DOI QR코드

DOI QR Code

Multiple Eavesdropper-Based Physical Layer Security in SIMO System With Antenna Correlation

  • Sun, Gangcan (School of Information Engineering and Industrial Technology Research Institute, Zhengzhou University) ;
  • Liu, Mengge (School of Information Engineering, Zhengzhou University) ;
  • Han, Zhuo (School of Information Engineering, Zhengzhou University) ;
  • Zhao, Chuanyong (School of Information Engineering, Zhengzhou University)
  • Received : 2018.02.12
  • Accepted : 2019.08.04
  • Published : 2020.01.31

Abstract

In this paper, we investigate the impact of antenna correlation on secure transmission in a multi-eavesdropper single-input multiple-output (SIMO) system, where the receiver and eavesdroppers are equipped with correlated antennas. Based on the practical passive eavesdropping system, the new closed-form expressions of secrecy outage probability (SOP) and non-zero secrecy capacity probability are derived to explore the effect of antenna correlation on the system with multiple eavesdroppers. To further analyze the secrecy performance of the investigated system, we theoretically derive the expression of asymptotic SOP to clearly show the diversity order and array gain. Finally, Monte Carlo simulations verify the effectiveness of our theoretical results.

Keywords

1. Introduction

With the increasing demand for the transmission performance of the communication system, how to ensure the information security has become an urgent aporia. At present, wireless communication has been diffusely used in many fields, since the broadcasting feature of the wireless communication, it is essential to impede eavesdroppers stealing information during the information transmission. In general, the secrecy measures are carried out at the upper layer of the wireless network formerly [1]. However, they are all based on the error-free link at the physical level. In fact, because of the broadcast characteristics of the wireless transmission environment, the transmitting data is easy to be eavesdropped. Therefore, it is challenging to guarantee the transmission information security at the physical layer.

Shannon [2] and Wyner [3] have provided a solid foundation for the basic research on the secrecy transmission theory and model construction in wireless communication. The author in [4] studied the physical layer security based on multicasting scheme with multiple receivers and eavesdroppers both having multiple antennas, and indicated that increasing eavesdroppers and antennas own by each of them would decrease the transmission security. Based on these explorations, [5] probed the secrecy outage probability (SOP) of information transmission in the eavesdropping system especially. The author in [6] indicated that SOP increases with the number of receivers in a wireless multicasting system, where there is a single eavesdropper equipped with a single antenna. In [7], the author stated that secrecy capacity and SOP can be improved by optimizing the transmission power and diversity order in SIMO wiretap channels with maximal ratio combining (MRC) scheme in Rayleigh fading environment. The studies in [4-7] focused on the research of SIMO wiretap system. There are also some work involved MIMO eavesdropping channels. To heighten the physical layer security of wireless networks, [8] proposed a guide to several general techniques. In [9], the secrecy capacity of secure transmission system was investigated under eavesdropping and external interference. To explore the secrecy performance of a multiple-input multiple-output (MIMO) wiretap system with transmitting antenna selection and generalized selection combining (TAS/GSC), the maximum secrecy diversity gain was obtained in [10]. In [11], the MRC scheme and the selection combining (SC) scheme were compared, and the research results demonstrated that the security of the system with Nakagami-m fading channels can be effectively improved by using MRC at receiver and SC at eavesdropper. The authors in [12,13] investigated the impact of the imperfect feedback at the transmitter on the performance of system security with MIMO wiretap channels, and what is different is that the general-order transmit antenna selection technique was adopted in [13] while the optimal TAS technique was applied in [12]. Recently, secure transmission in massive MIMO, a new communication technology in 5G wireless networks, is analyzed in [14,15]. To sum up, the research of secure transmission in wireless system is very important.

In practice, antenna correlation exists in many cases, such as mobile phones and laptops communications. It results from the close space between the different antenna branches in the antenna array [16]. Therefore, the effect of antenna correlation on secure transmission performance of the communication system must be considered. However, only a few works about the analysis of the secrecy performance in physical layer communication system with antenna correlation are reported. Currently, some literatures have studied the secrecy performance of antenna correlation in SIMO system. [17] pointed out that the antenna correlation is gainful to system secrecy performance when the average signal-to-noise ratio (SNR) of receiver is at low level but is harmful to system secrecy performance when the average SNR of receiver is at medium and high level. The author in [18] demonstrated the impact of antenna correlation on secrecy performance increases with the increasing transmission rate when the receiver and the eavesdropper are both equipped with correlated antennas in Rayleigh fading channels. In addition, researchers studied the influence of antenna correlation in MIMO systems. In [19,20], the closed expressions of SOP, non-zero secrecy capacity probability (NZSC) and asymptotic SOP were achieved for MIMO wiretap channels with arbitrary antenna correlation at receiver and eavesdropper. Furthermore, the difference between the above two systems is that Rayleigh fading was utilized in [19] while Nakagami-m fading was applied in [20].

However, the above work only considered the single eavesdropper in the system. In fact, the information between legal parties can be wiretapped by multiple potential eavesdroppers at the same time. Therefore, it is necessary to investigate the impact of antenna correlation on physical layer security in communication system with multiple eavesdroppers. In this paper, the main contributions are summarized as follows:

1) The new closed-form expressions (CFEs) of SOP and NZSC, which apply to arbitrary antenna correlation, are derived in the system with respective antenna correlation at the receiver and multiple eavesdroppers. Meanwhile, diversity order and array gain of the system are also analyzed when the average SNR of the receiver is high.

2) For this scenario, where the average SNR of the main channel is much higher than that of eavesdroppers' channels, a new compact expression of the asymptotic SOP is provided, which consequently gives the system diversity order and array gain.

3) In particular, the uniform antenna correlation model is analyzed, and the simulation results are discussed and summarized in detail.

