Performance analysis of physical layer security over k-μ shadowed fading channels

被引:24
作者
Sun, Jiangfeng [1 ]
Li, Xingwang [2 ]
Huang, Mengyan [2 ]
Ding, Yuan [3 ]
Jin, Jin [4 ]
Pan, Gaofeng [5 ,6 ]
机构
[1] Henan Polytech Univ, Coll Comp Sci & Technol, Jiaozuo 45400, Peoples R China
[2] Henan Polytech Univ, Sch Phys & Elect Informat Engn, Jiaozuo 45400, Peoples R China
[3] Queens Univ Belfast, Inst Elect Commun & Informat Technol, Belfast, Antrim, North Ireland
[4] Zhengzhou Univ, Sch Informat & Engn, Zhengzhou 450001, Henan, Peoples R China
[5] Southwest Univ, Chongqing Key Lab Nonlinear Circuits & Intelligen, Chongqing, Peoples R China
[6] Univ Lancaster, Sch Comp & Commun, Lancaster, England
基金
中国国家自然科学基金;
关键词
telecommunication security; probability; fading channels; telecommunication network reliability; channel capacity; method of moments; physical layer security; secrecy performance; secure outage probability; high signal-to-noise ratio regime; strictly positive secrecy capacity; k- shadowed fading channels; classic Wyner wiretap model; moment matching method; CAPACITY; RECEIVERS;
D O I
10.1049/iet-com.2017.1268
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this study, the secrecy performance of the classic Wyner's wiretap model over k-mu shadowed fading channels is studied. More specifically, the authors derive two analytical expressions for the lower bound of secure outage probability at high signal-to-noise ratio regime and the probability of strictly positive secrecy capacity over k-mu shadowed fading channels, respectively. As there exist infinite series in the two derived expressions, they further obtain two simple and explicit approximate expressions for the lower bound of secure outage probability and the probability of strictly positive secrecy capacity with the aid of the moment matching method. It is shown that the match between the analytical results and simulations is very excellent for all parameters under considerations.
引用
收藏
页码:970 / 975
页数:6
相关论文
共 25 条
[1]  
ADAMCHIK VS, 1990, ISSAC 90 : PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND ALGEBRAIC COMPUTATION, P212, DOI 10.1145/96877.96930
[2]   Analysis of energy detection with diversity receivers over non-identically distributed. k-μshadowed fading channels [J].
Al-Hmood, H. ;
Al-Raweshidy, H. S. .
ELECTRONICS LETTERS, 2017, 53 (02) :83-84
[3]   Physical layer security of multiple-input-multiple-output systems with transmit beamforming in Rayleigh fading [J].
Ammari, Mohamed Lassaad ;
Fortier, Paul .
IET COMMUNICATIONS, 2015, 9 (08) :1096-1103
[4]   Secrecy capacity of wireless channels [J].
Barros, Joao ;
Rodrigues, Miguel R. D. .
2006 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1-6, PROCEEDINGS, 2006, :356-+
[5]   Wireless information-theoretic security [J].
Bloch, Matthieu ;
Barros, Joao ;
Rodrigues, Miguel R. D. ;
McLaughlin, Steven W. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) :2515-2534
[6]  
CSISZAR I, 1978, IEEE T INFORM THEORY, V24, P339, DOI 10.1109/TIT.1978.1055892
[7]  
Garcia-Corrales C., 2014, INT J ANTENN PROPAG, V2014, P1
[8]  
Jeffrey A., 2007, Table of integrals, series, and products
[9]   Approximate Outage Probability and Capacity for κ-μ Shadowed Fading [J].
Kumar, Suman .
IEEE WIRELESS COMMUNICATIONS LETTERS, 2015, 4 (03) :301-304
[10]   On the capacity of generalized-K fading channels [J].
Laourine, Amine ;
Alouini, Mohamed-Slim ;
Affes, Sofiene ;
Stephenne, Alex .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2008, 7 (07) :2441-2445