Secure Communication in Non-Geostationary Orbit Satellite Systems: A Physical Layer Security Perspective

Satellite communication systems serve as an indispensable component of wireless heterogeneous networks in 5G era for providing various critical civil and military applications. However, due to the broadcast nature and full accessibility of wireless medium, serious security threats exist from such systems. As an effort to address this issue, this paper, for the first time, investigates the secure communication in a non-geostationary orbit (NGSO) satellite system from a physical layer security perspective. Specifically, we focus on the downlink of an NGSO satellite which provides services to a fixed earth station and is wiretapped by a fixed eavesdropper. We first apply three types of orbiting models to characterize the movement state of the satellite. Based on the orbiting models, we then provide theoretical analysis for the secure communication performance of such a system. The expressions of two fundamental performance metrics, secrecy capacity and secrecy outage probability, are derived in a closed form for any system time. Finally, we conduct extensive simulations to validate our theoretical performance analysis and illustrate the security performance in a practical NGSO satellite communication system.

[1]  Hesham El Gamal,et al.  The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.

[2]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[3]  Lifeng Wang,et al.  Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.

[4]  Hsiao-Chun Wu,et al.  Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.

[5]  Min Lin,et al.  Secure transmission in multi-antenna hybrid satellite-terrestrial relay networks in the presence of eavesdropper , 2015, 2015 International Conference on Wireless Communications & Signal Processing (WCSP).

[6]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[7]  Fredrik Tufvesson,et al.  5G: A Tutorial Overview of Standards, Trials, Challenges, Deployment, and Practice , 2017, IEEE Journal on Selected Areas in Communications.

[8]  Xiangyun Zhou,et al.  Secure Routing in Multihop Wireless Ad-Hoc Networks With Decode-and-Forward Relaying , 2016, IEEE Transactions on Communications.

[9]  Donald F. Towsley,et al.  Physical Layer Security in Heterogeneous Cellular Networks , 2016, IEEE Transactions on Communications.

[10]  Robert K. Crane,et al.  Propagation Handbook for Wireless Communication System Design , 2003 .

[11]  Raef Bassily,et al.  Cooperative Security at the Physical Layer: A Summary of Recent Advances , 2013, IEEE Signal Processing Magazine.

[12]  Tarik Taleb,et al.  Security/QoS-aware route selection in multi-hop wireless ad hoc networks , 2016, 2016 IEEE International Conference on Communications (ICC).

[13]  Ender Tekin,et al.  The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.

[14]  Symeon Papavassiliou,et al.  Secrecy Capacity for Satellite Networks under Rain Fading , 2011, IEEE Transactions on Dependable and Secure Computing.

[15]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[16]  João Barros,et al.  Position-Based Jamming for Enhanced Wireless Secrecy , 2011, IEEE Transactions on Information Forensics and Security.

[17]  Yue Gao,et al.  Physical layer security for 5G non-orthogonal multiple access in large-scale networks , 2016, 2016 IEEE International Conference on Communications (ICC).

[18]  Dennis Roddy,et al.  Satellite Communications , 1989 .

[19]  Zhu Han,et al.  Secrecy Analysis on Network Coding in Bidirectional Multibeam Satellite Communications , 2015, IEEE Transactions on Information Forensics and Security.

[20]  Meixia Tao,et al.  Relay Placement for Physical Layer Security: A Secure Connection Perspective , 2012, IEEE Communications Letters.

[21]  H. Vincent Poor,et al.  Multiple-Access Channels With Confidential Messages , 2008, IEEE Transactions on Information Theory.

[22]  A. Lee Swindlehurst,et al.  Secure Relay and Jammer Selection for Physical Layer Security , 2015, IEEE Signal Processing Letters.

[23]  Xiaohong Jiang,et al.  SOQR: Secure Optimal QoS Routing in Wireless Ad Hoc Networks , 2017, 2017 IEEE Wireless Communications and Networking Conference (WCNC).

[24]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[25]  Hsiao-Hwa Chen,et al.  Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges , 2017, IEEE Communications Surveys & Tutorials.

[26]  Frédérique E. Oggier,et al.  The secrecy capacity of the MIMO wiretap channel , 2008, ISIT.

[27]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[28]  Riccardo De Gaudenzi,et al.  MIMO over Satellite: A Review , 2011, IEEE Communications Surveys & Tutorials.

[29]  Ali Abdi,et al.  A new simple model for land mobile satellite channels: first- and second-order statistics , 2003, IEEE Trans. Wirel. Commun..

[30]  Min Lin,et al.  Average secrecy capacity of land mobile satellite wiretap channels , 2016, 2016 8th International Conference on Wireless Communications & Signal Processing (WCSP).

[31]  Hao Chen,et al.  Social Tie Based Cooperative Jamming for Physical Layer Security , 2015, IEEE Communications Letters.

[32]  Sastri L. Kota,et al.  A survey on mobile satellite systems , 2010, Int. J. Satell. Commun. Netw..

[33]  Björn E. Ottersten,et al.  Physical Layer Security in Multibeam Satellite Systems , 2012, IEEE Transactions on Wireless Communications.

[34]  Panayotis G. Cottis,et al.  Satellite communications at KU, KA, and V bands: Propagation impairments and mitigation techniques , 2004, IEEE Communications Surveys & Tutorials.

[35]  Tho Le-Ngoc,et al.  Physical layer security in wireless cooperative relay networks: state of the art and beyond , 2015, IEEE Communications Magazine.

[36]  Kurt Binder,et al.  Monte Carlo Simulation in Statistical Physics , 1992, Graduate Texts in Physics.

[37]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[38]  Jean-Philippe Aumasson,et al.  The impact of quantum computing on cryptography , 2017 .