We arrange the structure of this paper as follows. The considered system model is demonstrated in Section 2. Section 3 presents the proposed new expressions of the SOP and NZSC. And the asymptotic SOP is provided to show the diversity order and array gain. The numerical results are investigated and the simulation results are discussed in Section 4. Finally, Section 5 summarizes the findings of this paper and provides solutions to some problems.

2. System Model

The considered system model is shown in Fig. 1, which comprises a transmitter called Alice, a receiver called Bob and LE eavesdroppers called Eve LE . We assume that the transmitter equips with a single antenna, where the receiver and each eavesdropper equip NB and NE antennas, respectively. The impact of uniform antenna correlation at receiver and each eavesdropper in the SIMO communication system has been investigated in [21], where multiple eavesdroppers are independent. Alice only knows the channel state information (CSI) of the main channel. However, neither Alice nor Bob knows the CSI of the eavesdroppers’ channels, i.e., passive eavesdropping. We assume that the MRC scheme is adopted [17] by receiver and each eavesdropper for the independent and identically distributed (i.i.d.) Rayleigh fading channel [22]. Previous system models either considered the existence of a single eavesdropper [20] or ignored the antenna correlation [5] in multi-antenna systems. To the authors' knowledge, the effect of the correlation between antennas in the multi-eavesdropper SIMO system on the secrecy performance has not been considered. Therefore, the system model makes a good improvement.

E1KOBZ_2020_v14n1_422_f0001.png 이미지

Fig. 1. The model of the system with a transmitter, a receiver and LE eavesdroppers

To maximize the security risks caused by multiple eavesdroppers on the legitimate communication between Alice and Bob, each eavesdropper should be considered independently. When the eavesdropper with the largest SNR cannot decode the transmitted information, the information will be secure and reliable. For convenience, we refer to the eavesdropper with the largest SNR as Eve. Therefore, on the premise of perfect secrecy [23], the achievable secure transmission rate Cs in the model is given as

\(C_{s}=\left\{\begin{array}{cl} C_{B}-C_{E}, & \gamma_{B}>\gamma_{E} \\ 0, & \gamma_{B} \leq \gamma_{E} \end{array}\right.\)       (1)

where γB and \(\gamma_{E}=\max _{1 \leq i \leq L_{F}} \gamma_{E_{i}}\) the instantaneous SNRs of Bob and Eve, respectively. CB = log2(1 + γB) and CE = log2(1 + γE) represent the instantaneous capacity in the main channel (Alice-Bob channel) and eavesdropping channel (Alice-Eve channel), respectively.

According to the feedback CSI from Bob, Alice selects an appropriate coding mode [13] and encodes the transmission information into the code word x = [x(1),···x(q), ···x(Q)] with a given coding rate Rs for secure transmission. The code word is exposed to \(\sum_{q=1}^{Q} E\left[|x(q)|^{2}\right] / Q \leq P\), where P denotes the maximum transmitted signal power. The information can be transmitted securely only when Rs < Cs [23].

At time q , the received signal vector at Bob can be written as

\(\mathbf{y}(q)=\mathbf{\Phi}_{B}^{\frac{1}{2}} \mathbf{h}_{B} x(q)+\mathbf{n}_{B}\)       (2)

Where ΦB denotes NB × NB dimensional antenna correlation matrix of receiver Bob. The b eigenvalues are denoted as λ1, λ2, ···λb, respectively, with multiplicities δ1, δ2, ···δb, where \(\sum_{i=1}^{b} \delta_{i}=N_{B} \cdot \mathbf{h}_{B}=\left[h_{1}, \cdots h_{N_{b}}, \cdots h_{N_{B}}\right]^{T}\) and nB indicate NB × 1 dimensional main channel vector and the additive white Gaussian noise (AWGN) with the mean value zero and the variance \(\alpha_{B}^{2}\), respectively. The output signal at Bob with MRC scheme can be represented as

\(y(q)=\left\|\mathbf{\Phi}_{B}^{\frac{1}{2}} \mathbf{h}_{B}\right\| x(q)+\left(\mathbf{w}_{B}\right)^{\dagger} \mathbf{n}_{B}\)       (3)

where \(\mathbf{w}_{B}=\mathbf{\Phi}_{B}^{\frac{1}{2}} \mathbf{h}_{B} /\left\|\mathbf{\Phi}_{B}^{\frac{1}{2}} \mathbf{h}_{B}\right\|\) denotes the weight vector of each branch, and (⋅) signifies matrix conjugate transpose. Therefore, the instantaneous SNR at Bob is provided as \(\gamma_{B}=\left\|\mathbf{\Phi}_{B}^{\frac{1}{2}} \mathbf{h}_{B}\right\|^{2} P / \alpha_{B}^{2}\).

Similar with Bob, at time q , the received signal vector at Eve can be given as

\(z(q)=\left\|\mathbf{\Phi}_{E}^{\frac{1}{2}} \mathbf{h}_{E}\right\| x(q)+\left(\mathbf{w}_{E}\right)^{\dagger} \mathbf{n}_{E}\)       (4)

Where ΦE denotes NE × NE dimensional antenna correlation matrix at eavesdropper Eve. The a eigenvalues ϕ1, ϕ2, ···ϕa respectively, with multiplicities µ1, µ2, ···µa, where \(\sum_{i=1}^{a} \mu_{i}=N_{E} \cdot \mathbf{h}_{E}=\left[h_{1}, \cdots h_{m}, \cdots h_{N_{E}}\right]^{T}\) and nE indicate NE × 1 dimensional main channel vector and the AWGN with the mean value zero and the variance \(\alpha_{E}^{2}\), respectively. \(\mathbf{w}_{E}=\mathbf{\Phi}_{E}^{\frac{1}{2}} \mathbf{h}_{E} / \| \mathbf{\Phi}_{E}^{\frac{1}{2}} \mathbf{h}_{E}\) is the weight vector of each branch, and (⋅) signifies matrix conjugate transpose. Thus, the instantaneous SNR at Eve is provided by \(\gamma_{E}=\left\|\mathbf{\Phi}_{E}^{\frac{1}{2}} \mathbf{h}_{E}\right\|^{2} P / \alpha_{E}^{2}\).

