Achieving zero secrecy outage in amplify-and-forward relaying systems
131 viewsDOI:
https://doi.org/10.54939/1859-1043.j.mst.CAPITI.2024.89-96Keywords:
Artificial noise injection; Secrecy outage probability; Zero-outage secrecy capacity.Abstract
A proposed artificial noise (AN) injection strategy is considered in amplify-and-forward (AF) relaying systems. The limit of secrecy rate, hence the resulting zero-outage secrecy throughput, is determined subject to guarantee zero secrecy outage toward any powerful eavesdropper. The results show that the proposed simple strategy can achieve zero secrecy outage, which cannot be achieved in literature, and that it is easy to apply in wireless networks. The results also show an important finding: increasing throughput against increasing transmit power in secrecy.
References
[1]. Y.-S. Shiu, S. Y. Chang, H.-C. Wu, S. C.-H. Huang, and H.-H. Chen, “Physical layer security in wireless networks: a tutorial,” IEEE Wireless Communications, vol. 18, no. 2, pp. 66–74, (2011). DOI: https://doi.org/10.1109/MWC.2011.5751298
[2]. M. Bloch and J. Barros, “Physical-Layer Security: From Information Theory to Security Engineering”. Cambridge University Press, (2011). DOI: https://doi.org/10.1017/CBO9780511977985
[3]. S. Goel and R. Negi, “Guaranteeing secrecy using artificial noise,” IEEE transactions on wireless communications, Vol. 7, No. 6, pp. 2180–2189, (2008). DOI: https://doi.org/10.1109/TWC.2008.060848
[4]. M. Ahmed and L. Bai, “Secrecy capacity of artificial noise aided secure communication in mimorician channels,” IEEE Access, Vol. 6, pp. 7921–7929, (2018). DOI: https://doi.org/10.1109/ACCESS.2018.2804924
[5]. G. Zheng, I. Krikidis, J. Li and A. P. Petropulu, “Improving physical layer secrecy using full-duplex jamming receivers,” IEEE Transactions on Signal Processing, Vol. 61, No. 20, pp. 4962–4974, (2013). DOI: https://doi.org/10.1109/TSP.2013.2269049
[6]. Z. Cao, X. Ji, J. Wang, S. Zhang, Y. Ji, Y. Li, and J. Wang, “Security-reliability trade-off analysis of an-aided relay selection for full-duplex relay networks,” IEEE Transactions on Vehicular Technology, Vol. 70, No. 3, pp. 2362–2377, (2021). DOI: https://doi.org/10.1109/TVT.2021.3057830
[7]. H. Q. Ta, L. Cao, and H. Oh, “Novel noise injection scheme to guarantee zero secrecy outage under imperfect csi,” Entropy, Vol. 25, No. 12, p. 1594, (2023). DOI: https://doi.org/10.3390/e25121594
[8]. I. S. Gradshteyn and I. M. Ryzhik, “Table of integrals, series, and products”. Elsevier/Academic Press, Amsterdam, seventh ed., (2007). Translated from the Russian, Translation edited and with a preface by Alan Jeffrey and Daniel Zwillinger, With one CD-ROM (Windows, Macintosh and UNIX).
[9]. X. Zhou, M. R. McKay and B. Maham “Rethinking the secrecy outage formulation: A secure transmission design perspective,” IEEE Communications Letters, Vol. 15, No. 3, pp. 302–304, (2011). DOI: https://doi.org/10.1109/LCOMM.2011.011811.102433