Physical-layer security over generalised-K fading channels

In this study, the secrecy performance of the classic Wyner's wiretap model over generalised-K fading channels is studied. The closed-form expressions for the average secrecy capacity, the lower bound of secure outage probability, and the probability of strictly positive secrecy capacity are derived. The new expressions provide a unified form, which can handle several of the well-known composite fading environments as special or limiting cases. Moreover, all the derived expressions are given in terms of Meijer's G-function, which can be simply realised in MATLAB and MATHEMATICA. Monte-Carlo simulations are performed to verify the proposed analysis models.

[1]  Chao Gao,et al.  On Physical Layer Security Over Generalized Gamma Fading Channels , 2015, IEEE Communications Letters.

[2]  Caijun Zhong,et al.  Multi-antenna relay aided wireless physical layer security , 2015, IEEE Communications Magazine.

[3]  I. S. Gradshteyn,et al.  Table of Integrals, Series, and Products , 1976 .

[4]  Jia Zhu,et al.  Secrecy outage analysis of multi-user multi-eavesdropper cellular networks in the face of cochannel interference , 2015 .

[5]  Goran T. Djordjevic,et al.  Analytical Model for Outage Probability of Interference-Limited Systems over Extended Generalized-K Fading Channels , 2012, IEEE Communications Letters.

[6]  Xian Liu,et al.  Probability of strictly positive secrecy capacity of the Weibull fading channel , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).

[7]  P. Mohana Shankar,et al.  Error Rates in Generalized Shadowed Fading Channels , 2004, Wirel. Pers. Commun..

[8]  George K. Karagiannidis,et al.  On the performance analysis of digital communications over generalized-K fading channels , 2006, IEEE Communications Letters.

[9]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[10]  Victor C. M. Leung,et al.  Improving physical-layer security in wireless communications using diversity techniques , 2014, IEEE Network.

[11]  Nicola Laurenti,et al.  Physical Layer Authentication over MIMO Fading Wiretap Channels , 2012, IEEE Transactions on Wireless Communications.

[12]  Zhu Han,et al.  Physical layer security in wireless networks with passive and active eavesdroppers , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[13]  Valentine A. Aalo,et al.  Channel capacity and average error rates in generalised-K fading channels , 2010, IET Commun..

[14]  Jing Huang,et al.  Secure Transmission With Antenna Selection in MIMO Nakagami- $m$ Fading Channels , 2014, IEEE Transactions on Wireless Communications.

[15]  Ali Abdi,et al.  Comparison of DPSK and MSK bit error rates for K and Rayleigh-lognormal fading distributions , 2000, IEEE Communications Letters.

[16]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[17]  Jaehoon Jung,et al.  Capacity and Error Probability Analysis of Diversity Reception Schemes Over Generalized- $K$ Fading Channels Using a Mixture Gamma Distribution , 2014, IEEE Transactions on Wireless Communications.

[18]  Wei-Ping Zhu,et al.  Relay-Selection Improves the Security-Reliability Trade-Off in Cognitive Radio Systems , 2014, IEEE Transactions on Communications.

[19]  Manilal Shah On generalizations of some results and their applications. , 1973 .

[20]  Liu Liu,et al.  Average channel capacity of composite κ-μ/gamma fading channels , 2013, China Communications.

[21]  Mohamed-Slim Alouini,et al.  Error Rates of M-PAM and M-QAM in Generalized Fading and Generalized Gaussian Noise Environments , 2013, IEEE Communications Letters.

[22]  Xian Liu,et al.  Probability of Strictly Positive Secrecy Capacity of the Rician-Rician Fading Channel , 2013, IEEE Wireless Communications Letters.

[23]  Saad Al-Ahmadi,et al.  Asymptotic capacity of opportunistic scheduling over gamma-gamma (generalized-K) composite fading channels , 2012, IET Commun..

[24]  Liuqing Yang,et al.  Securing physical-layer communications for cognitive radio networks , 2015, IEEE Communications Magazine.

[25]  Xianbin Wang,et al.  Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.

[26]  Ali Abdi,et al.  K distribution: an appropriate substitute for Rayleigh-lognormal distribution in fading-shadowing wireless channels , 1998 .

[27]  Lie-Liang Yang,et al.  Performance Analysis of Multihop Wireless Links Over Generalized- $K$ Fading Channels , 2012, IEEE Transactions on Vehicular Technology.

[28]  Kostas Peppas,et al.  A New Formula for the Average Bit Error Probability of Dual-Hop Amplify-and-Forward Relaying Systems over Generalized Shadowed Fading Channels , 2012, IEEE Wireless Communications Letters.

[29]  Mohamed-Slim Alouini,et al.  A New Formula for the BER of Binary Modulations with Dual-Branch Selection over Generalized-K Composite Fading Channels , 2010, IEEE Transactions on Communications.

[30]  Yunfei Chen,et al.  Physical-Layer Security Over Non-Small-Scale Fading Channels , 2016, IEEE Transactions on Vehicular Technology.

[31]  Victor Adamchik,et al.  The algorithm for calculating integrals of hypergeometric type functions and its realization in REDUCE system , 1990, ISSAC '90.

[32]  Fredrik Rusek,et al.  Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks , 2015, IEEE Communications Magazine.

[33]  Xian Liu Strictly positive secrecy capacity of log-normal fading channel with multiple eavesdroppers , 2014, 2014 IEEE International Conference on Communications (ICC).

[34]  K. Sharma Integrals involving products of G -function and Gauss's hypergeometric function , 1964 .

[35]  Lifeng Wang,et al.  Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.