3. Secrecy Performance

3.1 SNR Distribution

To accurately study how antenna correlation would affect the secure transmission in SIMO communication system with multiple eavesdroppers, three key secrecy performance indicators for this system are derived, i.e., the SOP, NZSC and the asymptotic SOP. The cumulative distribution function (CDF) of γB can be obtained from [24], which is shown as

\(F_{\gamma_{B}}(\gamma)=1-\sum_{i=1}^{b} \sum_{j=1}^{\sigma_{i}} \sum_{k=0}^{j-1} \frac{D_{i, j}}{k !}\left(\frac{\gamma_{B}}{\lambda_{i} \bar{\gamma}_{B}}\right)^{k} e^{-\frac{\gamma_{B}}{\lambda_{i} \gamma_{B}}}\)       (5)

where

\(D_{i, j}=\left.\frac{1}{\left(\sigma_{i}-j\right) !}\left(\frac{1}{\lambda_{i} \bar{\gamma}_{B}}\right)^{\sigma_{i}-j} \frac{d^{\sigma_{i}-j}}{d s_{i}^{\sigma_{i}-j}}\left(\prod_{i^{\prime}=1, i^{\prime} \neq i}^{b}\left(1+s \bar{\gamma}_{B} \lambda_{i^{\prime}}\right)^{-\sigma_{i}}\right)\right|_{s=-\frac{1}{\bar{\gamma}_{B} \lambda_{i}}}\)      (6)

and \(\bar{\gamma}_{B}=P / \alpha_{B}^{2}\).

Since the channels of each eavesdropper obey i.i.d. fading, the probability density function (PDF) of the instantaneous SNR at any eavesdropper can be expressed as [4] [24]

\(f_{\gamma_{E}}(\gamma)=\sum_{n=1}^{a} \sum_{l=1}^{\mu_{n}} \frac{A_{n, l}}{\Gamma(l)}\left(\frac{1}{\varphi_{n} \bar{\gamma}_{E}}\right)^{l} \gamma_{E}^{l-1} e^{\frac{\gamma_{E}}{\varphi_{n} y_{E}}}\)       (7)

where

\(A_{n, l}=\left.\frac{1}{\left(\mu_{n}-l\right) !}\left(\frac{1}{\varphi_{n} \bar{\gamma}_{E}}\right)^{\mu_{n}-1} \frac{d^{\mu_{n}-l}}{d s^{\mu_{n}-l}}\left(\prod_{n^{\prime}=1, n^{\prime} \neq n}^{a}\left(1+s \bar{\gamma}_{E} \varphi_{n^{\prime}}\right)^{-\mu_{n}}\right)\right|_{s=-\frac{1}{\bar{\gamma}_{E} \varphi_{n}}}\)       (8)

and \(\bar{\gamma}_{E}=P / \alpha_{E}^{2}\).

According to [25], the CDF of γE at any eavesdropper is achieved as

\(F_{\gamma_{E}}(\gamma)=1-\sum_{n=1}^{a} \sum_{l=1}^{\mu_{n}} \sum_{k=0}^{l-1} \frac{A_{n, l}}{k !}\left(\frac{\gamma_{E}}{\varphi_{n} \bar{\gamma}_{E}}\right)^{k} e^{-\frac{\gamma_{E}}{\varphi_{n}} \bar{\gamma}_{E}}\)       (9)

Based on [26], the CDF of γE at eavesdropper Eve, the one with the highest instantaneous SNR among all the eavesdroppers, is represented as

\(\hat{F}_{\gamma_{E}}(\gamma)=\left[F_{\gamma_{E}}(\gamma)\right]^{L_{E}}\)       (10)

Then, the PDF of γE at eavesdropper Eve is formulated as

\(\begin{aligned} \hat{f}_{\gamma_{E}}(\gamma) &=L_{E} F_{\gamma_{E}}^{L_{E}-1} f_{\gamma_{E}} \\ &=L_{E}\left[1-\sum_{q=1}^{L_{E}-1}\left(\begin{array}{c} L_{E}-1 \\ q \end{array}\right)(-1)^{q-1} \sum_{n=1}^{a} \sum_{l=1}^{\mu_{n}} \sum_{k=0}^{l-1} \sum_{S_{t} \in \mathbf{S}} \frac{q !}{\prod_{t=1}^{J} s_{t} !}\right.\\ &\left.\times \prod_{1 \leq t \leq J}\left(\frac{A_{n, l}}{k !}\right)^{s_{t}}\left(\frac{\gamma_{E}}{\varphi_{n} \gamma_{E}}\right)^{k_{t}} e^{-\frac{\gamma_{E} s_{t}}{\varphi_{n}} \bar{y}_{E}}\right] \\ & \times \sum_{n=1}^{a} \sum_{l=1}^{\mu_{n}} \frac{A_{n, l}}{\Gamma(l)}\left(\frac{1}{\varphi_{n} \bar{\gamma}_{E}}\right) \gamma_{E}^{l-1} e^{-\frac{\gamma_{E}}{\varphi_{n} \gamma_{E}}} \end{aligned}\)       (11)

where \(J=\sum_{n=1}^{a} \sum_{l=1}^{\mu_{n}} l\) and \(S=\left\{\mathbf{S}_{t} \mid \sum_{t=1}^{J} \mathbf{s}_{t}=q\right\}\).

