On Secrecy Analysis for D2D Networks over alpha-µ Fading Channels with Randomly Distributed Eavesdroppers

In this paper, we study the behavior of legitimate device-to-device (D2D) transmission links when intercepted by randomly distributed eavesdroppers. To account for both large-scale and small-scale α- μ signal fading at the same time, the k-th best eavesdropper is introduced, which is modelled via a path-loss process with small-scale fading. In order to assess the mathematical representation of the interception behavior, as well as the outage event, the probability of interception Pint and the secrecy outage probability Pout are consequently targeted in the context of this paper. The probability density function (PDF) and the cumulative distribution function (CDF) of the received signal-to-noise ratio (SNR) for the k-th best eavesdropper are first computed. Benefiting from the obtained PDF and CDF, Pint and Pout are thereafter derived and fit into a closed-form expression in terms of the univariate and bivariate Fox's H-functions, respectively. Finally, Monte-Carlo simulation outcomes are provided for the purpose of verifying the precision of our analytical results. Moreover, the effects of the density of eavesdroppers, the fading parameters and the path-loss exponent on the probability of interception are also explored. Interestingly, the conceptual proposal of the k-th best eavesdropper is proved to be comprehensive, and the legitimate D2D link is largely threatened by the 1-st best eavesdropper.

[1]  I. S. Ansari,et al.  Secrecy Capacity Analysis Over $\alpha - \mu $ Fading Channels , 2017, IEEE Communications Letters.

[2]  L. Debnath,et al.  Integral Transforms and Their Applications, Second Edition , 2006 .

[3]  Georges Kaddoum,et al.  Performance analysis of physical layer security over α–μ fading channel , 2016 .

[4]  Martin Haenggi,et al.  Stochastic Geometry for Wireless Networks , 2012 .

[5]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[6]  Kostas Dangakis,et al.  Simple, accurate formula for the average bit error probability of multiple-input multiple-output free-space optical links over negative exponential turbulence channels. , 2012, Optics letters.

[7]  Tharmalingam Ratnarajah,et al.  Secrecy outage in correlated Nakagami-m fading channels , 2014, 2014 IEEE 25th Annual International Symposium on Personal, Indoor, and Mobile Radio Communication (PIMRC).

[8]  Lin Wang,et al.  Secrecy Analysis of a MIMO Full-Duplex Active Eavesdropper with Channel Estimation Errors , 2016, 2016 IEEE 84th Vehicular Technology Conference (VTC-Fall).

[9]  Hyundong Shin,et al.  Multicasting in Stochastic MIMO Networks , 2014, IEEE Transactions on Wireless Communications.

[10]  Satyanarayana Vuppala,et al.  Secrecy-Rate Analysis in Multitier Heterogeneous Networks Under Generalized Fading Model , 2017, IEEE Internet of Things Journal.

[11]  Simon L. Cotton,et al.  Secrecy Capacity Analysis Over κ-μ Fading Channels: Theory and Applications , 2015, IEEE Trans. Commun..

[12]  Arak M. Mathai,et al.  The H-Function with Applications in Statistics and Other Disciplines. , 1981 .

[13]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[14]  Tharmalingam Ratnarajah,et al.  On the security region of best source indices in random wireless networks , 2016, 2016 IEEE International Conference on Communications (ICC).

[15]  Gongpu Wang,et al.  Intercept Behavior Analysis of Industrial Wireless Sensor Networks in the Presence of Eavesdropping Attack , 2015, IEEE Transactions on Industrial Informatics.

[16]  Justin P. Coon,et al.  Secrecy Outage Analysis for Downlink Transmissions in the Presence of Randomly Located Eavesdroppers , 2017, IEEE Transactions on Information Forensics and Security.

[17]  Donald F. Towsley,et al.  Multi-Antenna Transmission With Artificial Noise Against Randomly Distributed Eavesdroppers , 2015, IEEE Transactions on Communications.