Skip to main content

Performance of opportunistic scheduling for physical layer security with transmit antenna selection

Abstract

We introduce an opportunistic scheduling to enhance the physical layer security with transmit antenna selection (TAS) in multiuser environment. We consider a wireless communication system composed of a single transmitter and multiple legitimate users in the presence of several eavesdroppers with each node having multiple antennas under quasi-static Rayleigh fading channel. The transmitter selects the best transmitting antenna and the best user to maximize signal-to-noise ratio (SNR) at the selected user. The user and eavesdropper can employ either selection combining (SC) or maximal ratio combining (MRC) to combine the received signals. New closed-form expressions for probability of positive secrecy and outage are derived. Moreover, asymptotic analysis reveals the outage diversity gain and array gain for the proposed scheme. The impact of number of users, eavesdroppers, and antennas on secrecy performance are clearly demonstrated with mathematical analysis and numerical results.

1 Introduction

The security risks are inherent in any wireless network due to its underlying transmission medium, the airwave, which is exposed to all sorts of unwanted eavesdroppers. Traditionally, cryptographic algorithms are applied at the upper layer to secure information. However, physical layer (PHY) security has recently gained considerable attention as an alternative option to secure information besides the traditional cryptographic schemes. It can exploit the uncorrelated nature of the wireless medium for enhancing the security of wireless systems. The pioneering work in [1] presented that a noisy communication channel offers opportunities for non-zero rate secure communication when the eavesdroppers’ channel is on average a degraded version of the main channel. This work was further extended in [2] to characterize the non-degraded channel. The perfect secrecy capacity was defined in [3] as the difference between the capacity of main channel and wiretap channel given that the capacity of the former is greater than the latter one under Gaussian channel. The secrecy capacity will provide the highest value of communication rate for which coding schemes can be designed ensuring the perfect secrecy. Moreover, the existence of the perfect secrecy in wiretap channels was shown in [4] even when the eavesdropper has a better average signal-to-noise ratio (SNR) than the legitimate receiver.

Several aspects of wireless communication field have been studied to improve physical layer security, such as cooperative networks [5, 6], multiaccess channel [7], outdated channel state information (CSI) [8, 9], channel estimation [10], and cognitive radio [11]. In recent years, usage of diversity has emerged as a common technique to enhance PHY security. Several papers exist in literature [12-19] which employ either transmit or receive diversity to improve PHY security. In [12], the receive diversity technique was studied where both legitimate user and eavesdropper employ maximal ratio combining (MRC). The authors showed that the use of multiple receive antennas can enhance security and that the secrecy outage probability is a function of the ratio between the number of receive antennas at user and eavesdropper. Further new results were provided for MRC technique under correlated channels in [13]. The comparison between selection combining (SC) and MRC at eavesdropper was studied in [14]. The authors illustrated that MRC at eavesdropper severely degrades the performance compared to SC at eavesdropper. Beamforming technique is studied in [15] for minimizing the transmit power to a prespecified signal-to-interference-plus-noise-ratio (SINR) at the receiver. However, it should be noted that the transmission side can be highly complex as well as the cost may rise with the increase in the number of antennas. To overcome such issues, transmit antenna selection (TAS) has been proposed in [16-19] which also exploits transmit diversity at the expense of a generally acceptable loss in performance. It uses a single radio frequency (RF) chain instead of several parallel RF sections, which reduces cost, complexity, power consumption, and size.

In [16], performance of TAS was examined in the presence of single receiver and eavesdropper both equipped with single antenna. The authors further extended the work in [17] to a scenario consisting of a sophisticated multiple antenna eavesdropper employing MRC. In [18], use of TAS for security enhancement was examined where the receiver and eavesdropper can employ either MRC or SC under Nakagami-m fading channels. The superiority of MRC over SC was established by the authors. Performance of TAS with antenna correlation at the receiver and eavesdropper has been studied in [19]. The authors demonstrated that when the average SNR of the main channel is at medium and high levels, higher correlation at the receiver exerts more detrimental effects on secrecy than higher correlation at the eavesdropper. Opportunistic scheduling policy for PHY security has been discussed in [20], but the authors have addressed only MAC layer policies.