3.2 Secrecy performance

According to [19] [20], the SOP of the typical wiretap system is defined as

\(\begin{aligned} P_{o u t}\left(R_{S}\right) &=P_{r}\left(C_{S}<R_{S} \mid \gamma_{B}>\gamma_{E}\right)+P_{r}\left(\gamma_{B}<\gamma_{E}\right) \\ &=\int_{0}^{\infty} \int_{\gamma_{E}}^{\left.2^{R_{S}\left(1+Y_{S}\right.}\right)_{-1}} f_{Y_{E}}\left(\gamma_{E}\right) f_{\gamma_{B}}\left(\gamma_{B}\right) d_{\gamma_{B}} d_{\gamma_{E}} \\ &+\int_{0}^{\infty} \int_{0}^{\gamma_{E}} f_{\gamma_{E}}\left(\gamma_{E}\right) f_{\gamma_{B}}\left(\gamma_{B}\right) d_{\gamma_{B}} d_{\gamma_{E}} \\ &=\int_{0}^{\infty} f_{\gamma_{E}}\left(\gamma_{E}\right) F_{\gamma_{B}}\left(2^{R_{s}}\left(1+\gamma_{E}\right)-1\right) d_{\gamma_{E}} \end{aligned}\)       (12)

where Rs > 0. Therefore, the SOP of our system discussed can be rewritten by replacing (12) as

\(P_{\text {out }}\left(R_{s}\right)=\int_{0}^{\infty} \hat{f}_{\gamma_{E}} F_{\gamma_{B}}\left(2^{R_{s}}\left(1+\gamma_{E}\right)-1\right) d \gamma_{E}\)       (13)

Substituting (5) and (11) into (13) and making some basic mathematical operations, the new closed-form expression of the SOP is formulated as (14)

\(\begin{aligned} P_{\text {out }}\left(R_{s}\right) &=L_{E}\left\{1-\sum_{i=1}^{b} \sum_{j=1}^{\sigma_{i}} \sum_{k=0}^{j-1} \frac{D_{i, j}}{k !}\left(\frac{1}{\lambda_{i} \gamma_{B}}\right)^{k} e^{\frac{2^{R_{s}}-1}{\lambda_{i} \bar{\gamma}_{B}}} \sum_{p=0}^{k}\left(\begin{array}{l} k \\ p \end{array}\right)\left(2^{R_{s}}-1\right)^{k-p} 2^{R_{s} p}\right.\\ & \times \sum_{n=1}^{a} \sum_{l=1}^{\mu_{n}} \frac{A_{n, l}}{\Gamma(l)}\left(\frac{1}{\varphi_{n} \bar{\gamma}_{E}}\right) \Gamma(p+l)\left(\frac{2^{R_{s}}}{\lambda_{i} \bar{\gamma}_{B}}+\frac{1}{\varphi_{n} \bar{\gamma}_{E}}\right)^{-(p+1)} \\ &-\sum_{q=1}^{L_{E}-1}\left(\begin{array}{c} L_{E}-1 \\ q \end{array}\right)(-1)^{q-1} \sum_{n=1}^{a} \sum_{l=1}^{\mu_{n}} \sum_{k=0}^{l-1} \sum_{S_{t} \in \mathbf{S}} \frac{q !}{\prod_{t=1}^{J} s_{t} !} \\ & \times \prod_{1 \leq t \leq J}\left(\frac{A_{n, l}}{k !}\right)^{s_{t}}\left(\frac{1}{\varphi_{n} \bar{\gamma}_{E}}\right)^{k_{t}}\left[\sum_{u=1}^{e} \sum_{v=1}^{\varepsilon_{u}} \frac{A_{u, v}}{\Gamma(v)}\left(\frac{1}{\phi_{u} \bar{\gamma}_{E}}\right)^{v}\right.\\ & \times \Gamma\left(k s_{t}+v\right)\left(\frac{s_{t}}{\varphi_{n} \bar{\gamma}_{E}}+\frac{1}{\phi_{u} \bar{\gamma}_{E}}\right)^{-\left(k_{t}+v\right)}-\sum_{u=1}^{e} \sum_{v=1}^{\varepsilon_{u}} \frac{A_{u, v}}{\Gamma(v)}\left(\frac{1}{\phi_{u} \bar{\gamma}_{E}}\right)^{v} \\ & \times \sum_{i=1}^{b} \sum_{j=1}^{\sigma_{i}} \sum_{f=0}^{j-1} \frac{D_{i, j}}{f !}\left(\frac{1}{\lambda_{i} \bar{\gamma}_{B}}\right)^{f} e^{\frac{2^{R_{s}}-1}{\lambda_{i} \bar{\gamma}_{B}}} \sum_{p=0}^{f}\left(\begin{array}{l} f \\ p \end{array}\right)\left(2^{R_{s}}-1\right)^{f-p} 2^{R_{s} p} \\ &\left.\left.\times \Gamma\left(k s_{t}+v+p\right)\left(\frac{s_{t}}{\varphi_{n} \bar{\gamma}_{E}}+\frac{1}{\phi_{u} \bar{\gamma}_{E}}+\frac{2^{R_{s}}}{\lambda_{i} \bar{\gamma}_{B}}\right)^{-\left(k s_{t}+v+p\right)}\right]\right\} \end{aligned}\)       (14)

where e = a, u = n = 1, ··· , a, εu = µn, v = l = 1, ··· , µn, φu = ϕn , and Au,v = An,l. By definition, the closed-form expression of NZSC is obtained by 1-Pout(Rs = 0). For our system, a new closed-form expression of NZSC can be achieved as

