On Secrecy Metrics for Physical Layer Security Over Quasi-Static Fading Channels

被引:59
作者
He, Biao [1 ]
Zhou, Xiangyun [2 ]
Swindlehurst, A. Lee [3 ]
机构
[1] Hong Kong Univ Sci & Technol, Dept Elect & Comp Engn, Hong Kong, Hong Kong, Peoples R China
[2] Australian Natl Univ, Res Sch Engn, Canberra, ACT 2601, Australia
[3] Univ Calif Irvine, Dept Elect Engn & Comp Sci, Ctr Pervas Commun & Comp, Irvine, CA 92697 USA
基金
澳大利亚研究理事会;
关键词
Physical layer security; secrecy outage probability; secure transmission design; quasi-static fading channel; WIRETAP CHANNELS; COMMUNICATION; TRANSMISSION; PERFORMANCE; DESIGN;
D O I
10.1109/TWC.2016.2593445
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Theoretical studies on physical layer security often adopt the secrecy outage probability as the performance metric for wireless communications over quasi-static fading channels. The secrecy outage probability has two limitations from a practical point of view: 1) it does not give any insight into the eavesdropper's decodability of confidential messages and 2) it cannot characterize the amount of information leakage to the eavesdropper when an outage occurs. Motivated by the limitations of the secrecy outage probability, we propose three new secrecy metrics for secure transmissions over quasi-static fading channels. The first metric establishes a link between the concept of secrecy outage and the decodability of messages at the eavesdropper. The second metric provides an error-probabilitybased secrecy metric which is typically used for the practical implementation of secure wireless systems. The third metric characterizes how much or how fast the confidential information is leaked to the eavesdropper. We show that the proposed secrecy metrics collectively give a more comprehensive understanding of physical layer security over fading channels and enable one to appropriately design secure communication systems with different views on how secrecy is measured.
引用
收藏
页码:6913 / 6924
页数:12
相关论文
共 33 条
[1]  
[Anonymous], 2011, Physical-layer security:from information theory to security engineering, DOI DOI 10.1017/CBO9780511977985
[2]  
[Anonymous], MODEL SIMUL ENG
[3]  
Baldi M, 2015, IEEE INT CONF COMM, P435, DOI 10.1109/ICCW.2015.7247218
[4]   Secrecy Transmission on Parallel Channels: Theoretical Limits and Performance of Practical Codes [J].
Baldi, Marco ;
Chiaraluce, Franco ;
Laurenti, Nicola ;
Tomasin, Stefano ;
Renna, Francesco .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (11) :1765-1779
[5]   Coding With Scrambling, Concatenation, and HARQ for the AWGN Wire-Tap Channel: A Security Gap Analysis [J].
Baldi, Marco ;
Bianchi, Marco ;
Chiaraluce, Franco .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (03) :883-894
[6]  
Belfiore Jean-Claude, 2010, 2010 International Symposium On Information Theory & Its Applications (ISITA 2010), P174, DOI 10.1109/ISITA.2010.5650095
[7]   An Error Probability Approach to MIMO Wiretap Channels [J].
Belfiore, Jean-Claude ;
Oggier, Frederique .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2013, 61 (08) :3396-3403
[8]   Wireless information-theoretic security [J].
Bloch, Matthieu ;
Barros, Joao ;
Rodrigues, Miguel R. D. ;
McLaughlin, Steven W. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) :2515-2534
[9]  
CSISZAR I, 1978, IEEE T INFORM THEORY, V24, P339, DOI 10.1109/TIT.1978.1055892
[10]   Amplify-and-Forward Compressed Sensing as a Physical-Layer Secrecy Solution in Wireless Sensor Networks [J].
Enric Barcelo-Llado, Joan ;
Morell, Antoni ;
Seco-Granados, Gonzalo .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (05) :839-850