Trương Tiến Vũ, Trần Đức Dũng, Hà Đắc Bình, Võ Nhân Văn


In this paper, we present an approach for wireless security based on physical layer. The basic principle of physical layer secrecy (PHY Secrecy) is ensuring secure information transmission in the the system that consists of illegal receiver without using any coding solution on application layer. Applying this approach, we evaluate the physical layer secrecy performance of MISO (Multi Input-Single Output) system that consists of double antennas transmitter and single antenna receiver in the presence of a single antenna passive eavesdropper’s over heterogeneous fading channels Rayleigh/Rician. We evaluate, analyse secrecy capacity, existence probability of secrecy capacity and secrecy outage probability and verify the numerical results with Monte-Carlo simulation results. Our results have presented the utility of using physical layer secrecy to enhance the secrecy performance of wireless networks.


Existence probability of secrecy capacity; Physical layer secrecy; Secrecy capacity; Secrecy outage probability.


C. E. Shannon, "Communication theory of secrecy systems", Bell system technical journal, vol. 28, pp. 656-715, (1949).

A. Wyner, “The wire-tap channel”, Bell System Technical Journal, vol. 54, no. 8, pp. 1355–1387, (1975).

H. Alves, R. D. Souza, M. Debbah, and M. Bennis, “Performance of transmit antenna selection physical layer security schemes”, IEEE Signal Process. Lett., vol. 19, no. 6, pp. 372–375, (2012).

J. Chen, R. Zhang, L. Song, Z. Han, and B. Jiao, “Joint relay and jammer selection for secure two-way relay networks,” IEEE Trans. Inf. Forensics Security, vol. 7(1), pp. 310–320, (2012).

N. Yang, H. A. Suraweera, I. B. Collings, and C. Yuen, “Physical layer security of TAS/MRC with antenna correlation”, IEEE Transactions on Information Forensics and Security, vol. 8, no. 1, pp. 254 – 259, (2013).

L. Fan, X. Lei, T. Q. Duong, M. Elkashlan, and K. Karagiannidis, “Secure multiuser multiple amplify-and-forward relay networks in presence of multiple eavesdroppers”, in IEEE GLOBECOM, Austin, USA, 8-12 December, (2014).

A. P. Shrestha and K. S. Kwak, “Performance of opportunistic scheduling for physical layer security with transmit antenna selection” EURASIP Journal on Wireless Communications and Networking, vol. 2014:33, pp. 1–9, (2014).

S. Liu, Y. Hong, and E. Viterbo, “Practical secrecy using artificial noise”, IEEE Communications Letter, vol. 17, no. 7, pp. 1483–1486, (2013).

L. Wang, N. Yang, M. Elkashlan, P. L. Yeoh, and J. Yuan, “Physical layer security of maximal ratio combining in two-wave with diffuse power fading channels”, IEEE Transactions on Information Forensics and Security, vol. 9(2), pp. 247–258, (2014).

D.-B. Ha, T. Q. Duong, D.-D. Tran, H.-J. Zepernick, and T. T. Vu, “Physical layer secrecy performance over Rayleigh/Rician fading channels”, in The 2014 International Conference on Advanced Technologies for Communications (ATC’14), Hanoi, Vietnam, Oct. 15- 17, pp. 113–118, (2014)

I. Gradshteyn and I. Ryzhik, Table of Integrals, Series, and Products, D. Zwillinger, Ed. Elsevier Academic Press, (2007).



  • There are currently no refbacks.

Copyright (c) 2016 Trương Tiến Vũ, Trần Đức Dũng, Hà Đắc Bình, Võ Nhân Văn

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Editorial Office of DLU Journal of Science
Room.15, A25 Building, 01 Phu Dong Thien Vuong Street, Dalat, Lamdong
Email: - Phone: (+84) 263 3 555 131

Creative Commons License
Based on Open Journal Systems
Developed by Information Technology Department