In this paper, we consider a single transmitter with multiple active users and several passive eavesdroppers each equipped with multiple antennas in contrast to [16-18] and [20]. We propose an opportunistic scheduling along with TAS at transmitter. A similar case with single eavesdropper is analyzed in [21]. However, we extend the work in [21] to the case of multiple non-colluding eavesdroppers and receivers which can employ either MRC or SC. MRC may be employed to maximize the SNR as it is an optimum combining technique, while SC may be employed for its simplicity. As different users experience different channel environments at a given moment, an opportunistic scheduling can maximize the transmission data rate with an exactly known CSI of all users [22]. With such multiuser diversity, opportunistic scheduling can be a promising technique to improve PHY security where the secrecy capacity is severely limited by SNR of eavesdroppers. In addition, use of TAS with MRC or SC further improves the performance with transmit diversity and receive diversity, respectively. Overall, the proposed scheme allows simultaneous exploitation of multiuser diversity, transmit diversity, and receive diversity.

Notation The superscript T denotes transposition; E{·} denotes statistical expectation; I N is the N×N identity matrix; ∥x∥ denotes the norm of a complex valued vector x, i.e., x H x ; CN(μ, σ 2 ) denotes the complex Gaussian distribution with mean μ and variance σ2; P(x) denotes the probability of an event x.

2 Proposed scheme

2.1 System model

We consider a wireless network composed of one transmitter referred to as Alice, K as the number of users and W as the number of eavesdroppers as shown in Figure 1. Alice is equipped with LA antennas while each legitimate user and eavesdropper are equipped with LB and LE antennas, respectively. We assume all channels are quasi-static Rayleigh fading. We also assume that there exists a feedback channel between each legitimate user and the transmitter. At the legitimate receiver side, each user selects the best transmit antenna having the highest channel SNR. Each user feedbacks the selected antenna index to Alice. The scheduler at Alice finally selects a single user with corresponding indexed antenna having highest SNR values out of K users. We refer the single selected user as Bob. On the other hand, we consider that Alice possesses only average SNR and no other information about the channel state of eavesdroppers. Moreover, all the channels are considered to be mutually independent. From the eavesdroppers’s point of view, the opportunistically selected single best user along with optimum TAS scheme appears to be a random strategy, as the main channel between Bob and Alice and the wiretap channel between eavesdroppers and Alice are uncorrelated. We need to consider the eavesdropper with maximum possible SNR link for our analysis as it denotes the maximal information leakage. We refer the eavesdropper with maximum SNR as Eve from herein.

Figure 1
figure 1

System model for secure opportunistic scheduling with TAS in presence of multiple eavesdroppers.

The message block S is encoded into the codeword c=[ c(1),..,c(i),..,c(n)]. The codeword is designed in such a way that it is suitable to be transmitted over the selected channel. We focus on measuring the achievable level of secrecy rather than the actual code design. The channel is assumed to be power limited in the sense that 1 n Σ i = 1 n E | c ( i ) | 2 =P where P is the average transmit signal power [13].

Alice selects Bob to achieve the largest post-processing SNR when selecting the best transmit antenna based on the information provided by each legitimate users through their respective feedback channels. MRC technique at Bob will combine the multiple received signals from different receiving antennas according to the gain of each channel. The received signal at Bob in this case can be expressed as

y B MRC (i)= h B , u c(i)+ n B , u ,
(1)

where h B , u = [ h B , 1 , h B , 2 , ... , h B , L B ] T is a complex channel vector and n B , u ∼CN(0, σ B 2 I L B ). From (1), the instantaneous SNR of Bob with MRC is given by

γ B MRC = ∥ h B , u ∥ 2 P σ B 2 .

Under this scenario, Eve can apply either MRC or SC to decode the intercepted signal. The received signal for Eve by applying MRC can be written as

y E MRC/MRC (i)= h E , v c(i)+ n E , v ,
(2)

where h E , v = [ h E , 1 , h E , 2 , ... , h E , L E ] T is a complex channel vector and n E , v ∼CN(0, σ E 2 I L E ). From (2), the instantaneous SNR of Eve is given by γ E MRC/MRC = ∥ h E , v ∥ 2 P σ E 2 . On the other hand, the received signal for Eve by applying SC can be written as

y E MRC/SC (i)= h E c(i)+ n E ,
(3)

where h E is a complex channel coefficient and n E is additive white Gaussian noise (AWGN) with noise variance σ E 2 . From (3), the instantaneous SNR of Eve is given by γ E MRC/SC = | h E | 2 P σ E 2 .