\(\begin{aligned} P_{r}\left(C_{s}>0\right)=& 1-P_{o u t}(0)=1-L_{E}\left\{1-\sum_{i=1}^{b} \sum_{j=1}^{\sigma_{i}} \sum_{k=0}^{j-1} \frac{D_{i, j}}{k !}\left(\frac{1}{\lambda_{i} \bar{\gamma}_{B}}\right)^{k}\right.\\ & \times \sum_{n=1}^{a} \sum_{l=1}^{\mu_{n}} \frac{A_{n, l}}{\Gamma(l)}\left(\frac{1}{\varphi_{n} \bar{\gamma}_{E}}\right) \Gamma(k+l)\left(\frac{1}{\lambda_{i} \bar{\gamma}_{B}}+\frac{1}{\varphi_{n} \bar{\gamma}_{E}}\right)^{-(k+l)} \\ &-\sum_{q=1}^{L_{E}-1}\left(\begin{array}{c} L_{E}-1 \\ q \end{array}\right)(-1)^{q-1} \sum_{n=1}^{a} \sum_{l=1}^{\mu_{n}} \sum_{k=0}^{l-1} \sum_{S_{t} \in \mathbf{S}} \frac{q !}{\prod_{t=1}^{J} s_{t} !} \prod_{1 \leq t \leq J}\left(\frac{A_{n, l}}{k !}\right)^{s_{t}}\left(\frac{1}{\varphi_{n} \bar{\gamma}_{E}}\right)^{k s_{t}} \\ & \times\left[\sum_{u=1}^{e} \sum_{v=1}^{\varepsilon_{u}} \frac{A_{u, v}}{\Gamma(v)}\left(\frac{1}{\phi_{u} \bar{\gamma}_{E}}\right)^{v} \Gamma\left(k s_{t}+v\right)\left(\frac{s_{t}}{\varphi_{n} \bar{\gamma}_{E}}+\frac{1}{\phi_{u} \bar{\gamma}_{E}}\right)^{-\left(k s_{t}+v\right)}\right.\\ &-\sum_{u=1}^{e} \sum_{v=1}^{\varepsilon_{u}} \frac{A_{u, v}}{\Gamma(v)}\left(\frac{1}{\phi_{u} \bar{\gamma}_{E}}\right)^{v} \sum_{i=1}^{b} \sum_{j=1}^{\sigma_{i}} \sum_{f=0}^{j-1} \frac{D_{i, j}}{f !}\left(\frac{1}{\lambda_{i} \bar{\gamma}_{B}}\right)^{f} \\ &\left.\left.\times \Gamma\left(k s_{t}+v+f\right)\left(\frac{s_{t}}{\varphi_{n} \bar{\gamma}_{E}}+\frac{1}{\phi_{u} \bar{\gamma}_{E}}+\frac{1}{\lambda_{i} \bar{\gamma}_{B}}\right)^{-\left(k s_{t}+v+f\right)}\right]\right\} \end{aligned}\)       (15)

To practically explore the impact of sufficiently high SNR in the main channel on the system, it is essential to analyze the asymptotic SOP which contributes to inspect the diversity order and array gain. With the aid of [25, Eq. (1.211.1)], the first nonzero order extension of \(F_{\gamma_{B}}(\gamma)\) is formulated as

\(F_{\gamma_{B}}^{\infty}(\gamma)=\left(\sum_{i=1}^{b} \sum_{j=1}^{\sigma_{i}} \sum_{k=0}^{j-1} \frac{(-1)^{N_{B}-k+1} D_{i, j}}{\left(N_{B}-k\right) ! k ! \lambda_{i}^{N_{B}}}\right)\left(\frac{\gamma_{B}}{\bar{\gamma}_{B}}\right)^{N_{B}}+O\left(\bar{\gamma}_{B}^{-N_{B}}\right)\)       (16)

Substituting (11) and (16) into (13), according to combining [25. Eq. (3.326.2)], \(P_{\text {out }}^{\infty}\left(R_{s}\right)\) is derived as

\(P_{\text {out }}^{\infty}\left(R_{s}\right)=\left(G_{a} \bar{\gamma}_{B}\right)^{-G_{d}}+o\left(\bar{\gamma}_{B}^{-C_{d}}\right)\)       (17)

where Gd = NB denotes the diversity order, and Ga as shown in (18) denotes the array gain.

\(\begin{aligned} G_{a} &=\frac{1}{\left(2^{R_{S}}-1\right)}\left[L_{E} \sum_{i=1}^{b} \sum_{j=1}^{\sigma_{i}} \sum_{k=0}^{j-1} \frac{(-1)^{N_{B}-k+1} D_{i, j}}{\left(N_{B}-k\right) ! k ! \lambda_{i}^{N_{B}}} \times \sum_{n=1}^{a} \sum_{l=1}^{\mu_{n}} \frac{A_{n, l}}{\Gamma(l)}\left(\frac{1}{\varphi_{n} \bar{\gamma}_{E}}\right)^{l}\right.\\ & \times \sum_{p=0}^{N_{B}}\left(\begin{array}{c} N_{B} \\ p \end{array}\right)\left(\frac{2^{R_{s}}}{2^{R_{s}}-1}\right)^{p}\left(\Gamma(p+l)\left(\frac{1}{\varphi_{n} \bar{\gamma}_{E}}\right)^{-(p+l)}-\sum_{q=1}^{L_{E}-1}\left(\begin{array}{c} L_{E}-1 \\ q \end{array}\right)(-1)^{q-1}\right.\\ & \times \sum_{u=1}^{a} \sum_{v=1}^{\varepsilon_{u}} \sum_{f=0}^{v-1} \sum_{S_{t} \in \mathbf{S}} \frac{q !}{\prod_{t=1}^{J} S_{t} !} \prod_{! \leq t \leq J}\left(\frac{A_{u, v}}{f !}\right)^{s_{t}}\left(\frac{1}{\phi_{u} \bar{\gamma}_{E}}\right)^{k_{t}} \Gamma\left(f s_{t}+l+p\right) \\ &\left.\left.\times\left(\frac{s_{t}}{\phi_{u} \bar{\gamma}_{E}}+\frac{1}{\varphi_{n} \bar{\gamma}_{E}}\right)^{-\left(f s_{t}+l+p\right)}\right)\right]^{-\frac{1}{N_{B}}} \end{aligned}\)       (18)

