Secrecy outage probability for the multiuser downlink with several curious users

This paper studies the physical layer security in a multi-user downlink, where a single user is selected for secret transmission during each time frame. Current works usually assume a worst case where all unselected users are curious and act as eavesdroppers, and conclude that no multiuser diversity is achievable for secrecy when the number of users is pretty large. However, the worst case may happen rarely in practice. A general scenario is that several (maybe all) of the unselected users act as eavesdroppers. In this case, selecting the user with the largest SNR (i.e., signal to noise ratio) does not necessarily achieve the maximum secrecy rate. For the general case, we derive the new closed-form expression of the secrecy outage probability, which increases with the number of curious users, and tends to converge in the high-SNR and large-user-number regime. When the number of curious users is supposed to be small, the secrecy outage probability could be any value smaller than one even in the large-user-number regime. These results provide additional insights into the system performance.

[1]  Il-Min Kim,et al.  Secure Transmission for Multiuser Relay Networks , 2015, IEEE Transactions on Wireless Communications.

[2]  Toshiaki Koike-Akino,et al.  Secrecy Rate Analysis of Jamming Superposition in Presence of Many Eavesdropping Users , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[3]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[4]  Herbert A. David,et al.  Order Statistics, Third Edition , 2003, Wiley Series in Probability and Statistics.

[5]  Bang Chul Jung,et al.  On the Multi-User Diversity with Secrecy in Uplink Wiretap Networks , 2013, IEEE Communications Letters.

[6]  Kin K. Leung,et al.  Two-way secrecy schemes for the broadcast channel with internal eavesdroppers , 2011, 2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).

[7]  Hyuckjae Lee,et al.  On multiuser secrecy rate in flat fading channel , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.

[8]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[9]  Zhu Han,et al.  On the Resilience of Wireless Multiuser Networks to Passive and Active Eavesdroppers , 2013, IEEE Journal on Selected Areas in Communications.

[10]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[11]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[12]  H. N. Nagaraja,et al.  Order Statistics, Third Edition , 2005, Wiley Series in Probability and Statistics.

[13]  Zhu Han,et al.  On the tradeoffs between network state knowledge and secrecy , 2013, 2013 16th International Symposium on Wireless Personal Multimedia Communications (WPMC).