Considering the simplicity and cost effectiveness, Bob can employ SC instead of MRC. The received signal at Bob for such scenario can be expressed as

y B SC (i)= g B c(i)+ n B ,
(4)

where g B is a complex channel coefficient and n B is AWGN with noise variance σ B 2 . The instantaneous SNR of Bob with SC is given by γ B SC = | g B | 2 P σ B 2 .

As mentioned above, Eve can apply either MRC or SC to decode the messages under this scenario as well. For Bob with SC, the received signal at Eve while applying MRC can be expressed as

y E SC/MRC (i)= g E , v c(i)+ n E , v ,
(5)

where g E , v = [ g E , 1 , g E , 2 , ... , g E , L E ] T is a complex channel vector and n E , v ∼CN(0, σ E 2 I L E ). From (5), the instantaneous SNR of Eve for this scheme is given by γ E SC/MRC = ∥ g E , v ∥ 2 P σ E 2 .

Likewise, the received signal for Eve by applying SC can be written as

y E SC/SC (i)= g E c(i)+ n E ,
(6)

where g E is a complex channel coefficient and n E is AWGN with noise variance σ E 2 . From (6), the instantaneous SNR of Eve with SC/SC is given by γ E SC/SC = | g E | 2 P σ E 2 .

2.2 SNR distribution

We deduce the probability density function (PDF) and cumulative distribution function (CDF) in this section to facilitate the analysis of secrecy performance. The PDF and CDF of instantaneous SNR for the k th user employing MRC with LB antennas can be expressed in the form of Chi-square distribution and Gamma function [23] respectively as

f k MRC ( γ k )= γ k L B - 1 γ ̄ B L B Γ ( L B ) e - γ k γ ̄ B ,
(7)
F k MRC ( γ k ) = 1 - Γ L B , γ k γ ̄ B Γ ( L B ) = 1 - e - γ k γ ̄ B ∑ i = 0 L B - 1 1 i ! γ k γ ̄ B i ,
(8)

where Γ(·) and Γ(·,·) are complete and incomplete gamma functions, respectively (Equations (8.339.1) and (8.352.2) in [24]).

Using order statistics [25], we can derive the CDF and PDF of SNR for MRC at Bob as follows

F B MRC ( γ B ) = F k MRC ( γ B ) K L A = ∑ m = 0 KL A ∑ i = 0 m ( L B - 1 ) KL A m ( - 1 ) m a i γ ̄ B i γ B i e - γ B m γ ̄ B ,
(9)
f B MRC ( γ B ) = KL A F k MRC ( γ B ) KL A - 1 f k MRC ( γ B ) = KL A ∑ m = 0 KL A - 1 ∑ i = 0 m ( L B - 1 ) KL A - 1 m × ( - 1 ) m a i γ ̄ B i + L B Γ ( L B ) γ B L B + i - 1 e - γ B α ,
(10)

where γ ̄ B is the average SNR of Bob’s channel given by P σ B 2 E ∥ h B , u ∥ 2 and α= m + 1 γ ̄ B . Likewise, a i denotes the coefficient of γ B γ ̄ B i in the expansion of ∑ i = 0 ( L B - 1 ) 1 i ! ( γ B γ ̄ B ) i m , where a i can be recursively calculated by

a 0 = 1 , a 1 = m , a i = 1 i ∑ t = 1 min ( i , L B - 1 ) t ( m + 1 ) - i t ! a i - t , for 2 ≤ i < m ( L B - 1 ) , a i = 1 [ ( L B - 1 ) ! ] m , for i = m ( L B - 1 ) .
(11)

The expressions in (9) and (10) can be obtained by using binomial expansion at first which results the term with power series raised to power ∑ i = 0 ( L B - 1 ) 1 i ! ( γ B γ ̄ B ) i m . The power series can be further expanded by using Equation 0.314 in [24]. This finite series expansion is possible as the first term within incomplete gamma function in (8), i.e., the number of antennas at Bob LB has always integer value [26].

