PHY Security in MIMOME Keyhole Channels

Physical layer security (PLS) is investigated in a multiple-input multiple-output multiple-antenna eavesdropper keyhole channel over Rayleigh fading. Specifically, the secrecy performance is evaluated by two secrecy performance metrics including the secrecy outage probability (SOP) and average secrecy rate (ASR). By assuming that the transmitter has full channel state information of the main channel, the SOP and ASR are analyzed. To glean further insights, asymptotic analyses are performed to the SOP and ASR by considering an infinite amount of transmit power. It is found that the asymptotic SOP and ASR converge to some constant and the corresponding rate of convergence is determined by the diversity order and array gain.

[1]  Guanghua Yang,et al.  Performance Analysis of MIMO-HARQ Assisted V2V Communications With Keyhole Effect , 2022, IEEE Transactions on Communications.

[2]  Deemah H. Tashman,et al.  Cascaded κ-μ Fading Channels with Colluding and Non-Colluding Eavesdroppers: Physical-Layer Security Analysis , 2021, Future Internet.

[3]  Deemah H. Tashman,et al.  Cascaded κ-µ Fading Channels with Colluding Eavesdroppers: Physical-Layer Security Analysis , 2021, 2020 International Conference on Communications, Signal Processing, and their Applications (ICCSPA).

[4]  Deemah H. Tashman,et al.  Physical-Layer Security for Cognitive Radio Networks over Cascaded Rayleigh Fading Channels , 2020, GLOBECOM 2020 - 2020 IEEE Global Communications Conference.

[5]  Aashish Mathur,et al.  On Physical Layer Security of Double Rayleigh Fading Channels for Vehicular Communications , 2018, IEEE Wireless Communications Letters.

[6]  Mehdi Seyfi,et al.  On the Performance of Reduced-Complexity Transmit/Receive-Diversity Systems Over MIMO-V2V Channel Model , 2017, IEEE Wireless Communications Letters.

[7]  Lutz Lampe,et al.  Physical layer security in MIMO power line communication networks , 2014, 18th IEEE International Symposium on Power Line Communications and Its Applications.

[8]  Jyoteesh Malhotra,et al.  Cascade Fading Channel Models for Wireless Communication- A Survey , 2014 .

[9]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[10]  Nelson Costa,et al.  Multiple-input-multiple-output measurements and modeling in Manhattan , 2003, IEEE J. Sel. Areas Commun..

[11]  W. Szpankowski Average Case Analysis of Algorithms on Sequences , 2001 .

[12]  Lawrence H. Ozarow,et al.  Wire-tap channel II , 1984, AT&T Bell Laboratories Technical Journal.

[13]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[14]  Julian Cheng,et al.  On the Ergodic Mutual Information of Keyhole MIMO Channels with Finite Inputs , 2021, ArXiv.

[15]  Kerstin Vogler,et al.  Table Of Integrals Series And Products , 2016 .

[16]  A. Stankiewicz Tables of the Integro-Exponential Functions , 1968 .