Secrecy Capacity Analysis Over κ-μ Fading Channels: Theory and Applications

In this paper, we consider the transmission of confidential information over a $\kappa $ – $\mu $ fading channel in the presence of an eavesdropper who also experiences $\kappa $ – $\mu $ fading. In particular, we obtain novel analytical solutions for the probability of strictly positive secrecy capacity (SPSC) and a lower bound of secure outage probability (SOP $^{L}$ ) for independent and non-identically distributed channel coefficients without parameter constraints. We also provide a closed-form expression for the probability of SPSC when the $\mu $ parameter is assumed to take positive integer values. Monte-Carlo simulations are performed to verify the derived results. The versatility of the $\kappa $ – $\mu $ fading model means that the results presented in this paper can be used to determine the probability of SPSC and SOP $^{L}$ for a large number of other fading scenarios, such as Rayleigh, Rice (Nakagami- $n$ ), Nakagami- $m$ , One-Sided Gaussian, and mixtures of these common fading models. In addition, due to the duality of the analysis of secrecy capacity and co-channel interference (CCI), the results presented here will have immediate applicability in the analysis of outage probability in wireless systems affected by CCI and background noise (BN). To demonstrate the efficacy of the novel formulations proposed here, we use the derived equations to provide a useful insight into the probability of SPSC and SOP $^{L}$ for a range of emerging wireless applications, such as cellular device-to-device, peer-to-peer, vehicle-to-vehicle, and body centric communications using data obtained from real channel measurements.

[1]  Miguel R. D. Rodrigues,et al.  Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.

[2]  Xian Liu,et al.  Probability of Strictly Positive Secrecy Capacity of the Rician-Rician Fading Channel , 2013, IEEE Wireless Communications Letters.

[3]  U. Maurer,et al.  Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.

[4]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.

[5]  Olav Tirkkonen,et al.  Laplace Transform of Product of Generalized Marcum Q, Bessel I, and Power Functions With Applications , 2014, IEEE Transactions on Signal Processing.

[6]  Matthew R. McKay,et al.  On the Equivalence Between Interference and Eavesdropping in Wireless Communications , 2014, IEEE Transactions on Vehicular Technology.

[7]  T. MacRobert Higher Transcendental Functions , 1955, Nature.

[8]  George K. Karagiannidis,et al.  Analytic Expressions and Bounds for Special Functions and Applications in Communication Theory , 2014, IEEE Transactions on Information Theory.

[9]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[10]  Simon L. Cotton,et al.  Human Body Shadowing in Cellular Device-to-Device Communications: Channel Modeling Using the Shadowed $\kappa-\mu$ Fading Model , 2015, IEEE Journal on Selected Areas in Communications.

[11]  Xian Liu,et al.  Secrecy capacity of wireless links subject to log-normal fading , 2012, 7th International Conference on Communications and Networking in China.

[12]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[13]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[14]  Kerstin Vogler,et al.  Table Of Integrals Series And Products , 2016 .

[15]  Oluwatobi Olabiyi,et al.  Unified analysis of energy detection of unknown signals over generalized fading channels , 2011, 2011 7th International Wireless Communications and Mobile Computing Conference.

[16]  Roy D. Yates,et al.  Secrecy capacity of independent parallel channels , 2009 .

[17]  Mandy Eberhart,et al.  Digital Communication Over Fading Channels , 2016 .

[18]  Shlomo Shamai,et al.  Secrecy Capacity Region of Fading Broadcast Channels , 2007, 2007 IEEE International Symposium on Information Theory.

[19]  A. Erdélyi,et al.  Higher Transcendental Functions , 1954 .

[20]  Richard E. Blahut,et al.  Secrecy capacity of SIMO and slow fading channels , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..

[21]  Simon L. Cotton,et al.  Indoor channel characterisation for a wearable antenna array at 868 MHz , 2006, IEEE Wireless Communications and Networking Conference, 2006. WCNC 2006..

[22]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[23]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[24]  M.D. Yacoub,et al.  The κ-μ distribution and the η-μ distribution , 2007, IEEE Antennas and Propagation Magazine.

[25]  Jorge J. Moré,et al.  Computing a Trust Region Step , 1983 .

[26]  W.G. Scanlon,et al.  Characterization and Modeling of the Indoor Radio Channel at 868 MHz for a Mobile Bodyworn Wireless Personal Area Network , 2007, IEEE Antennas and Wireless Propagation Letters.

[27]  Simon L. Cotton,et al.  An experimental investigation into the influence of user state and environment on fading characteristics in wireless body area networks at 2.45 GHz , 2009, IEEE Transactions on Wireless Communications.

[28]  Ender Tekin,et al.  The Gaussian Multiple Access Wire-Tap Channel , 2006, IEEE Transactions on Information Theory.

[29]  Xian Liu,et al.  Probability of strictly positive secrecy capacity of the Weibull fading channel , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).

[30]  Shlomo Shamai,et al.  Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.

[31]  Tharmalingam Ratnarajah,et al.  On the Secrecy Mutual Information of Nakagami-m Fading SIMO Channel , 2010, 2010 IEEE International Conference on Communications.

[32]  Joseph Lipka,et al.  A Table of Integrals , 2010 .

[33]  Guanding Yu,et al.  On the Secrecy Capacity of Fading Wireless Channel with Multiple Eavesdroppers , 2007, 2007 IEEE International Symposium on Information Theory.

[34]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[35]  Mathini Sellathurai,et al.  Secrecy capacity of Nakagami-m fading wireless channels in the presence of multiple eavesdroppers , 2009, 2009 Conference Record of the Forty-Third Asilomar Conference on Signals, Systems and Computers.

[36]  R. Price,et al.  Some non-central F-distributions expressed in closed form , 1964 .

[37]  J. Boutros,et al.  On communication over fading channels , 1996, Proceedings of ICUPC - 5th International Conference on Universal Personal Communications.

[38]  Ueli Maurer,et al.  Secret key agreement by public discussion , 1993 .