J. D. V. Sánchez, D. P. M. Osorio, F. J. López-Martínez, M. C. P. Paredes and L. F. Urquiza-Aguiar, "Information-Theoretic Security of MIMO Networks Under $\kappa$-$\mu$ Shadowed Fading Channels," in IEEE Transactions on Vehicular Technology, vol. 70, no. 7, pp. 6302-6318, July 2021, doi: 10.1109/TVT.2021.3086026
Information-theoretic security of MIMO networks under kappa-mu shadowed fading channels
|Author:||Sánchez, José David Vega1; Osorio, D. P. Moya2; López-Martínez, F. Javier3;|
1Departamento de Electrónica, Telecomunicaciones y Redes de Información, Escuela Politécnica Nacional (EPN), Quito, 170525, Ecuador
2Centre for Wireless Communications (CWC), University of Oulu, P.O.Box 8000 FI-90014 Oulu, Finland
3Departamento de Ingeniería de Comunicaciones, Universidad de Málaga - Campus de Excelencia Internacional Andalucía Tech., Málaga 29071, Spain
|Online Access:||PDF Full Text (PDF, 0.4 MB)|
|Persistent link:|| http://urn.fi/urn:nbn:fi-fe2021092146689
Institute of Electrical and Electronics Engineers,
|Publish Date:|| 2021-09-21
This paper investigates the impact of realistic propagation conditions on the achievable secrecy performance of multiple-input multiple-output systems in the presence of an eavesdropper (Eve). Specifically, we concentrate on the κ — μ shadowed fading model because its physical underpinnings capture a wide range of propagation conditions, while, at the same time, it allows for a much better tractability than other state-of-the-art fading models. By considering transmit antenna selection and maximal ratio combining reception at the legitimate (Bob) and Eve’s receiver sides, we study two relevant scenarios: 1) the transmitter knows Bob’s channel state information (CSI) but not Eve’s CSI, and 2) the transmitter is aware of the CSI of both Bob and Eve channels. For this purpose, we first obtain novel and tractable expressions for the statistics of the maximum of independent and identically distributed (i.i.d.) variates related to the legitimate channel. Based on these results, we derive novel closed-form expressions of the two aforementioned scenarios to assess the secrecy performance of the underlying system. Specifically, for cases: 1) the secrecy outage probability (SOP), the probability of strictly positive secrecy capacity (SPSC), and 2) the average secrecy capacity (ASC). Moreover, we develop analytical asymptotic expressions of the SOP and ASC in the high signal-to-noise ratio regime. In all instances, secrecy performance metrics are characterized in closed-form, without requiring the evaluation of Meijer-G or Fox-H functions. Some useful insights on how the different propagation conditions and the number of antennas impact the secrecy performance are also provided.
IEEE transactions on vehicular technology
|Pages:||6302 - 6318|
|Type of Publication:||
A1 Journal article – refereed
|Field of Science:||
213 Electronic, automation and communications engineering, electronics
113 Computer and information sciences
This work was supported in part by the Escuela Politécnica Nacional, for the development of the project PIGR-19-06. José David Vega Sánchez is the recipient of a teaching assistant fellowship from Escuela Politécnica Nacional for doctoral studies in Electrical Engineering. It was also supported in part by the Academy of Finland 6Genesis Flagship under Grant 318927 and FAITH project under Grant 334280. It was also supported by the Spanish Government and the European Fund for Regional Development FEDER (project TEC2017-87913-R) and by Junta de Andalucia (project P18-RT-3175, TETRA5G).
|Academy of Finland Grant Number:||
318927 (Academy of Finland Funding decision)
334280 (Academy of Finland Funding decision)
© 2021 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.