In a similar fashion, by using the order statistics, we can derive the CDF and PDF of Bob’s channel for SC case as

F B SC ( γ B )= ∑ n = 0 KL A L B KL A L B n ( - 1 ) n e - γ B n γ ̄ B ,
(12)
f B SC ( γ B )= KL A L B γ ̄ B ∑ n = 0 KL A L B - 1 KL A L B - 1 n ( - 1 ) n e - γ B n + 1 γ ̄ B .
(13)

The selection of best antenna at Alice seems random from Eve’s point of view. As there are W number of eavesdroppers in the network each equipped with LE antennas, the diversity for Eve limits to multiuser diversity and receive diversity while there is no transmit diversity. The PDF and CDF for Eve employing MRC irrespective of MRC or SC at Bob can be obtained using similar order statistics and mathematical steps as in (9) and (10) by replacing K LA=W and LB=LE, respectively which is shown below:

F E MRC ( γ E )= ∑ p = 0 W ∑ j = 0 p ( L E - 1 ) W p ( - 1 ) p b j γ ̄ E j γ E j e - γ E p γ ̄ E ,
(14)
f E MRC ( γ E ) = W ∑ p = 0 W - 1 ∑ j = 0 p ( L E - 1 ) W - 1 p × ( - 1 ) p b j γ ̄ E j + L E Γ ( L E ) γ E L E + j - 1 e - γ E β ,
(15)

where b j is the coefficient of γ E γ ̄ E j in the expansion of ∑ j = 0 L E - 1 1 j ! γ E γ ̄ E j p , β= p + 1 γ ̄ E ; and γ ̄ E is average SNR of the eavesdroppers’ channel. We note that the coefficient b j can be recursively calculated as a i described in (11).

Finally, the CDF and PDF of Eve with SC can be obtained as in (12) and (13), respectively, which is shown below:

F E SC ( γ E )= ∑ q = 0 WL E WL E q ( - 1 ) q e - γ E q γ ̄ E ,
(16)
f E SC ( γ E )= WL E γ ̄ E ∑ q = 0 WL E WL E - 1 q ( - 1 ) q e - γ E q + 1 γ ̄ E .
(17)

2.3 Secrecy capacity

From [3], the secrecy capacity over Gaussian wiretap channel is given by the difference between the main channel capacity and wiretap channel capacity. Since block-faded channel is assumed in our system model, both the channels can be regarded as complex Gaussian channels. The capacity of Bob’s channel is given by

C B = log 2 (1+ max 1 ≤ i ≤ K L A γ B i )= log 2 (1+ γ B ).
(18)

Similarly, the capacity of Eve’s channel is given by

C E = log 2 (1+ max 1 ≤ j ≤ W γ E j )= log 2 (1+ γ E ),
(19)

where γ B and γ E are the instantaneous SNR of Bob and Eve, respectively, regardless of any receive diversity scheme.

Hence, under perfect secrecy constraint, the instantaneous secrecy capacity of Bob in the presence of multiple eavesdroppers equipped with multiple antennas can be expressed as

C s = C B - C E , if γ B ≥ γ E 0 , otherwise .
(20)

3 Performance metrics

3.1 Positive secrecy probability

Since the main channel between Alice and Bob is independent from the wiretap channel between Alice and Eve, the existence probability of a non-zero secrecy capacity can be calculated as

P ( C s > 0 ) = P ( γ B > γ E ) = ∫ 0 ∞ ∫ 0 γ B f B ( γ B ) f E ( γ E ) d γ E d γ B = ∫ 0 ∞ f B ( γ B ) F E ( γ B ) d γ B
(21)

where f B (·) and F E (·) are the PDF and CDF of γ B and γ E , respectively. As we have already derived the PDF of γ B and CDF of γ E for respective schemes in Section 2.2, the probability of positive secrecy for each scheme can be easily derived by simply substituting the values and using Equation 3.351.3 in [24] as shown in (22) to (25):

