Statistical security model and power adaptation over wireless fading channels

Secrecy capacity is the widely-used metric to evaluate the capability of wireless channels in delivering messages with the assurance of perfect security as well as reliability. However, with the proliferation and diversification of wireless services, there have been urgent needs in fine-grained and decoupled security metrics towards future mobile communications. In this paper, we propose a statistical model to characterize the finegrained security level, while evaluating the secrecy independently from the reliability. Specifically, we model the data eavesdropping process by a queuing system, where the data arrival represents the information overheard by the eavesdropper. The departure process is modeled by a constant leaving rate, implying that the eavesdropped data will become useless after certain time. The eavesdropper has to accumulate sufficient amount of data for successful decipherment. We further define the novel statistical security metric via a queue-length bound and a bound-violation probability threshold. As long as the violation probability is below the specified threshold, the statistical security is guaranteed. This model can fit diverse services well by tuning corresponding parameters for the statistical security metric. Following the statistical security model, we formulate the security-driven power adaptation problem for throughput maximization over fading channels. Applying asymptotic queuing analyses and effective bandwidth theory, we solve the problem and obtain a set of power control schemes under diverse system parameters. Simulation evaluations are also presented to demonstrate the superiority of our scheme over the baseline schemes.

[1]  H. Vincent Poor,et al.  The Wiretap Channel With Feedback: Encryption Over the Channel , 2007, IEEE Transactions on Information Theory.

[2]  Matthew R. McKay,et al.  Rethinking the Secrecy Outage Formulation: A Secure Transmission Design Perspective , 2011, IEEE Communications Letters.

[3]  Cheng-Shang Chang,et al.  Performance guarantees in communication networks , 2000, Eur. Trans. Telecommun..

[4]  Hai Su,et al.  Secret key generation exploiting channel characteristics in wireless communications , 2011, IEEE Wireless Communications.

[5]  Matthieu R. Bloch,et al.  Physical-Layer Security: From Information Theory to Security Engineering , 2011 .

[6]  Matthieu R. Bloch,et al.  Coding for Secrecy: An Overview of Error-Control Coding Techniques for Physical-Layer Security , 2013, IEEE Signal Processing Magazine.

[7]  Li Sun,et al.  Exploiting Fountain Codes for Secure Wireless Delivery , 2014, IEEE Communications Letters.

[8]  Matthieu R. Bloch,et al.  Physical Layer Security , 2020, Encyclopedia of Wireless Networks.

[9]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.

[10]  Andrea J. Goldsmith,et al.  Variable-rate variable-power MQAM for fading channels , 1997, IEEE Trans. Commun..

[11]  Hsiao-Chun Wu,et al.  Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.

[12]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[13]  Katta G. Murty,et al.  Nonlinear Programming Theory and Algorithms , 2007, Technometrics.