Distributed Power Optimization for Security-Aware Multi-Channel Full-Duplex Communications: A Variational Inequality Framework , 2017, IEEE Transactions on Communications.

[2]  Jeffrey G. Andrews,et al.  Physical Layer Security in Downlink Multi-Antenna Cellular Networks , 2013, IEEE Transactions on Communications.

[3]  Björn E. Ottersten,et al.  Improving Physical Layer Secrecy Using Full-Duplex Jamming Receivers , 2013, IEEE Transactions on Signal Processing.

[4]  Qian Yang,et al.  Safeguarding Decentralized Wireless Networks Using Full-Duplex Jamming Receivers , 2016, IEEE Transactions on Wireless Communications.

[5]  Zhi Chen,et al.  MIMO Secret Communications Against an Active Eavesdropper , 2016, IEEE Transactions on Information Forensics and Security.

[6]  D. Stoyan,et al.  Stochastic Geometry and Its Applications , 1989 .

[7]  Lifeng Wang,et al.  Physical Layer Security of Maximal Ratio Combining in Two-Wave With Diffuse Power Fading Channels , 2014, IEEE Transactions on Information Forensics and Security.

[8]  P. Spreij Probability and Measure , 1996 .

[9]  Zhu Han,et al.  Resource allocation in full-duplex communications for future wireless networks , 2015, IEEE Wireless Communications.

[10]  Joseph Lipka,et al.  A Table of Integrals , 2010 .

[11]  Vijay K. Bhargava,et al.  Linear Precoding of Data and Artificial Noise in Secure Massive MIMO Systems , 2015, IEEE Transactions on Wireless Communications.

[12]  Jeffrey G. Andrews,et al.  Statistics of Co-Channel Interference in a Field of Poisson and Poisson-Poisson Clustered Interferers , 2010, IEEE Transactions on Signal Processing.

[13]  M. Lavanya,et al.  Secure Transmission in MIMO Wiretap Channels Using General-Order Transmit Antenna Selection with outdated CSI , 2017 .

[14]  Navrati Saxena,et al.  Next Generation 5G Wireless Networks: A Comprehensive Survey , 2016, IEEE Communications Surveys & Tutorials.

[15]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[16]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[17]  Zhijin Qin,et al.  Enhancing the Physical Layer Security of Non-Orthogonal Multiple Access in Large-Scale Networks , 2016, IEEE Transactions on Wireless Communications.

[18]  F. B. Hildebrand,et al.  Introduction To Numerical Analysis , 1957 .

[19]  Jeffrey G. Andrews,et al.  Secrecy Rates in Broadcast Channels with Confidential Messages and External Eavesdroppers , 2013, IEEE Transactions on Wireless Communications.

[20]  R. Couillet,et al.  Random Matrix Methods for Wireless Communications: Estimation , 2011 .

[21]  Jinhong Yuan,et al.  Confidential Broadcasting via Linear Precoding in Non-Homogeneous MIMO Multiuser Networks , 2014, IEEE Transactions on Communications.

[22]  Kai-Kit Wong,et al.  Full-Duplex Small-Cell Networks: A Physical-Layer Security Perspective , 2018, IEEE Transactions on Communications.

[23]  A. Lee Swindlehurst,et al.  A vector-perturbation technique for near-capacity multiantenna multiuser communication-part II: perturbation , 2005, IEEE Transactions on Communications.

[24]  Halim Yanikomeroglu,et al.  Robust Resource Allocation to Enhance Physical Layer Security in Systems With Full-Duplex Receivers: Active Adversary , 2017, IEEE Transactions on Wireless Communications.

[25]  Matthew R. McKay,et al.  On the Design of Artificial-Noise-Aided Secure Multi-Antenna Transmission in Slow Fading Channels , 2012, IEEE Transactions on Vehicular Technology.

[26]  Zhu Han,et al.  Secrecy performance analysis of hybrid eavesdroppers system using stochastic geometry and random matrix theory , 2017, 2017 IEEE International Conference on Communications (ICC).

[27]  Qiang Li,et al.  Robust Cooperative Beamforming and Artificial Noise Design for Physical-Layer Secrecy in AF Multi-Antenna Multi-Relay Networks , 2015, IEEE Transactions on Signal Processing.

[28]  Qimei Cui,et al.  Large-System Analysis of Artificial-Noise-Assisted Communication in the Multiuser Downlink: Ergodic Secrecy Sum Rate and Optimal Power Allocation , 2016, IEEE Transactions on Vehicular Technology.

[29]  Gene H. Golub,et al.  Matrix computations , 1983 .

[30]  C. Tracy,et al.  The Distributions of Random Matrix Theory and their Applications , 2009 .

[31]  Can Emre Koksal,et al.  On the Secrecy Capacity of Block Fading Channels With a Hybrid Adversary , 2013, IEEE Transactions on Information Theory.

[32]  Yu Gong,et al.  Physical Layer Network Security in the Full-Duplex Relay System , 2015, IEEE Transactions on Information Forensics and Security.

[33]  Zhu Han,et al.  Combating Full-Duplex Active Eavesdropper: A Hierarchical Game Perspective , 2017, IEEE Transactions on Communications.

[34]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[35]  Jeffrey G. Andrews,et al.  What Will 5G Be? , 2014, IEEE Journal on Selected Areas in Communications.

[36]  Justin P. Coon,et al.  Secrecy Outage Analysis for Downlink Transmissions in the Presence of Randomly Located Eavesdroppers , 2017, IEEE Transactions on Information Forensics and Security.

[37]  Robert W. Heath,et al.  Modeling heterogeneous network interference , 2012, 2012 Information Theory and Applications Workshop.

[38]  Mérouane Debbah,et al.  Large System Analysis of Linear Precoding in Correlated MISO Broadcast Channels Under Limited Feedback , 2009, IEEE Transactions on Information Theory.

[39]  Lifeng Wang,et al.  Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.

[40]  Lajos Hanzo,et al.  A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.

[41]  Tharmalingam Ratnarajah,et al.  On Ergodic Secrecy Capacity of Random Wireless Networks With Protected Zones , 2016, IEEE Transactions on Vehicular Technology.

[42]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[43]  Feifei Gao,et al.  Joint Information- and Jamming-Beamforming for Physical Layer Security With Full Duplex Base Station , 2014, IEEE Transactions on Signal Processing.