P ( C s > 0 ) MRC/MRC = KL A ∑ m = 0 KL A - 1 ∑ i = 0 m ( L B - 1 ) KL A - 1 m × ( - 1 ) m a i γ ̄ B L B + i Γ ( L B ) ∑ p = 0 W ∑ j = 0 p ( L E - 1 ) W p ( - 1 ) p × b j γ ̄ E j Γ ( L B + i + j ) m + 1 γ ̄ B + p γ ̄ E - L B - i - j ,
(22)
P ( C s > 0 ) MRC/SC = KL A ∑ m = 0 KL A - 1 ∑ i = 0 m ( L B - 1 ) KL A - 1 m ( - 1 ) m a i γ ̄ B L B + i Γ ( L B ) × ∑ q = 0 WL E WL E q ( - 1 ) q Γ ( L B + i ) × m + 1 γ ̄ B + q γ ̄ E - L B - i ,
(23)
P ( C s > 0 ) SC/MRC = KL A L B γ ̄ B ∑ n = 0 KL A L B - 1 KL A L B - 1 n ( - 1 ) n × ∑ p = 0 W ∑ j = 0 p ( L E - 1 ) W p ( - 1 ) p b j γ ̄ E j Γ ( j + 1 ) × n + 1 γ ̄ B + p γ ̄ E - j - i ,
(24)
P ( C s > 0 ) SC/SC = KL A L B γ ̄ B ∑ n = 0 KL A L B - 1 KL A L B - 1 n ( - 1 ) n × ∑ q = 0 WL E WL E q ( - 1 ) q n + 1 γ ̄ B + q γ ̄ E - 1 .
(25)

3.2 Secrecy outage probability

Since Alice does not have full CSI of any eavesdropper, we have to characterize the outage probability of secrecy capacity. The secrecy outage probability can be defined as the probability that the achievable secrecy rate is less than a given rate of transmission Rs such that Rs>0. The transmission rate below Rs cannot ensure the secure transmission. The outage can occur in two ways: firstly, when SNR at Eve exceeds to that of Bob and Eve is able to decode the message; secondly, when SNR at Bob exceeds to that of Eve but still Bob is unable to decode the message. As such, we can formulate the secrecy outage probability [18, 19] using the total probability theorem as follows:

P out ( R s ) = P ( C s < R s | γ B > γ E ) P ( γ B > γ E ) + P ( C s < R s | γ B ≤ γ E ) P ( γ B ≤ γ E ) .
(26)

Since the secrecy capacity does not exist when γ B ≤γ E and we always assume that Rs>0, we get P(Cs<Rs|γ B ≤γ E )=1. Therefore, (26) becomes

P out ( R s )=P( C s < R s | γ B > γ E )P( γ B > γ E )+P( γ B ≤ γ E ).
(27)

The first term in (27) can be simplified as

P ( C s < R s | γ B > γ E ) P ( γ B > γ E ) = P ( log 2 ( 1 + γ B ) - log 2 ( 1 + γ E ) < R s | γ B > γ E ) P ( γ B > γ E ) = P ( γ B < 2 R s ( 1 + γ E ) - 1 | γ B > γ E ) × P ( γ B > γ E ) = ∫ 0 ∞ ∫ γ E d ( 1 + γ E ) - 1 × f E ( γ E ) f B ( γ B ) d γ B d γ E ,
(28)

where d= 2 R s . The second term in (27) can be simplified as

P( γ B ≤ γ E )= ∫ 0 ∞ ∫ 0 γ E f E ( γ E ) f B ( γ B )d γ B d γ E .
(29)

Substituting (28) and (29) in (27), we get

P out ( R s )= ∫ 0 ∞ f E ( γ E ) F B (d(1+ γ E )-1)d γ E ,
(30)

where F B (·) is the CDF of γ B and f E (·) is the PDF of γ E . As we have already derived the CDF of γ B and PDF of γ E for respective schemes, we simply proceed to obtain the outage probability expression for each scheme by replacing the respective values in (30). New closed-form expression of the exact secrecy outage probability for each scheme is provided from (31) to (34) as follows:

