Physical Layer Security with Maximal Ratio Combining over Heterogeneous j (cid:2) l and g (cid:2) l Fading Channels

This paper investigates physical layer security of maximal ratio combining (MRC) in a heterogeneous fading environment, where the legitimate channel and the wiretap channel are modeled as j (cid:2) l and g (cid:2) l fading distributions, respectively. The legitimate receiver adopts MRC to maximize the probability of secure transmission, whereas the eavesdropper adopts MRC to maximize the probability of successful eavesdropping. If the eavesdropper’s channel state information (CSI) is available at the transmitter, the exact and asymptotic expressions of the average secrecy capacity are derived as the security performance metrics. While, if the eavesdropper’s CSI is not available at the transmitter, the exact and asymptotic expressions of the secrecy outage probability are derived as the security performance metrics. In both of the two cases, the impact of the number of antennas as well as the channel fading parameters on the the secrecy performance is further analyzed. Finally, the simulation results are given to verify the validity of the theoretical analysis.

[1]  Lifeng Wang,et al.  Physical Layer Security of Maximal Ratio Combining in Two-Wave With Diffuse Power Fading Channels , 2014, IEEE Transactions on Information Forensics and Security.

[2]  Kyung Sup Kwak,et al.  On maximal ratio diversity with weighting errors for physical layer security , 2013, IEEE Communications Letters.

[3]  Tharmalingam Ratnarajah,et al.  Enhancing Security in Correlated Channel With Maximal Ratio Combining Diversity , 2012, IEEE Transactions on Signal Processing.

[4]  Hong Man,et al.  Maximal Ratio Diversity Combining Enhanced Security , 2011, IEEE Communications Letters.

[5]  Kai-Kit Wong,et al.  Optimal Cooperative Jamming to Enhance Physical Layer Security Using Relays , 2011, IEEE Transactions on Signal Processing.

[6]  Miguel R. D. Rodrigues,et al.  On Wireless Channels with M-Antenna Eavesdroppers: Characterization of the Outage Probability and Outage Secrecy Capacity , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[7]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[8]  A. Lee Swindlehurst,et al.  Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI , 2010, IEEE Transactions on Signal Processing.

[9]  Kostas Peppas,et al.  Sum of Non-Identical Independent Squared η-μ Variates and Applications in the Performance Analysis of DS-CDMA Systems , 2010, IEEE Transactions on Wireless Communications.

[10]  G. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[11]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[12]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[13]  Kerstin Vogler,et al.  Table Of Integrals Series And Products , 2016 .

[14]  Iain B. Collings,et al.  Transmit Antenna Selection for Security Enhancement in MIMO Wiretap Channels , 2013, IEEE Transactions on Communications.

[15]  Kostas Peppas,et al.  Sum of Nonidentical Squared $\kappa {-} \mu$ Variates and Applications in the Performance Analysis of Diversity Receivers , 2012, IEEE Transactions on Vehicular Technology.