Note that our new CFEs of the SOP in (14), NZSC in (15) and the asymptotic SOP in (17) apply to arbitrary number of antennas at receiver and each eavesdropper, arbitrary average SNR, arbitrary numbers of eavesdroppers and arbitrary antenna correlation. After analysis, we find that the correlation coefficient at Bob and Eve as well as the total number of eavesdroppers have no effect on diversity order but affect array gain. What’s more, the larger correlation coefficient or the more number of eavesdroppers lead to the smaller array gain and the higher SOP when average SNR in main channel is sufficiently high.

3.3 Uniform Antenna Correlation

Due to the limited physical size at terminal device, uniform antenna correlation caused by close arrangement exists in many practical environments [27,28]. Resorting to [21], the uniform correlation matrix ΦB = (1 − ρB)E + ρBI at Bob has two real eigenvalues, i.e., λ1 = 1+ ρB(NB - 1) and λ2 = 1 - ρwith multiplicities δ1 = 1 and  δ2 = NB − 1, respectively. As such, the uniform correlation matrix ΦE = (1 - ρE)E + ρEI at Eve has two real eigenvalues, i.e., φ1 = ρE(NE - 1) and φ2 = 1 - ρwith multiplicities µ1 =1 and µ2 = NE - 1 , respectively, where both I and E denote a matrix with its all elements equally to be 1, namely identity matrix. ρB and ρE denote antenna correlation coefficient at Bob and Eve, respectively. Therefore, the expressions in (6) and (8) can be respectively simplified as

\(D_{i, j}=\left.\frac{1}{\left(\sigma_{i}-j\right) !}\left(\frac{1}{\lambda_{i} \bar{\gamma}_{B}}\right)^{\sigma_{i}-j} \frac{d^{\sigma_{i}-j}}{d s^{\sigma_{i}-j}}\left(1+s \bar{\gamma}_{B} \lambda_{i^{i}}\right)^{-\sigma_{i}}\right|_{s=\frac{1}{\gamma_{B} \lambda_{i}}}\)       (19)

and

\(A_{n, l}=\left.\frac{1}{\left(\mu_{n}-l\right) !}\left(\frac{1}{\varphi_{n} \bar{\gamma}_{E}}\right)^{\mu_{n}-1} \frac{d^{\mu_{n}-l}}{d s^{\mu_{n}-l}}\left(1+s \bar{\gamma}_{E} \varphi_{n^{\prime}}\right)^{-\mu_{n}}\right|_{s=-\frac{1}{\gamma_{E} \varphi_{n}}}\)       (20)

Substituting (19) and (20) into (14), (15) and (17), the new CFZs of the SOP, NZSC and the asymptotic SOP with uniform antenna correlation and multiple eavesdroppers can be obtained.

4. Numerical Results and Analysis

In this section, Monte Carlo simulations and numerical results related to our obtained theoretical expressions are demonstrated to verify the impact of antenna correlation and the number of eavesdroppers on the system secrecy performance.

4.1 The impact of NB , LE and ρ on the SOP and the asymptotic SOP

Fig. 2 illustrates the SOP and asymptotic SOP versus \(\bar{\gamma}_{B} \text { under } N_{A}=1, \bar{\gamma}_{E}=0 \mathrm{~dB}\) , NE = 2, and Rs = 1 for different NB , LE and antenna correlation coefficient ρ . The exact numerical results can be obtained from the formula (14) and (17). It is clear that higher NB or lower LE consequently leads to lower SOP. This result is consistent with the conclusion of [13]. Moreover, the phenomenon that more eavesdroppers will lead to greater potential threat is verified. We also observe that the slope of the asymptotic curve increases with increasing NB while it is not affected by LE and ρ , which indicates that the diversity order has no relationship with ρ but is related to NB , and this conclusion corresponds to that in [20]. However, the finding that the diversity order is independent of LE has not been involved in previous literatures. Furthermore, we find that increasing NB can obviously reduce the SOP, which shows that increasing diversity order at receiver can effectively improve the secrecy performance of the system. In addition, the correlation coefficient of the receiver and eavesdroppers can weaken the secrecy performance of the system when \(\bar{\gamma}_{B}\) is in the high region. However, the stronger antenna correlation at receiver leads to a greater risk to the system.

E1KOBZ_2020_v14n1_422_f0002.png 이미지

Fig. 2. The SOP and the asymptotic SOP versus \(\bar{\gamma}_{B}\) for different NB and LE with uniform correlation

4.2 The impact of \(\bar{\gamma}_{E}\), NE and ρ on the SOP and the asymptotic SOP

Fig. 3 presents the impact of different \(\bar{\gamma}_{E}\), NE and antenna correlation coefficient ρ on the secrecy performance when NA = 1, NB = 2, Rs = 1 and LE = 2. We can evidently note that the numerical results are in good agreement with the Monte Carlo simulation. We also observe that the outage probability increases with increasing \(\bar{\gamma}_{E}\) and NE . This conclusion is consistent with [15], i.e., a growing number of NE does not help improve system security in massive MIMO systems for 5G wireless technology. Notably, the asymptotic curves are parallel, which indicates that the diversity order has nothing to do with \(\bar{\gamma}_{E}\), NE and ρ while the array gain is related to each of them. For example, a gain at ρ = 0.4 is about 2.5dB larger than that at ρ = 0.8 for Pout( Rs ) = 10-2 with \(\bar{\gamma}_{E}\) and NE = 4.

