Skip to main content
Log in

Physical Layer Security with Maximal Ratio Combining over Heterogeneous \(\kappa {-}\mu \) and \(\eta {-}\mu \) Fading Channels

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

This paper investigates physical layer security of maximal ratio combining (MRC) in a heterogeneous fading environment, where the legitimate channel and the wiretap channel are modeled as \(\kappa {-}\mu \) and \(\eta {-}\mu \) fading distributions, respectively. The legitimate receiver adopts MRC to maximize the probability of secure transmission, whereas the eavesdropper adopts MRC to maximize the probability of successful eavesdropping. If the eavesdropper’s channel state information (CSI) is available at the transmitter, the exact and asymptotic expressions of the average secrecy capacity are derived as the security performance metrics. While, if the eavesdropper’s CSI is not available at the transmitter, the exact and asymptotic expressions of the secrecy outage probability are derived as the security performance metrics. In both of the two cases, the impact of the number of antennas as well as the channel fading parameters on the the secrecy performance is further analyzed. Finally, the simulation results are given to verify the validity of the theoretical analysis.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Notes

  1. For the \({\kappa }{-}{{\mu }_{B}}\) distribution, the parameter \(\kappa \) is the ratio of the total power of the dominant components to the total power of the scattered waves, and \(\mu _B\) is the number of multipath clusters.

  2. For the \({\eta }-{{\mu }_{E}}\) distribution, the parameter \({\eta }\) is defined under two formats: In format I, the in-phase and quadrature phase components of the fading signal within each cluster are assumed to be independent of each other and have different average powers. The parameter \(\eta \in \left( 0,\infty \right) \) is the ratio of these powers. In format II, the in-phase and quadrature phase components within each cluster are assumed to be correlated and have identical powers. The parameter \(\eta \in \left( -1,1 \right) \) is the correlation coefficient between these components. In both the formats, the parameter \(\mu _E\) denotes the number of multipath clusters.

  3. For the physical \({\eta }{-}{\mu _E}\) channel, parameter \({\mu _E}\) can also take half-integer values. In the context of this paper, however, only the case of integer \({\mu _E}\) is considered.

  4. In format I, \(h=\left( 2+{{\eta }^{-1}}+\eta \right) /4\) and \(H=\left( {{\eta }^{-1}}-\eta \right) /4\). In format II, \(h=1/\left( 1-{{\eta }^{2}} \right) \) and \(H=\eta /\left( 1-{{\eta }^{2}} \right) \). According to [14], format I can be converted into format II using a simple bilinear transformation. Therefore, without loss of generality, we only consider format I in this paper.

  5. Since \({{\bar{\gamma }}_{E}}\rightarrow \infty \), the probability of successful eavesdropping approaches one. As such, we shall not consider \({{\bar{\gamma }}_{E}}\rightarrow \infty \).

References

  1. Mukherjee, A., Fakoorian, S., Huang, J., & Swindlehurst, A. (2014). Principles of physical layer security in multiuser wireless networks: A survey. IEEE Communications Surveys & Tutorials, 16(3), 1550–1573.

    Article  Google Scholar 

  2. Khisti, A., & Wornell, G. W. (2010). Secure transmission with multiple antennas I: The MISOME wiretap channel. IEEE Transactions on Information Theory, 56(7), 3088–3104.

    Article  MathSciNet  Google Scholar 

  3. Mukherjee, A., & Swindlehurst, A. L. (2011). Robust beamforming for security in MIMO wiretap channels with imperfect CSI. IEEE Transactions on Signal Processing, 59(1), 351–361.

    Article  MathSciNet  Google Scholar 

  4. Dong, L., Han, Z., Petropulu, A. P., & Poor, H. V. (2010). Improving wireless physical layer security via cooperating relays. IEEE Transactions on Signal Processing, 58(3), 1875–1888.

    Article  MathSciNet  Google Scholar 

  5. Zheng, G., Choo, L. C., & Wong, K. K. (2011). Optimal cooperative jamming to enhance physical layer security using relays. IEEE Transactions on Signal Processing, 59(3), 1317–1322.

