Skip to main content
Log in

On Physical Layer Security of Double Shadowed Rician Fading Channels

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

With the proliferation of fifth-generation (5G) mobile communication wireless networks, the investigation into the performance of physical layer secrecy is increasingly becoming the center of attention of recent studies. Physical layer security (PLS) is the pivotal notion of enhancing the secrecy of mobile communication wireless networks against eavesdropping by utilizing the intrinsic randomness of the wireless channel. In this study, we focus on the information-theoretic secrecy perspective in which authorized users convey their information to each other through a quasi-static channel and adversary users are obtaining this secret information through illegitimate wiretap quasi-static channel, where it is assumed that all the channels are represented as double shadowed Rician distributed. In this context, analytical solutions for the expressions of various physical layer secrecy metrics include the strictly positive secrecy capacity (SPSC) and the lower bound on secure outage probability (SOPL) are procured in closed-form. In addition, another physical layer secrecy metric, i.e., average secrecy capacity (ASC) is also investigated and determined in analytical closed-form. The effect of double shadowing on the performance of PLS is investigated. It is found that severer shadowing improves the secrecy performance. Our results also show that the legitimate users can communicate secretly when the legitimate channel link is superior to illegitimate channel link.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Yang, N., Wang, L., Geraci, G., Elkashlan, M., Yuan, J., & Renzo, M. D. (2015). Safeguarding 5G wireless communication networks using physical layer security. IEEE Communications Magazine, 53(4), 20–27.

    Article  Google Scholar 

  2. Kapetanovic, D., Zheng, G., & Rusek, F. (2015). Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks. IEEE Communications Magazine, 53(6), 21–27.

    Article  Google Scholar 

  3. Zou, Y., Zhu, J., Yang, L., Liang, Y. C., & Yao, Y. D. (2015). Securing physical-layer communications for cognitive radio networks. IEEE Communications Magazine, 53(9), 48–54.

    Article  Google Scholar 

  4. Chen, X., Zhong, C., Yuen, C., & Chen, H. (2015). Multi-antenna relay aided wireless physical layer security. IEEE Communications Magazine, 53(12), 40–46.

    Article  Google Scholar 

  5. Ai, Y., Cheffena, M., Ohtsuki, T., & Zhuang, H. (2019). Secrecy performance analysis of wireless sensor networks. IEEE Sensors Letters, 3(5), 1–4.

    Article  Google Scholar 

  6. Bhargav, N., Cotton, S. L., & Simmons, D. E. (2016). Secrecy capacity analysis over κ-µ fading channels: Theory and applications. IEEE Transactions on Communications, 64(7), 3011–3024.

    Article  Google Scholar 

  7. Romero-Jerez, J. M., & Lopez-Martinez, F. J. (2107). A new framework for the performance analysis of wireless communications under Hoyt (Nakagami-q) fading. IEEE Transactions on Information Theory, 63(3), 1693–1702.

  8. Jameel, F., Wyne, S., & Krikidis, I. (2017). Secrecy outage for wireless sensor networks. IEEE Communications Letters, 21(7), 1565–1568.

    Article  Google Scholar 

  9. Lei, H., Ansari, I. S., Pan, G., Alomair, B., & Alouini, M. S. (2017). Secrecy capacity analysis over α−μ fading channels. IEEE Communications Letters, 21(6), 1445–1448.

    Article  Google Scholar 

  10. Gao, Y., Ge, H., & Gao, H. (2016). Physical layer security with maximal ratio combining over heterogeneous κ-µ and η-µ fading channels. Wireless Personal Communications, 86, 1387–1400.

    Article  Google Scholar 

  11. Tuan, V. P., & Kong, H. Y. (2019). Secrecy outage analysis of an untrusted relaying energy harvesting system with multiple eavesdroppers. Wireless Personal Communications, 107, 797–812.

    Article  Google Scholar 

  12. Ibdah, Y., & Ding, Y. (2015). Mobile-to-mobile channel measurements at 1.85 GHz in suburban environments. IEEE Transactions on Communications, 63(2), 466–475.

    Article  Google Scholar 

  13. Hamid, S., Al-Dweik, A.J., Mirahmadi, M., Mubarak, K., & Shami, A. (2105). Inside-out propagation: Developing a unified model for the interference in 5G networks. IEEE Vehicular Technology Magazine, 10(2), 47–54.

