Abstract
With the proliferation of fifth-generation (5G) mobile communication wireless networks, the investigation into the performance of physical layer secrecy is increasingly becoming the center of attention of recent studies. Physical layer security (PLS) is the pivotal notion of enhancing the secrecy of mobile communication wireless networks against eavesdropping by utilizing the intrinsic randomness of the wireless channel. In this study, we focus on the information-theoretic secrecy perspective in which authorized users convey their information to each other through a quasi-static channel and adversary users are obtaining this secret information through illegitimate wiretap quasi-static channel, where it is assumed that all the channels are represented as double shadowed Rician distributed. In this context, analytical solutions for the expressions of various physical layer secrecy metrics include the strictly positive secrecy capacity (SPSC) and the lower bound on secure outage probability (SOPL) are procured in closed-form. In addition, another physical layer secrecy metric, i.e., average secrecy capacity (ASC) is also investigated and determined in analytical closed-form. The effect of double shadowing on the performance of PLS is investigated. It is found that severer shadowing improves the secrecy performance. Our results also show that the legitimate users can communicate secretly when the legitimate channel link is superior to illegitimate channel link.
Similar content being viewed by others
References
Yang, N., Wang, L., Geraci, G., Elkashlan, M., Yuan, J., & Renzo, M. D. (2015). Safeguarding 5G wireless communication networks using physical layer security. IEEE Communications Magazine, 53(4), 20–27.
Kapetanovic, D., Zheng, G., & Rusek, F. (2015). Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks. IEEE Communications Magazine, 53(6), 21–27.
Zou, Y., Zhu, J., Yang, L., Liang, Y. C., & Yao, Y. D. (2015). Securing physical-layer communications for cognitive radio networks. IEEE Communications Magazine, 53(9), 48–54.
Chen, X., Zhong, C., Yuen, C., & Chen, H. (2015). Multi-antenna relay aided wireless physical layer security. IEEE Communications Magazine, 53(12), 40–46.
Ai, Y., Cheffena, M., Ohtsuki, T., & Zhuang, H. (2019). Secrecy performance analysis of wireless sensor networks. IEEE Sensors Letters, 3(5), 1–4.
Bhargav, N., Cotton, S. L., & Simmons, D. E. (2016). Secrecy capacity analysis over κ-µ fading channels: Theory and applications. IEEE Transactions on Communications, 64(7), 3011–3024.
Romero-Jerez, J. M., & Lopez-Martinez, F. J. (2107). A new framework for the performance analysis of wireless communications under Hoyt (Nakagami-q) fading. IEEE Transactions on Information Theory, 63(3), 1693–1702.
Jameel, F., Wyne, S., & Krikidis, I. (2017). Secrecy outage for wireless sensor networks. IEEE Communications Letters, 21(7), 1565–1568.
Lei, H., Ansari, I. S., Pan, G., Alomair, B., & Alouini, M. S. (2017). Secrecy capacity analysis over α−μ fading channels. IEEE Communications Letters, 21(6), 1445–1448.
Gao, Y., Ge, H., & Gao, H. (2016). Physical layer security with maximal ratio combining over heterogeneous κ-µ and η-µ fading channels. Wireless Personal Communications, 86, 1387–1400.
Tuan, V. P., & Kong, H. Y. (2019). Secrecy outage analysis of an untrusted relaying energy harvesting system with multiple eavesdroppers. Wireless Personal Communications, 107, 797–812.
Ibdah, Y., & Ding, Y. (2015). Mobile-to-mobile channel measurements at 1.85 GHz in suburban environments. IEEE Transactions on Communications, 63(2), 466–475.
Hamid, S., Al-Dweik, A.J., Mirahmadi, M., Mubarak, K., & Shami, A. (2105). Inside-out propagation: Developing a unified model for the interference in 5G networks. IEEE Vehicular Technology Magazine, 10(2), 47–54.
Yacoub, M. D. (2016). The α-η-κ-µ fading model. IEEE Transactions on Antennas and Propagation, 64(8), 3597–3610.
Lei, H., Zhang, H., Ansari, I. S., Gao, C., Guo, Y., Pan, G., & Qaraqe, K. A. (2016). Performance analysis of physical layer security over Generalized-K fading channels using a mixture Gamma distribution. IEEE Communications Letters, 20(2), 408–411.
Kong, L., & Kaddoum, G. (2019). Secrecy characteristics with assistance of mixture gamma distribution. IEEE Wireless Communications Letters, 8(4), 1086–1089.
Alexandropoulos, G. C., & Peppas, K. P. (2018). Secrecy outage analysis over correlated composite Nakagami- m/Gamma fading channels. IEEE Wireless Communications Letters, 22(1), 77–80.
Kong, L., & Kaddoum, G. (2018). On physical layer security over the fisher-snedecor F wiretap fading channels. IEEE Access, 6, 39466–39472.
Ai, Y., Kong, L., & Cheffena, M. (2019). Secrecy outage analysis of double shadowed Rician channels. Electronics Letters, 55(13), 765–767.
Singh, R., & Rawat, M. (2019). Performance analysis of physical layer security over Weibull/lognormal composite fading channel with MRC reception. International Journal of Electronics and Communications, 110, 1–13.
Simmons, N., Silva, C. R. N. D., Cotton, S. L., Sofotasios, P. C., & Yacoub, M. D. (2019). Double shadowing the Rician fading model. IEEE Wireless Communications Letters, 8(2), 344–347.
Singh, R., Rawat, M., & Pradhan, P. M. (2020). Effective capacity of wireless networks over double shadowed Rician fading channels. Wireless Networks, 26(2), 1347–1355.
Wolfram Research, Inc. [Online]. Available: http://functions.wolfram.com/id. Accessed: Nov., 2019.
Prudnikov, A. P., Brychkov, Y. A., & Marichev, O. I. (1990). Integrals, and series: More special functions (Vol. 3). Gordon and Breach Science Publishers.
Sharma, B. L., & Abiodun, R. F. A. (1974). Generating function for generalized function of two variables. American Mathematical Society, 46(1), 69–72.
Gradshteyn, I. S., & Ryzhik, M. (2007). Table of Integrals, Series, and Product. Academic.
Arezumand, H., Zamiri-Jafarian, H., & Soleimani-Nasab, E. (2017). Outage and diversity analysis of underlay cognitive mixed RF-FSO cooperative systems. Journal of Optical Communications and Networking, 9(10), 909–920.
Bloch, M., Barros, J., Rodrigues, M. R. D., & McLaughlin, S. W. (2008). Wireless information-theoretic security. IEEE Transactions on Information Theory, 54(6), 2515–2534.
Acknowledgements
This publication was supported, in part by the “Visvesvaraya Ph.D. Scheme,” Ministry of Electronics and Information Technology, Government of India, under Grant MIT-1100-CSE and in part by Qatar University and IS-Wireless—International Research Collaboration Co-Fund Grant No. IRCC-2021-003. The findings achieved herein are solely the responsibility of the authors.
Funding
This publication was supported, in part by the “Visvesvaraya Ph.D. Scheme,” Ministry of Electronics and Information Technology, Government of India, under Grant MIT-1100-CSE and in part by Qatar University and IS-Wireless—International Research Collaboration Co-Fund Grant no. IRCC-2021–003. The findings achieved herein are solely the responsibility of the authors.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors have no relevant financial or non-financial interests to disclose.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Singh, R., Rawat, M. & Yaacoub, E. On Physical Layer Security of Double Shadowed Rician Fading Channels. Wireless Pers Commun 124, 2299–2312 (2022). https://doi.org/10.1007/s11277-022-09465-9
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-022-09465-9