Abstract
We investigate physical layer security (PLY) of space–time-block-coded (STBC)–multi-input–multi-output (MIMO) wiretap channel in the presence of imperfect channel state information (ICSI) over Rician fading channel. Secrecy for data transmission to legitimate user in the presence of eavesdropper is metered in terms of average secrecy capacity (ASC), probability of non-zero secrecy rate (PNZSR) and secrecy outage probability (SOP). We derive the closed form expression for security parameter by using the probability distribution function and cumulative distribution function of output signal to noise ratio (SNR). Simulation results are presented to validate our analytical results and demonstrate the impact of ICSI on the secrecy performance of STBC–MIMO system.
Similar content being viewed by others
References
Wyner, A. D. (2010). The wire-tap channel. Bell System Technical Journal,54(8), 1355–1387.
Tekin, E., & Yener, A. (2008). The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming. IEEE Transactions on Information Theory,54(6), 2735–2751.
Leung-Yan-Cheong, S. K., & Hellman, M. E. (1987). The Gaussian wire-tap channel. IEEE Transactions on Information Theory,24(4), 451–456.
Bloch, M., Barros, J., Rodrigues, M., & MaLaughlin, S. (2008). Wireless information-theoretic security. IEEE Transactions on Information Theory,54(6), 2515–2534.
Oggier, F., & Hassibi, B. (2010). The secrecy capacity of the MIMO wiretap channel. IEEE Transactions on Information Theory,57(8), 4961–4972.
Prabhu, V. U., & Rodrigues, M. R. (2011). On wireless channels with M-antenna eavesdroppers: Characterization of the outage probability and outage secrecy capacity. IEEE Transactions on Information Forensics and Security,6(3), 853–860.
Khisti, A., & Wornell, G. W. (2010). Secure transmission with multiple antennasI: The MISOME wiretap channel. IEEE Transactions on Information Theory,56(7), 3088–3104.
Khisti, A., & Wornell, G. W. (2010). Secure transmission with multiple antennas—Part 2: The MIMOME wiretap channel. IEEE Transactions on Information Theory,56(11), 5515–5532.
Liu, T., & Shamai, S. (2009). A note on the secrecy capacity of multiple antenna wiretap channel. IEEE Transactions on Information Theory,55(6), 2547–2533.
Shafiee, S., & Ulukus, S. (2007). Achievable rate in Gaussian MISO channels with secrecy constraints. In Proceedings of IEEE international symposium information theory (ISIT, pp. 2466–2470).
Gerbracht, S., Scheunert, C., & Jorswieck, E. A. (2012). Secrecy outage in MISO systems with partial channel information. IEEE Transactions on Information Forensics and Security,7(2), 704–716.
Sarkar, M. Z., & Ratnarajah, T. (2012). Enhancing security in correlated channel with maximal ratio combining diversity. IEEE Transactions on Signal Processing,60(12), 6745–6751.
Yang, N., Yeoh, P. L., Elkashlan, M., Schober, R., & Collings, I. B. (2012). Secure transmission via transmit antenna selection in MIMO wiretap channels. In IEEE GLOBECOM, Anaheim, CA (pp. 807–812).
Yang, N., Yeoh, P. L., Elkashlan, M., Schober, R., & Collings, I. B. (2012). Transmit antenna selection for security enhancement in MIMO wiretap channels. IEEE Transactions on Communications,61(1), 144–154.
Wang, L., Elkashlan, M., Huang, J., Schober, R., & Mallik, R. K. (2014). Secure transmission with antenna selection in MIMO Nakagami-m fading channels. IEEE Transactions on Wireless Communications,13(11), 6054–6067.
Alves, H., Souza, R. D., Debbah, M., & Bennis, M. (2012). Performance of transmit antenna selection physical layer security schemes. IEEE Signal Processing Letters,19(6), 372–375.
Zhu, J., Zou, Y., Wang, G., Yao, Y. D., & Karagiannidis, G. K. (2016). On secrecy performance of antenna-selection-aided MIMO systems against eavesdropping. IEEE Transactions on Vehicular Technology,65(1), 214–225.