    Article  MathSciNet  Google Scholar 

  6. Zou, Y., Wang, X., & Shen, W. (2013). Physical-layer security enhancement with multiuser scheduling in cognitive radio. IEEE Transactions on Communications, 61(2), 5103–5113.

    Article  Google Scholar 

  7. He, F., Man, H., & Wang, W. (2011). Maximal ratio diversity combining enhanced security. IEEE Communications Letters, 15(5), 509–511.

    Article  Google Scholar 

  8. Sarkar, M. Z. I., & Ratnarajah, T. (2012). Enhancing security in correlated channel with maximal ratio combining diversity. IEEE Transactions on Signal Processing, 60(12), 6745–6751.

    Article  MathSciNet  Google Scholar 

  9. Prabhu, V. U., & Rodrigues, M. R. (2011). On wireless channels with-antenna eavesdroppers: Characterization of the outage probability and-outage secrecy capacity. IEEE Transactions on Information Forensics and Security, 6(3), 853–860.

    Article  Google Scholar 

  10. Yang, N., Yeoh, P. L., Elkashlan, M., Schober, R., & Collings, I. B. (2013). Transmit antenna selection for security enhancement in MIMO wiretap channels. IEEE Transactions on Communications, 61(1), 144–154.

    Article  Google Scholar 

  11. Wang, L., Yang, N., Elkashlan, M., Yeoh, P., & Yuan, J. (2014). Physical layer security of maximal ratio combining in two-wave with diffuse power fading channels. IEEE Transactions on Information Forensics and Security, 9(2), 247–258.

    Article  Google Scholar 

  12. Shrestha, A. P., & Kwak, K. S. (2014). On maximal ratio diversity with weighting errors for physical layer security. IEEE Communications Letters, 18(4), 580–583.

    Article  Google Scholar 

  13. Simon, M. K., & Alouini, M. S. (2005). Digital communications over fading channels (2nd ed.). New York: Wiley.

    Google Scholar 

  14. Yacoub, M. D. (2007). The \(\kappa {-}\mu \) distribution and the \(\eta {-}\mu \) distribution. IEEE Antennas and Propagation Magazine, 49(1), 68–81.

    Article  Google Scholar 

  15. Gradshteyn, I. S., & Ryzhik, I. M. (2007). Table of integrals, series, and products (7th ed.). Waltham: Academic Press.

    MATH  Google Scholar 

  16. Bloch, M., Barros, J., Rodrigues, M. R., & McLaughlin, S. W. (2008). Wireless information-theoretic security. IEEE Transactions on Information Theory, 54(6), 2515–2534.

    Article  MathSciNet  MATH  Google Scholar 

  17. Peppas, K. P. (2012). Sum of nonidentical squared variates and applications in the performance analysis of diversity receivers. IEEE Transactions on Vehicular Technology, 61(1), 413–419.

    Article  MathSciNet  Google Scholar 

  18. Peppas, K. P., Lazarakis, F., Zervos, T., Alexandridis, A., & Dangakis, K. (2010). Sum of non-identical independent squared \(\eta {-}\mu \) variates and applications in the performance analysis of DS-CDMA systems. IEEE Transactions on Wireless Communications, 9(9), 2718–2723.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yang Gao.

Additional information

This work was supported by the Fundamental Research Funds for the Central Universities Grant No. JB140106, the National Natural Science Foundation of China under Grant 61372067, the National Hightech R&D Program of China (2014AA01A704), and the 111 Project under Grant B08038.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Gao, Y., Ge, J. & Gao, H. Physical Layer Security with Maximal Ratio Combining over Heterogeneous \(\kappa {-}\mu \) and \(\eta {-}\mu \) Fading Channels. Wireless Pers Commun 86, 1387–1400 (2016). https://doi.org/10.1007/s11277-015-2996-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-015-2996-8

Keywords

Navigation