  14. Yacoub, M. D. (2016). The α-η-κ-µ fading model. IEEE Transactions on Antennas and Propagation, 64(8), 3597–3610.

    Article  MathSciNet  Google Scholar 

  15. Lei, H., Zhang, H., Ansari, I. S., Gao, C., Guo, Y., Pan, G., & Qaraqe, K. A. (2016). Performance analysis of physical layer security over Generalized-K fading channels using a mixture Gamma distribution. IEEE Communications Letters, 20(2), 408–411.

    Article  Google Scholar 

  16. Kong, L., & Kaddoum, G. (2019). Secrecy characteristics with assistance of mixture gamma distribution. IEEE Wireless Communications Letters, 8(4), 1086–1089.

    Article  Google Scholar 

  17. Alexandropoulos, G. C., & Peppas, K. P. (2018). Secrecy outage analysis over correlated composite Nakagami- m/Gamma fading channels. IEEE Wireless Communications Letters, 22(1), 77–80.

    Article  Google Scholar 

  18. Kong, L., & Kaddoum, G. (2018). On physical layer security over the fisher-snedecor F wiretap fading channels. IEEE Access, 6, 39466–39472.

    Article  Google Scholar 

  19. Ai, Y., Kong, L., & Cheffena, M. (2019). Secrecy outage analysis of double shadowed Rician channels. Electronics Letters, 55(13), 765–767.

    Article  Google Scholar 

  20. Singh, R., & Rawat, M. (2019). Performance analysis of physical layer security over Weibull/lognormal composite fading channel with MRC reception. International Journal of Electronics and Communications, 110, 1–13.

    Google Scholar 

  21. Simmons, N., Silva, C. R. N. D., Cotton, S. L., Sofotasios, P. C., & Yacoub, M. D. (2019). Double shadowing the Rician fading model. IEEE Wireless Communications Letters, 8(2), 344–347.

    Article  Google Scholar 

  22. Singh, R., Rawat, M., & Pradhan, P. M. (2020). Effective capacity of wireless networks over double shadowed Rician fading channels. Wireless Networks, 26(2), 1347–1355.

    Article  Google Scholar 

  23. Wolfram Research, Inc. [Online]. Available: http://functions.wolfram.com/id. Accessed: Nov., 2019.

  24. Prudnikov, A. P., Brychkov, Y. A., & Marichev, O. I. (1990). Integrals, and series: More special functions (Vol. 3). Gordon and Breach Science Publishers.

    MATH  Google Scholar 

  25. Sharma, B. L., & Abiodun, R. F. A. (1974). Generating function for generalized function of two variables. American Mathematical Society, 46(1), 69–72.

    MathSciNet  MATH  Google Scholar 

  26. Gradshteyn, I. S., & Ryzhik, M. (2007). Table of Integrals, Series, and Product. Academic.

    MATH  Google Scholar 

  27. Arezumand, H., Zamiri-Jafarian, H., & Soleimani-Nasab, E. (2017). Outage and diversity analysis of underlay cognitive mixed RF-FSO cooperative systems. Journal of Optical Communications and Networking, 9(10), 909–920.

    Article  Google Scholar 

  28. Bloch, M., Barros, J., Rodrigues, M. R. D., & McLaughlin, S. W. (2008). Wireless information-theoretic security. IEEE Transactions on Information Theory, 54(6), 2515–2534.

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgements

This publication was supported, in part by the “Visvesvaraya Ph.D. Scheme,” Ministry of Electronics and Information Technology, Government of India, under Grant MIT-1100-CSE and in part by Qatar University and IS-Wireless—International Research Collaboration Co-Fund Grant No. IRCC-2021-003. The findings achieved herein are solely the responsibility of the authors.

Funding

This publication was supported, in part by the “Visvesvaraya Ph.D. Scheme,” Ministry of Electronics and Information Technology, Government of India, under Grant MIT-1100-CSE and in part by Qatar University and IS-Wireless—International Research Collaboration Co-Fund Grant no. IRCC-2021–003. The findings achieved herein are solely the responsibility of the authors.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rupender Singh.

Ethics declarations

Conflict of interest

The authors have no relevant financial or non-financial interests to disclose.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Singh, R., Rawat, M. & Yaacoub, E. On Physical Layer Security of Double Shadowed Rician Fading Channels. Wireless Pers Commun 124, 2299–2312 (2022). https://doi.org/10.1007/s11277-022-09465-9

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-022-09465-9

Keywords

Navigation