Elsevier

Physical Communication

Volume 25, Part 1, December 2017, Pages 201-213
Physical Communication

Full length article
Secure wireless multicasting with linear equalization

https://doi.org/10.1016/j.phycom.2017.07.007Get rights and content

Abstract

A confidential communication scenario is considered in which a base station (BS) transmits a common stream of information to a group of users in the presence of multiple eavesdroppers via multiple relays. Multiple relays are used to provide cooperative spatial multiplexing that significantly increases the spectral efficiency with the help of linear equalization at the users. In order to analyze the performance of proposed model showing the effect of fading and multiplexing gain, we derive the closed-form analytical expressions for the ergodic secrecy multicast capacity and the secure outage probability with and without equalization. Then, we study the effect of fading and shadowing, and the number of users, eavesdroppers and relays on the ergodic secrecy multicast capacity and the secure outage probability assuming channel state information at the receiver. The secure outage performances of the proposed model with zero-forcing (ZF) case are also compared without the case of ZF. In addition, we show the effect of the number of user and eavesdropper antennas and the distances from relays to users and eavesdroppers on the secure outage probability, and a comparison is shown between the composite and Rayleigh fading environments. Finally, the analytical expressions are verified via Monte Carlo simulation.

Introduction

In wireless communication networks, the issues of security and privacy have attracted a lot of interest due to the mobility of users and network components, and wireless channels offer a shared medium favorable to eavesdropping. Moreover, the expansion of wireless networks, inevitably renders security into a challenging quality of service constraint that must be accounted for the design of wireless networks. On the other hand, the effects of fading and shadowing can be exploited significantly to increase the spectral efficiency [1]. The confirmation of reliable communications often require highly reliable connections to all users, which are more difficult to achieve in wireless networks. Multicasting is an appropriate approach to achieve this. Since the traditional multicasting does not provide a secure framework for authentication, integrity and privacy for multicast sessions, so the security is a crucial aspect in multicasting, the lack of which is currently preventing the large-scale deployment of group-oriented applications. In addition, security policies in multicasting provide a secure framework for protecting the secrecy and integrity of the data sent as well as the privacy and authentication of the members of multicast group.

Recently, a cooperative multicast network in the presence of single eavesdropper was studied in [2], where the authors showed that their proposed scheme outperforms the direct multicast in terms of secure outage probability. An artificial-noise alignment scheme for multicasting was proposed in [3], where the noise symbols could mask the information symbols at the eavesdroppers but the legitimate receivers decode the information symbols with high probability. In [4], power minimization and secrecy rate maximization problems were investigated with iterative algorithms. A cooperative multiple-input-multiple-output (MIMO) network with ZF receiver and amplify-and-forward (AF) relaying was proposed in [5], to investigate the symbol error probability. In [6], the symbol error probability was analyzed for a relay network with multiplexing scheme having the base-stations equipped with multiple antennas.

In [7], bit error rate (BER) of the detector was analyzed for multicast wireless network in which a source equipped with single antenna communicates with a destination having single antenna via a multi-antenna decode-and-forward (DF) relay. A two-hop multi-relay decode-and-forward cooperative communication system with single source and single destination was proposed in [8], where selection relaying method was used to mitigate the problem of error propagation due to incorrect decoding of symbols at the relays. In order to exploit the characteristics of scalable video effectively over wireless networks, two cooperative multicast schemes namely, OppCM and CodedCM were proposed in [9], where average outage probabilities of the two schemes were compared to that of direct multicast scheme. The outage probability and ergodic sum rate performance for multiple cooperative relay network was studied in [10] considering Rician fading channel. Two relaying modes referred to as reactive and proactive were used in [11] to investigate the outage probability and error probability for a multiple cooperative relay network.

