PHYSICAL LAYER SECRECY ON WIRELESS NETWORK

Authors

  • Trương Tiến Vũ Faculty of Information Technology, Duytan University, Viet Nam
  • Trần Đức Dũng Faculty of Information Technology, Duytan University, Viet Nam
  • Hà Đắc Bình Faculty of Information Technology, Duytan University, Viet Nam
  • Võ Nhân Văn Faculty of Information Technology, Duytan University, Viet Nam

DOI:

https://doi.org/10.37569/DalatUniversity.6.2.37(2016)

Keywords:

Existence probability of secrecy capacity, Physical layer secrecy, Secrecy capacity, Secrecy outage probability.

Abstract

In this paper, we present an approach for wireless security based on physical layer. The basic principle of physical layer secrecy (PHY Secrecy) is ensuring secure information transmission in the the system that consists of illegal receiver without using any coding solution on application layer. Applying this approach, we evaluate the physical layer secrecy performance of MISO (Multi Input-Single Output) system that consists of double antennas transmitter and single antenna receiver in the presence of a single antenna passive eavesdropper’s over heterogeneous fading channels Rayleigh/Rician. We evaluate, analyse secrecy capacity, existence probability of secrecy capacity and secrecy outage probability and verify the numerical results with Monte-Carlo simulation results. Our results have presented the utility of using physical layer secrecy to enhance the secrecy performance of wireless networks.

Downloads

Download data is not yet available.

References

C. E. Shannon, "Communication theory of secrecy systems", Bell system technical journal, vol. 28, pp. 656-715, (1949).

A. Wyner, “The wire-tap channel”, Bell System Technical Journal, vol. 54, no. 8, pp. 1355–1387, (1975).

H. Alves, R. D. Souza, M. Debbah, and M. Bennis, “Performance of transmit antenna selection physical layer security schemes”, IEEE Signal Process. Lett., vol. 19, no. 6, pp. 372–375, (2012).

J. Chen, R. Zhang, L. Song, Z. Han, and B. Jiao, “Joint relay and jammer selection for secure two-way relay networks,” IEEE Trans. Inf. Forensics Security, vol. 7(1), pp. 310–320, (2012).

N. Yang, H. A. Suraweera, I. B. Collings, and C. Yuen, “Physical layer security of TAS/MRC with antenna correlation”, IEEE Transactions on Information Forensics and Security, vol. 8, no. 1, pp. 254 – 259, (2013).

L. Fan, X. Lei, T. Q. Duong, M. Elkashlan, and K. Karagiannidis, “Secure multiuser multiple amplify-and-forward relay networks in presence of multiple eavesdroppers”, in IEEE GLOBECOM, Austin, USA, 8-12 December, (2014).

A. P. Shrestha and K. S. Kwak, “Performance of opportunistic scheduling for physical layer security with transmit antenna selection” EURASIP Journal on Wireless Communications and Networking, vol. 2014:33, pp. 1–9, (2014).

S. Liu, Y. Hong, and E. Viterbo, “Practical secrecy using artificial noise”, IEEE Communications Letter, vol. 17, no. 7, pp. 1483–1486, (2013).

L. Wang, N. Yang, M. Elkashlan, P. L. Yeoh, and J. Yuan, “Physical layer security of maximal ratio combining in two-wave with diffuse power fading channels”, IEEE Transactions on Information Forensics and Security, vol. 9(2), pp. 247–258, (2014).

D.-B. Ha, T. Q. Duong, D.-D. Tran, H.-J. Zepernick, and T. T. Vu, “Physical layer secrecy performance over Rayleigh/Rician fading channels”, in The 2014 International Conference on Advanced Technologies for Communications (ATC’14), Hanoi, Vietnam, Oct. 15- 17, pp. 113–118, (2014)

I. Gradshteyn and I. Ryzhik, Table of Integrals, Series, and Products, D. Zwillinger, Ed. Elsevier Academic Press, (2007).

Published

30-06-2016

Volume and Issues

Section

Natural Sciences and Technology

How to Cite

Vũ, T. T., Dũng, T. Đức, Bình, H. Đắc, & Văn, V. N. (2016). PHYSICAL LAYER SECRECY ON WIRELESS NETWORK. Dalat University Journal of Science, 6(2). https://doi.org/10.37569/DalatUniversity.6.2.37(2016)