Author : Ms R Lavanya 1
Date of Publication :13th April 2017
Abstract: general-order transmit antenna selection to enhance the secrecy performance of multiple-input-multiple-output multieavesdropper channels with outdated channel state information (CSI) at the transmitter. To evaluate the effect of the outdated CSI on the secure transmission of the system, we investigate the secrecy performance for two practical scenarios, i.e., Scenarios I and II, where the eavesdropper's CSI is not available at the transmitter and is available at the transmitter, respectively. For Scenario I, we derive exact and asymptotic closed-form expressions for the secrecy outage probability in Nakagami-m fading channels. In addition, we also derive the probability of nonzero secrecy capacity and the ε-outage secrecy capacity, respectively. Simple asymptotic expressions for the secrecy outage probability reveal that the secrecy diversity order is reduced when the CSI is outdated at the transmitter, and it is independent of the number of antennas at each eavesdropper NE, the fading parameter of the eavesdropper's channel mE, and the number of eavesdroppers M. For Scenario II, we make a comprehensive analysis of the average secrecy capacity obtained by the system. Specifically, new closed-form expressions for the exact and asymptotic average secrecy capacity are derived, which are valid for general systems with an arbitrary number of antennas, number of eavesdroppers, and fading severity parameters. Resorting to these results, we also determine a high signal-to-noise ratio power offset to explicitly quantify the impact of the main channel and the eavesdropper's channel on the average secrecy capacity.
Reference :
-
- J. Mitola, “Cognitive radio: An integrated agent architecture for software defined radio,” Ph. D. dissertation, Royal Inst. Technol. (KTH), Stockholm, Sweden, Dec. 2000.
- J. Lee, H. Wang, J. G. Andrews, and D. Hong, “Outage probability of cognitive relay networks with interference constraints,” IEEE Trans. Wireless Commun., vol. 10, no. 2, pp. 390-395, Feb. 2011.
- Y. Deng, M. Elkashlan, N. Yang, P. L. Yeoh, and R. K. Mallik, “Impact of primary network on secondary network with generalized selection combining,” IEEE Trans. Veh. Technol., vol. 64, no. 7, pp. 3280-3285, Jul. 2015.
- B. Zhong, Z. Zhang, X. Zhang, J. Wang, and K. Long, “Partial relay selection with fixed-gain relays and outdated CSI in underlay cognitive networks”, IEEE Trans. Veh. Technol., vol. 62, no. 9, pp. 4696-4701, Nov. 2013.
- Y. Huang, F. S. Al-Qahtani, C. Zhong, Q. Wu, J. Wang, and H. M. Alnuweiri, “Cognitive MIMO relaying networks with primary user’s interference and outdated channel state information,” IEEE Trans. Commun., vol. 62, no. 12, pp. 4241-4254, Dec. 2014
- H. M. Wang, F. Liu, and M. Yang.“Joint cooperative beamforming, jamming and power allocation to secure AF relay systems”, IEEE Trans. Veh. Technol., vol. 64, no. 10, pp. 4893-4898, Oct. 2015.
- L. J. Rodriguez, N. H. Tran, T. Q. Duong, T. Le-Ngoc, M. Elkashlan, and S. Shetty, “Physical layer security in wireless cooperative relay networks: state of the art and beyond,” IEEE Commun. Mag., vol. 53, no. 12, pp. 32-39, Mar. 2015.
- A. D. Wyner, “The wire-tap channel,” Bell Syst. Tech. J., vol. 54, no. 8, pp.1355-1367, Oct. 1975.
- Y. Zou, B. Champagne, W.-P.Zhu, and L. Hanzo, “Relay-selection improves the security-reliability trade-off in cognitive radio Systems,” IEEE Trans. Commun., vol. 63, no. 1, pp. 215-228, Jan. 2015.