In [2], [3], [4], although the issues of security of multicast networks were addressed but no works had been done considering the distances of relays from the destination and eavesdropper to locate the strategic position of the relays for achieving better and secure system performance. On the other hand, in [5], [6], [8], [9], [10], [11], authors studied cooperative relay networks but they did not consider the security issues. Moreover, the impact of spatial diversity provided by multiple relays with linear equalization on the secrecy multicast capacity of cooperative networks is not investigated yet. So far to authors’ knowledge, for the first time, this paper addresses the problems of security of multicast networks with cooperative spatial multiplexing in the presence of multiple eavesdroppers, taking the location of source, destinations and eavesdroppers into account. Here, we analyze the security of multicast cellular network with cooperative spatial multiplexing in the presence of multiple eavesdroppers. The impact of spatial multiplexing provided by multiple relays is investigated with and without linear equalization.

At first, we derive the closed-form expressions for the ergodic secrecy multicast capacity with and without ZF equalization using the Gauss–Hermite quadrature integration formula. Secondly, we derive the closed-form expressions for the secure outage probability with and without ZF equalization. For both the cases composite log-normal shadowing and Rayleigh fading channel is considered. Thirdly, we investigate the effect of fading and shadowing on the ergodic secrecy multicast capacity and the secure outage probability. Finally, we investigate the effect of distances of the users and eavesdroppers from the relays on the secure outage probability.

The rest of this paper is structured as follows. Section 2 outlines the system model and formulation of the problem. Sections 3 Ergodic secrecy multicast capacity, 4 Secure outage probability describe the formulation of the analytical expressions for the ergodic secrecy multicast capacity and the secure outage probability for multicasting, respectively. In Section 5, numerical results are presented. Finally, this paper is concluded in Section 6.

Notation : Throughout this paper, scalars are represented by lowercase letters, whereas, vectors and matrices are denoted by bold lower case letters and bold upper case letters, respectively. In represents the n×n identity matrix. A complex Gaussian distribution with mean μ and variance σ2 is denoted by CÑ(μ,σ2). The superscript () stands for the complex conjugate transpose and E[] is the expectation operator. Ei() and Pr() denote the exponential integral function and the probability, respectively.

Section snippets

System model and problem formulation

We consider a confidential multicasting scenario through cellular network as shown in Fig. 1 in which a BS transmits a common stream of information to a group of M users via K relays in the presence of N eavesdroppers. Each relay and BS are equipped with single antenna while each user and eavesdropper are equipped with nU and nE antennas, respectively. We assume that communication occurs only through the relays and there are no direct paths between the relays and the users as well as

Ergodic secrecy multicast capacity

In this section, we derive the exact closed-form expression for the ergodic secrecy multicast capacity over the composite channel in which large-scale and small-scale fading are modeled as log-normal shadowing and Rayleigh fading, respectively. In order to clarify the effect of ZF filtering, at first, we find the expression of ergodic secrecy multicast capacity without ZF filtering, then we consider ZF filtering at the receivers of users and eavesdroppers and extend our formulation.

Secure outage probability

In order to investigate the secure outage performance of the proposed model with and without ZF filtering, we derive the closed-form analytical expressions for the secure outage probability with and without ZF filtering in the following subsections.

Numerical results

In this section, the validity of the analytical expressions described in the previous sections are justified by a set of Monte Carlo simulations. For this purpose, in the simulation environment, at first, we have generated composite (log-normal shadowing and Rayleigh fading) channels Hi and Dj by preparing Matlab code using Matlab function ‘random’. Secondly, 110 000 realizations of the channels have been averaged before using them to calculate the secrecy multicast capacity. Thirdly, the 110 000

Conclusion

The performance of a secure wireless multicasting scenario through cellular network is studied here in the presence of multiple eavesdroppers. In order to create a virtual MIMO antenna array at the relay terminals, a cooperative spatial multiplexing system with ZF-receivers is considered which provides spatial diversity. The formulation of the analytical expressions are performed using the Gauss–Hermite quadrature integration. Based on our observations and from the numerical results, it can be

