Physical Layer Security With Threshold-Based Multiuser Scheduling in Multi-Antenna Wireless Networks

被引:54
作者
Yang, Maoqiang [1 ]
Guo, Daoxing [1 ]
Huang, Yuzhen [1 ,2 ]
Duong, Trung Q. [3 ]
Zhang, Bangning [1 ]
机构
[1] PLA Univ Sci & Technol, Coll Commun Engn, Nanjing 210007, Jiangsu, Peoples R China
[2] Beijing Univ Posts & Telecommun, Sch Informat & Commun, Beijing 100876, Peoples R China
[3] Queens Univ Belfast, Sch Elect Elect Engn & Comp Sci, Belfast BT7 1NN, Antrim, North Ireland
基金
美国国家科学基金会;
关键词
Physical layer security; multiuser switched diversity; threshold-based scheduling scheme; secrecy outage probability; ergodic secrecy rate; SWITCHED DIVERSITY; PERFORMANCE ANALYSIS; SELECTION; TRANSMISSION; SYSTEMS; ENHANCEMENT; CHANNELS; SCHEME;
D O I
10.1109/TCOMM.2016.2606396
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we consider a multiuser downlink wiretap network consisting of one base station (BS) equipped with AA antennas, NB single-antenna legitimate users, and NE single-antenna eavesdroppers over Nakagami-m fading channels. In particular, we introduce a joint secure transmission scheme that adopts transmit antenna selection at the BS and explores threshold-based selection diversity scheduling over legitimate users to achieve a good secrecy performance while maintaining low implementation complexity. More specifically, in an effort to quantify the secrecy performance of the considered system, two practical scenarios are investigated, i.e.: in Scenario I, the eavesdropper's channel state information (CSI) is unavailable at the BS, and in Scenario II, the eavesdropper's CSI is available at the BS. For Scenario I, novel exact closed-form expressions for the secrecy outage probability are derived, which are valid for general networks with an arbitrary number of legitimate users, antenna configurations, number of eavesdroppers, and the switched threshold. For Scenario II, we take into account the ergodic secrecy rate as the principle performance metric, and derive novel exact closed-form expressions for the ergodic secrecy rate. In addition, we also provide simple and asymptotic expressions for secrecy outage probability and ergodic secrecy rate under two distinct cases, i.e.: in Case I, the legitimate user is located close to the BS, and in Case II, both the legitimate user and eavesdropper are located close to the BS. Our important findings reveal that the secrecy diversity order is AAmA and the slope of secrecy rate is one under Case I, while the secrecy diversity order and the slope of secrecy rate collapse to zero under Case II, where the secrecy performance floor occurs. Finally, when the switched threshold is carefully selected, the considered scheduling scheme outperforms other well-known existing schemes in terms of the secrecy performance and complexity tradeoff.
引用
收藏
页码:5189 / 5202
页数:14
相关论文
共 42 条
[1]  
Abramowitz M., 1972, Handbook of Mathematical Functions with Formulas, Graphs and Mathematical Tables
[2]   Multiuser diversity with quantized feedback [J].
Al-Harthi, Yahya S. ;
Tewfik, Ahmed H. ;
Alouini, Mohamed-Slim .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2007, 6 (01) :330-337
[3]   An Improved Threshold-Based Channel Selection Scheme for Wireless Communication Systems [J].
Bithas, Petros S. ;
Rontogiannis, Athanasios A. ;
Karagiannidis, George K. .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (02) :1531-1546
[4]   Wireless information-theoretic security [J].
Bloch, Matthieu ;
Barros, Joao ;
Rodrigues, Miguel R. D. ;
McLaughlin, Steven W. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) :2515-2534
[5]   Power Adaptation for Joint Switched Diversity and Adaptive Modulation Schemes in Spectrum Sharing Systems [J].
Bouida, Zied ;
Tourki, Kamel ;
Ghrayeb, Ali ;
Qaraqe, Khalid ;
Alouini, Mohamed-Slim .
IEEE COMMUNICATIONS LETTERS, 2012, 16 (09) :1482-1485
[6]   Improving Wireless Physical Layer Security via Cooperating Relays [J].
Dong, Lun ;
Han, Zhu ;
Petropulu, Athina P. ;
Poor, H. Vincent .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2010, 58 (03) :1875-1888
[7]   Exploiting Direct Links for Physical Layer Security in Multiuser Multirelay Networks [J].
Fan, Lisheng ;
Yang, Nan ;
Duong, Trung Q. ;
Elkashlan, Maged ;
Karagiannidis, George K. .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (06) :3856-3867
[8]  
Ge X, 2015, IEEE WCNC, P1422, DOI 10.1109/WCNC.2015.7127677
[9]  
Gradshteyn IS., 2007, TABLE INTEGRALS SERI
[10]  
Holter B, 2004, VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7, P2038