Physical Layer Security for MIMO Wireless System Using MRC over Rayleigh Fading Channels

被引:0
作者
Bamel I. [1 ]
Devi P. [1 ]
Bharti M.R. [1 ]
机构
[1] Department of Electronics and Communication Engineering, National Institute of Technology, Hamirpur
关键词
Diversity order; Maximal ratio combining; Multiple input multiple output; Physical layer security; Rayleigh fading; Secrecy capacity; Secrecy outage probability; Space-time coding;
D O I
10.1007/s42979-023-01961-4
中图分类号
学科分类号
摘要
Exponentially increasing users are expected to be supported by the fifth-generation (5G) network. 5G technology is designed to meet the growing demands of an increasing number of connected devices and applications by providing higher data rates, lower latency, and better network capacity. However, due to the open nature of wireless communication, information security and privacy have emerged as critical concerns in wireless communication. To address these concerns, 5G networks make use of physical layer security techniques to protect the confidentiality of wireless communication. In this paper, we investigate the secrecy capacity and secrecy outage probability of a multiple input multiple output (MIMO) system in a Rayleigh environment. To enhance the system’s security, we employ a cooperative jammer. We also define the diversity order for the wiretap and main channels and investigate its effects on the secrecy capacity as well as secrecy outage probability. Furthermore, we improve the system’s security using the maximal ratio combining (MRC) scheme, even under low signal-to-noise ratio (SNR). Space-time transition (STT) is used as an antenna selection scheme. Our numerical expressions and simulation results demonstrate that using cooperative jammers and the MRC scheme can enhance the secrecy of the system, even when the main channel experiences low SNR. © 2023, The Author(s), under exclusive licence to Springer Nature Singapore Pte Ltd.
引用
收藏
相关论文
共 20 条
[1]  
Liang Y., Poor H., Shamai S., Secure communication over fading channels, IEEE Trans Inf Theory, 54, 6, pp. 2470-2492, (2008)
[2]  
Maurer U.M., Secret key agreement by public discussion from common information, IEEE Trans Inf Theory, 39, 3, pp. 733-742, (1993)
[3]  
Hero A.O., Secure space-time communication, IEEE Trans Inform Theory, 49, 12, pp. 3235-3249, (2003)
[4]  
Thangaraj A., Dihidar S., Calderbank A.R., McLaughlin S.W., Merolla J.M., Capacity achieving codes for the wire tap channel with applications to quantum key distribution, CoRR, (2004)
[5]  
Bloch M., Thangaraj A., McLaughlin S.W., Merolla J.-M., LDPC-based Gaussian key reconciliation, In Proc. of the IEEE International Workshop on Information Theory, Punta Del Este, Uruguay, (2006)
[6]  
Sun L., Du Q., Physical layer security with its applications in 5G networks: a review, Chin Commun, 14, 12, pp. 1-14, (2017)
[7]  
Mucchi L., Nizzi F., Pecorella T., Fantacci R., Esposito F., Benefits of Physical Layer Security to Cryptography: Tradeoff and Applications, 2019 IEEE International Black Sea Conference on Communications and Networking (Blackseacom), Sochi, Russia, pp. 1-3, (2019)
[8]  
Shannon C.E., Communication theory of secrecy systems, Bell Syst Techn J, 28, pp. 656-715, (1949)
[9]  
Wyner A.D., The wire-tap channel, Bell Syst Techn J, 54, 8, pp. 1355-1387, (1975)
[10]  
Leung-Yan-Cheong S., Hellman M., The Gaussian wire-tap channel, IEEE Trans Inf Theory, 24, 4, pp. 451-456, (1978)