D.K. Sarker received the B.Sc. degree in Electrical and Electronic Engineering from Dhaka University of Engineering and Technology, Bangladesh in 1995 and the M.Sc. degree in Electrical and Electronic Engineering from Rajshahi University of Engineering and Technology, Bangladesh, in 2005. At present, he is working as Associate Professor in the Department of Electrical and Electronic Engineering, Pabna University of Science and Technology, Bangladesh and Ph.D candidate in the Department of

References (19)

  • T.Q. Duong, H.-J. Zepernick, On the ergodic capacity of cooperative spatial multiplexing systems in composite channels,...
  • WangX. et al.

    Outage analysis of cooperative secrecy multicast transmission

    IEEE Wirel. Commun. Lett.

    (2014)
  • KhistiA. et al.

    Artificial-noise alignment for secure multicast using multiple antennas

    IEEE Commun. Lett.

    (2013)
  • CumananK. et al.

    Secrecy rate optimizations for a MIMO secrecy channel with a multiple-antenna eavesdropper

    IEEE Trans. Veh. Technol.

    (2013)
  • DarsenaD. et al.

    Performance analysis of amplify-and-forward multiple-relay MIMO systems with ZF reception

    IEEE Trans. Veh. Technol.

    (2014)
  • AkhlaqA. et al.

    Performance analysis of relay-multiplexing scheme in cellular systems employing massive multiple-input multiple-output antennas

    IET Commun.

    (2014)
  • AmiriM.M. et al.

    Novel beamforming scheme for multicasting in cooperative wireless networks with a multiple antenna relay

    IEEE Trans. Wireless Commun.

    (2015)
  • MoharrerH. et al.

    Cooperative beamforming for two-hop multi-relay decode-and-forward networks

    IEEE Trans. Commun.

    (2015)
  • WangS.C. et al.

    Cooperative multicasting for wireless scalable video transmissions

    IEEE Trans. Commun.

    (2013)
There are more references available in the full text version of this article.

Cited by (0)

D.K. Sarker received the B.Sc. degree in Electrical and Electronic Engineering from Dhaka University of Engineering and Technology, Bangladesh in 1995 and the M.Sc. degree in Electrical and Electronic Engineering from Rajshahi University of Engineering and Technology, Bangladesh, in 2005. At present, he is working as Associate Professor in the Department of Electrical and Electronic Engineering, Pabna University of Science and Technology, Bangladesh and Ph.D candidate in the Department of Electrical and Electronic Engineering, Rajshahi University of Engineering and Technology. His current research interests centered around the security aspects of cooperative and physical-layer networks and wireless multicasting. He is a life fellow of the IEB, Bangladesh.

M.Z.I. Sarkar received the B.Sc. and M.Sc. degree in Electrical and Electronic Engineering from Rajshahi University of Engineering and Technology, Bangladesh in 1996 and 2000, respectively. He received the Ph.D. degree from the Institute of Electronics, Communications and Information Technology, the School of Electronics, Electrical Engineering and Computer Science, Queen’s University Belfast, United Kingdom in 2012. At present, he is working as Professor in the Department of Electrical and Electronic Engineering, Rajshahi University of Engineering and Technology, Bangladesh. His current research interests centered around the information-theoretic security in the cognitive radio networks, heterogeneous networks and the cooperative networks. He is the member of the IEEE and IEEE communications society.

M.S. Anower received the B.Sc. and M.Sc. degree in Electrical and Electronic Engineering from Rajshahi University of Engineering and Technology, Bangladesh in 2002 and 2007, respectively and the Ph.D degree from the School of Electrical Engineering and Telecommunications, University of New South Wales (UNSW), Sydney, Australia in 2012. At present, he is working as Professor in the Department of Electrical and Electronic Engineering, Rajshahi University of Engineering and Technology, Bangladesh. His current research interests centered around the underwater acoustic signal processing, digital signal processing and wireless communication. He is the member of the IEEE.

View full text