P out MRC/MRC ( R s ) = ∑ m = 0 KL A ∑ i = 0 m ( L B - 1 ) ∑ u = 0 i KL A m ( - 1 ) m a i γ ̄ B i i u × d u ( d - 1 ) i - u e - ( d - 1 ) m γ ̄ B W ∑ p = 0 W - 1 ∑ j = 0 p ( L E - 1 ) × W - 1 p ( - 1 ) p b j γ ̄ E L E + j Γ ( L E ) Γ ( L E + j + u ) × p + 1 γ ̄ E + dm γ ̄ B - L E - j - u ,
(31)
P out MRC/SC ( R s ) = ∑ m = 0 KL A ∑ i = 0 m ( L B - 1 ) ∑ u = 0 i KL A m ( - 1 ) m a i γ ̄ B i i u × d u ( d - 1 ) i - u e - ( d - 1 ) m γ ̄ B WL E γ ̄ E ∑ q = 0 WL E - 1 × WL E - 1 q ( - 1 ) q Γ ( u + 1 ) × q + 1 γ ̄ E + dm γ ̄ B - u - 1
(32)
P out SC/MRC ( R s ) = ∑ n = 0 KL A L B KL A L B n ( - 1 ) n e - ( d - 1 ) n γ ̄ B × W ∑ p = 0 W - 1 ∑ j = 0 p ( L E - 1 ) W - 1 p ( - 1 ) p b j γ ̄ E L E + j Γ ( L E ) Γ ( L E + j ) × p + 1 γ ̄ E + dn γ ̄ B - L E - j
(33)
P out SC/SC ( R s ) = ∑ n = 0 KL A L B KL A L B n ( - 1 ) n e - ( d - 1 ) γ ̄ B × WL E γ ̄ E ∑ q = 0 WL E - 1 WL E - 1 q ( - 1 ) q Γ ( n + 1 ) × q + 1 γ ̄ E - n - 1
(34)

Remark 1

By substituting K=W=LA=LB=LE=1 in (31) to (34), all the schemes reduce to the special case of single transmitter, user, and eavesdropper with single antenna which corresponds to Equation 9 in [4].

Remark 2.

A special case of single transmitter and user with single antenna and an eavesdropper with multiple antennas can be obtained with K=W=LA=LB=1 in (31) to (34) such that (31) and (33) corresponds to Equation 10 in [14] while (32) and (34) corresponds to Equation 11 in [14].

This verifies that the expression derived is consistent with the results from the existing literature.

3.3 Asymptotic behavior

Although the closed-form expression for the outage probability derived in (31) to (34) enable us to evaluate the performance of TAS scheme, its complex forms do not allow us to gain valuable insights on how the parameter K, W, LA, LB, and LE affect the overall performance. Therefore, we perform asymptotic analysis in the sequel.

As γ ̄ B →∞ in the high SNR regime, the asymptotic outage probability for both Bob and Eve’s channel with MRC is given by

P out MRC/MRC(a) ( R s )= ( Ψ MRC/MRC γ ̄ B ) - Δ ,
(35)

where diversity order is Δ=K LALB and array gain ΨMRC/MRC is given by

Ψ MRC/MRC = W ∑ m = 0 Δ Δ m d m ( d - 1 ) Δ - m ( L B ! ) KL A ∑ p = 0 W - 1 ∑ j = 0 p ( L E - 1 ) W - 1 p × ( - 1 ) p b j γ ̄ E L E + j Γ ( L E ) Γ ( L E + j + m ) p + 1 γ ̄ E - L E - j - m - 1 Δ .
(36)

Proof

Further discussion of proof of (35) is presented in Appendix 1.

Following the similar steps in Appendix 1, we can obtain the asymptotic outage probability for Bob with MRC and Eve with SC as follows

P out MRC/SC(a) ( R s )= ( Ψ MRC/SC γ ̄ B ) - Δ ,
(37)

where diversity order is Δ=K LALB and array gain ΨMRC/SC is given by

Ψ MRC/SC = WL E γ ̄ E ∑ m = 0 Δ Δ m d m ( d - 1 ) Δ - m ( L B ! ) KL A ∑ q = 0 WL E - 1 WL E - 1 q × ( - 1 ) q Γ ( m + 1 ) q + 1 γ ̄ E - m - 1 - 1 Δ .
(38)

Similarly, the asymptotic outage probability for Bob with SC and Eve with MRC can be obtained as

P out SC/MRC(a) ( R s )= ( Ψ SC/MRC γ ̄ B ) - Δ ,
(39)

where diversity order is Δ=K LALB and array gain ΨSC/MRC is given by

Ψ SC/MRC = W ∑ n = 0 Δ Δ n d n ( d - 1 ) Δ - n W ∑ p = 0 W - 1 ∑ j = 0 p ( L E - 1 ) W - 1 p × ( - 1 ) p b j γ ̄ E L E + j Γ ( L E ) Γ ( L E + j + n ) p + 1 γ ̄ E - L E - j - n - 1 Δ .
(40)

Proof

Further discussion of proof of (37) is presented in Appendix 2.