E1KOBZ_2020_v14n1_422_f0003.png 이미지

Fig. 3. The SOP and the asymptotic SOP versus \(\bar{\gamma}_{B}\) for different NE and \(\bar{\gamma}_{E}\) with uniform correlation

4.3 The impact of LE and ρ on NZSC

As we can see in Fig. 4, NZSC decreases with increasing LE under the condition of \(\bar{\gamma}_{E}\), NA = 1, NB = NE = 2 and Rs = 0. In addition, we can observe that NZSC decreases with increasing ρ when \(\bar{\gamma}_{B}\) is in a higher SNR region compared with \(\bar{\gamma}_{E}=0 d B\), which indicates that the antenna correlation at receiver and eavesdroppers is harmful to the secrecy performance of the system in such a case. However, NZSC increases with increasing ρ when the SNR of \(\bar{\gamma}_{B}\) is low, which indicates that the antenna correlation at receiver and eavesdroppers is beneficial to the secrecy performance of the system in such a case. This case can be explained as that when \(\bar{\gamma}_{B}\) is smaller, the increase of correlation coefficient reduces the effective dimension of the antenna array, so that Bob's power is more concentrated. At this time, the effective dimension of Eve plays a major role, leading the quality of the main channel increases while that of the eavesdropping channel decreases. When \(\bar{\gamma}_{B}\) is larger, the increase of correlation coefficient reduces the effective dimension of antenna and makes Eve's power more concentrated. At this time, the effective dimension of Bob plays a major role, so the quality of eavesdropping channel increases and that of main channel decreases.

E1KOBZ_2020_v14n1_422_f0004.png 이미지

Fig. 4. NZSC versus \(\bar{\gamma}_{B}\) for different LE and ρ with uniform correlation

5. Conclusion

We evaluated the impact of antenna correlation on the secure transmission performance in the SIMO communication system with multiple eavesdroppers, and the new CFEs of the SOP and NZSC were derived, which can be applied to arbitrary number of antennas at receiver and each eavesdropper, arbitrary average SNR, arbitrary number of eavesdroppers and arbitrary antenna correlation. Based on the high SN in many practical communication scenarios, the new CFE of asymptotic SOP was achieved to show the diversity order and array gain of the investigated system. Moreover, the uniform antenna correlation is analyzed as a special case. The analysis result of the derived theoretical expressions show that more eavesdroppers, more antennas at each eavesdropper, and higher average SNR of the eavesdropping channel will lead to a greater detriment to the secrecy performance. However, mroe antennas at receiver can reduce the defect. In particular, the asymptotic SOP illustrates that the diversity order is NB , which is independent of ρ , LE , NE and \(\bar{\gamma}_{E}\) while all of them affect the array gain. In addition, the larger antenna correlation coefficient at receiver and eavesdropper is more detrimental to the system when \(\bar{\gamma}_{B}\) is at high level and more beneficial to the system when \(\bar{\gamma}_{B}\) is at low level. Therefore, the antenna correlation at the receiver can be adjusted to improve the secrecy performance of the system in the practical passive eavesdropping communication scenario. For example, the antenna correlation at receiver can be increased when \(\bar{\gamma}_{B}\) is small, and the antenna correlation at receiver can be reduced when \(\bar{\gamma}_{B}\) is high.