Wang, W., Teh, K. C., Luo, S., & Li, K. H. (2018). Physical layer security in heterogeneous networks with pilot attack: A stochastic geometry approach. IEEE Transactions on Communications,66(12), 6437–6449.
Wang, W., Teh, K. C., & Li, K. H. (2016). Relay selection for secure successive AF relaying networks with untrusted nodes. IEEE Transactions on Information Forensics and Security,11(11), 2466–2476.
Tang, X., Ren, P., & Han, Z. (2018). Hierarchical competition as equilibrium program with equilibrium constraints towards security-enhanced wireless networks. IEEE Journal on Selected Areas in Communications,36(7), 1564–1578.
Subramanian, A., Thangaraj, A., Bloch, M., & McLaughlin, S. W. (2011). Strong secrecy on the binary erasure wiretap channel using large-girth LDPC codes. IEEE Transactions on Information Forensics and Security,6(3), 585–594.
Chen, D., Zhang, N., Cheng, N., Zhang, K., Qin, Z., & Shen, X. S. (2018). Physical layer based message authentication with secure channel codes. IEEE Transactions on Dependable and Secure Computing. https://doi.org/10.1109/TDSC.2018.2846258.
Thangaraj, A., Dihidar, S., Calderbank, A. R., McLaughlin, S. W., & Merolla, J. M. (2007). Applications of LDPC codes to the wiretap channel. IEEE Transactions on Information Theory,53(8), 2933–2945.
Yan, S., Yang, N., Malaney, R., & Yuan, J. (2014). Transmit antenna selection with Alamouti coding and power allocation in MIMO wiretap channels. IEEE Transactions on Wireless Communications,13(3), 1656–1667.
Kumar, R., & Chauhan, S. S. (2017). Secrecy analysis of MRT/RAS system under Nakagami-m fading channels in the presence of imperfect channel state information. International Journal of Electronics and Communications (AEU),85, 68–73.
Shin, H., & Lee, J. H. (2004). Performance analysis of space–time block codes over keyhole Nakagami-m fading channels. IEEE Transactions on Vehicular Technology,53(2), 351–362.
Gradshteyn, I., & Ryzhik, M. (1994). Tables of integrals, series and products. New York: Academic.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Appendices
Appendix 1
Secrecy capacity is described as:
where \(C_{B} = \log \left( {1 + x_{b} } \right)\;{\text{and}}\;C_{E} = \log \left( {1 + x_{e} } \right).\) The ASC can be written as
Let us consider, \(\Delta_{1} = \int_{0}^{\infty } {C_{s} f_{{\gamma_{E} }} \left( {x_{e} } \right)dx_{e} } .\) By putting the value of \(C_{s}\) into this equation we get
By doing integration by parts method, and utilizing algebra on Eq. (16), we get equation as
By putting the value of \(\Delta_{1}\) into Eq. (15), we get final expression for ASC as shown below:
By putting the value of CDF \(F_{{\gamma_{E} }} \left( {x_{e} } \right)\) and CDF \(F_{{\gamma_{B} }} \left( {x_{b} } \right)\) into Eq. (18), and by using [27, 9.211.4], we expressed the ASC as shown below in Eq. (19):
Appendix 2
By putting the value of PDF of output SNR at Bob \(f_{{\gamma_{B} }} \left( x \right)\) and CDF of output SNR at Eve \(F_{{\gamma_{E} }} \left( x \right)\) into Eq. (20) and using results of [27, 3.351.3], the PNZSR can be expressed as shown below:
Appendix 3
By putting the value of PDF of output SNR at Eve \(f_{{\gamma_{e} }} \left( x \right)\) and CDF of output SNR at Bob with some modification \(F_{{\gamma_{B} }} \left( {2^{{R_{S} }} \left( {1 + x} \right) - 1} \right)\) into (22), we get final expression for SOP, which is shown in Eq. (23).
Rights and permissions
About this article
Cite this article
Kumar, R., Chauhan, S.S. Physical layer security for space–time-block-coded MIMO system in Rician fading in the presence of imperfect feedback. Wireless Netw 26, 4239–4247 (2020). https://doi.org/10.1007/s11276-020-02327-x
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11276-020-02327-x