References

  1. H. V. Poor, "Information and inference in the wireless physical layer," IEEE Wireless Communications, vol. 19, no. 1, pp. 40-47, February 2012. https://doi.org/10.1109/MWC.2012.6155875
  2. C. E. Shannon, "Communication theory of secrecy systems," Bell Syst.Techn. J, vol. 28, no. 4, pp. 656-715, 1949. https://doi.org/10.1002/j.1538-7305.1949.tb00928.x
  3. A. Wyner, "The wire-tap channel," Bell Syst. Tech. J, vol. 54, no. 8, pp.1355-1387, Oct. 1975. https://doi.org/10.1002/j.1538-7305.1975.tb02040.x
  4. A. P. Shrestha, J. Jung and K. S. Kwak, "Secure wireless multicasting in presence of multiple eavesdroppers," in Proc. of 2013 13th International Symposium on Communications and Information Technologies (ISCIT), Surat Thani, pp. 814-817, 2013.
  5. J. Zhu, Y. Chen, Y. Nakamura, X. Jiang, O. Takahashi and N. Shiratori, "Outage performance of secure multicasting in the presence of multiple eavesdroppers," in Proc. of 2015 Eighth International Conference on Mobile Computing and Ubiquitous Networking (ICMU), Hakodate, pp. 138-142, 2015.
  6. M. Z. I. Sarkar and T. Ratnarajah, "Information-theoretic security in wireless multicasting," International Conference on Electrical & Computer Engineering (ICECE 2010), Dhaka, 2010, pp. 53-56.
  7. F. He, H. Man and W. Wang, "Maximal Ratio Diversity Combining Enhanced Security," IEEE Communications Letters, vol. 15, no. 5, pp. 509-511, May 2011. https://doi.org/10.1109/LCOMM.2011.030911.102343
  8. Y. S. Shiu, S. Y. Chang, H. C. Wu, S. C. H. Huang and H. H. Chen, "Physical layer security in wireless networks: a tutorial," IEEE Wireless Communications, vol. 18, no. 2, pp. 66-74, April 2011. https://doi.org/10.1109/MWC.2011.5751298
  9. G. Prema and R. Sowmini, "Secrecy rate evaluation of wireless channel in the presence of eavesdroppers," in Proc. of 2015 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT), Coimbatore, pp. 1-5, 2015.
  10. N. Yang, P. L. Yeoh, M. Elkashlan, R. Schober and J. Yuan, "MIMO Wiretap Channels: Secure Transmission Using Transmit Antenna Selection and Receive Generalized Selection Combining," IEEE Communications Letters, vol. 17, no. 9, pp. 1754-1757, September 2013. https://doi.org/10.1109/LCOMM.2013.071813.131048
  11. N. Yang, P. L. Yeoh, M. Elkashlan, R. Schober and I. B. Collings, "Transmit Antenna Selection for Security Enhancement in MIMO Wiretap Channels," IEEE Transactions on Communications, vol. 61, no. 1, pp. 144-154, January 2013. https://doi.org/10.1109/TCOMM.2012.12.110670
  12. J. Xiong, Y. Tang, D. Ma, P. Xiao and K. K. Wong, "Secrecy Performance Analysis for TAS-MRC System With Imperfect Feedback," IEEE Transactions on Information Forensics and Security, vol. 10, no. 8, pp. 1617-1629, Aug. 2015. https://doi.org/10.1109/TIFS.2015.2421358
  13. Y. Huang, F. S. Al-Qahtani, T. Q. Duong and J. Wang, "Secure Transmission in MIMO Wiretap Channels Using General-Order Transmit Antenna Selection With Outdated CSI," IEEE Transactions on Communications, vol. 63, no. 8, pp. 2959-2971, Aug. 2015. https://doi.org/10.1109/TCOMM.2015.2442248
  14. T. Yang, R. Zhang, X. Cheng and L. Yang, "Secure Massive MIMO Under Imperfect CSI: Performance Analysis and Channel Prediction," IEEE Transactions on Information Forensics and Security, vol. 14, no. 6, pp. 1610-1623, 2019. https://doi.org/10.1109/TIFS.2018.2883150
  15. D. Hu, W. Zhang, L. He and J. Wu, "Secure Transmission in Multi-cell Multi-user Massive MIMO Systems with an Active Eavesdropper," IEEE Wireless Communications Letters, vol. 8, no. 1, pp. 85-88, 2019. https://doi.org/10.1109/LWC.2018.2859329
  16. R. H. Y. Louie, Y. Li, H. A. Suraweera and B. Vucetic, "Performance analysis of beamforming in two hop amplify and forward relay networks with antenna correlation," IEEE Transactions on Wireless Communications, vol. 8, no. 6, pp. 3132-3141, June 2009. https://doi.org/10.1109/TWC.2009.080807
  17. J. Jiao, G. Sun, Z. Han and Z. Wang, "Exact Physical Layer Security in SIMO Wiretap Channels with Antenna Correlation," in Proc. of 2015 11th International Conference on Computational Intelligence and Security (CIS), Shenzhen, pp. 416-419, 2015.
  18. M. Z. I. Sarkar and T. Ratnarajah, "Enhancing Security in Correlated Channel With Maximal Ratio Combining Diversity," IEEE Transactions on Signal Processing, vol. 60, no. 12, pp. 6745-6751, Dec. 2012. https://doi.org/10.1109/TSP.2012.2213080
  19. N. Yang, H. A. Suraweera, I. B. Collings and C. Yuen, "Physical Layer Security of TAS/MRC With Antenna Correlation," IEEE Transactions on Information Forensics and Security, vol. 8, no. 1, pp. 254-259, Jan. 2013. https://doi.org/10.1109/TIFS.2012.2223681
  20. G. Sun, Z. Han, J. Jiao, Z. Wang and D. Wang, "Physical layer security in MIMO wiretap channels with antenna correlation," China Communications, vol. 14, no. 8, pp. 149-156, Aug. 2017. https://doi.org/10.1109/CC.2017.8014375
  21. R. K. Mallik, "The Uniform Correlation Matrix and its Application to Diversity," IEEE Transactions on Wireless Communications, vol. 6, no. 5, pp. 1619-1625, May 2007. https://doi.org/10.1109/TWC.2007.360361
  22. M. K. Simon , M.-S. Alouini, Digital Communication over Fading Channels, 2nd ed, Wiley, New York, 2005.
  23. M. Bloch, J. Barros, M. R. D. Rodrigues and S. W. McLaughlin, "Wireless Information-Theoretic Security," IEEE Transactions on Information Theory, vol. 54, no. 6, pp. 2515-2534, June 2008. https://doi.org/10.1109/TIT.2008.921908
  24. P. Lombardo, G. Fedele and M. M. Rao, "MRC performance for binary signals in Nakagami fading with general branch correlation," IEEE Transactions on Communications, vol. 47, no. 1, pp. 44-52, Jan 1999. https://doi.org/10.1109/26.747812
  25. I. S. Gradshteyn, I. M. Ryzhik, Table of Integrals, Series and Products, 7th ed., Academic, San Diego, CA, USA, 2007.
  26. H. A. David and H. N. Nagaraja, Order Statistics, 3rd ed. Hoboken, John Wiley and Sons, Inc., New Jersey, 2005.
  27. M. S. Alouini, A. Abdi and M. Kaveh, "Sum of gamma variates and performance of wireless communication systems over Nakagami-fading channels," IEEE Transactions on Vehicular Technology, vol. 50, no. 6, pp. 1471-1480, Nov 2001. https://doi.org/10.1109/25.966578
  28. H. Bolcskei, M. Borgmann and A. J. Paulraj, "Impact of the propagation environment on the performance of space-frequency coded MIMO-OFDM," IEEE Journal on Selected Areas in Communications, vol. 21, no. 3, pp. 427-439, Apr 2003. https://doi.org/10.1109/JSAC.2003.809723