Following the similar steps in Appendix 2, we can obtain the asymptotic outage probability for both Bob and Eve with SC as follows:

P out SC/SC(a) ( R s )= ( Ψ SC/SC γ ̄ B ) - Δ ,
(41)

where diversity order is Δ=K LALB and array gain ΨSC/SC is given by

Ψ SC/SC = ∑ n = 0 Δ Δ n d n ( d - 1 ) Δ - n WL E γ ̄ E ∑ q = 0 WL E - 1 WL E - 1 q × ( - 1 ) q Γ ( n + 1 ) q + 1 γ ̄ E - n - 1 - 1 Δ .
(42)

We compare the performance difference between MRC and SC at Bob in terms of simple ratio of secrecy array gains as in [18]. The difference in performance is characterized as

Ψ MRC/MRC Ψ SC/MRC = Ψ MRC/SC Ψ SC/SC = ( L B ! ) 1 L B .
(43)

It is obvious that MRC/MRC is superior to SC/MRC and MRC/SC is superior to SC/SC by an SNR gap of 10 L B log L B ! . Moreover, as γ ̄ E →∞, the outage probability becomes one resulting absolute absence of secret communication. Also, the outage probability becomes 0 and 1 at the extreme values of Rs=0 and Rs→∞ respectively as per our expectation.

4 Numerical results

Figure 2 shows the probability of positive secrecy as a function of γ ̄ B at selected values of γ ̄ E for various schemes when K = 4, W = 3, and LA=LB=LE = 2. This figure highlights that the probability of positive secrecy increases with γ ̄ B while decreases with the increase in value of γ ̄ E . In both cases, non-zero secrecy capacity exists even when Eve’s channel has a higher average SNR relative to Bob’s channel. It is also obvious that MRC at Bob and SC at Eve provides the best performance while SC at Bob and MRC at Eve results the worst performance of all four possible schemes.

Figure 2
figure 2

Probability of non-zero secrecy versus γ ̄ B for selected values of γ ̄ E .

Figure 3 compares the secrecy outage probability versus γ ̄ B for selected values of LA with K=W=LB=LE=2, γ ̄ E = 15 dB and Rs = 0.1 bit/s/Hz. There is a remarkable decrease in the secrecy outage probability when we increase LA from 1 to 4. This shows the improvement in performance from transmit diversity provided by TAS at Alice. For example, at Pout=10-3 under MRC/MRC scheme, a gain of nearly 5.5 dB is achieved with LA=4 compared to that of LA=1.

Figure 3
figure 3

Secrecy outage probability versus γ ̄ B for selected values of L A .

In Figure 4, the asymptotic and exact secrecy outage probabilities for different schemes are shown at selected values of γ ̄ E for each scheme to avoid cluttering in the figure. We consider K=W=LA=LB=LE = 2, and Rs = 0.1 bit/s/Hz for this case. We can observe that the asymptotic curve merges with exact curve in the high SNR regime. Moreover, the parallel asymptotic lines indicate the same diversity order in all four schemes. For the case of K=LA=LB = 2, the diversity order is found to be nearly 8 in all four schemes, which verifies the diversity order obtained in (35), (37), (39), and (41).

Figure 4
figure 4

Asymptotic and exact secrecy outage probability versus γ ̄ B for selected values of γ ̄ E .

In Figure 5, we show the secrecy outage probability versus γ ̄ B for different values of LB and LE with K=W=LA=2, γ ̄ E = 10 dB and Rs = 0.1 bit/s/Hz under MRC/MRC scheme. It is found that for fixed value of LB, the increase in LE will increase Pout(Rs). However, there is no improvement in the diversity order which is evident from the parallel lines for different values of LE. To compensate the performance degradation by number of antennas at Eve, we can increase the number of antennas at Bob. We can notice that a single addition of antenna at Bob sharply decreases the secrecy outage probability.

Figure 5
figure 5

The secrecy outage probability versus target secrecy rate R s for different values of L B and L E .

Figure 6 illustrates the secrecy outage probability versus target secrecy rate, R s for different values of K with W=LA=LB=LE=2, γ ̄ B = 10 dB and γ ̄ E = 0 dB. For K=1, the proposed scheme corresponds to the scheme discussed in [16] and [17] but with the presence of multiple eavesdroppers. It is clear that employing opportunistic scheduling drastically improves the outage performance and higher target secrecy rate can be achieved. The performance improves with increase in K but it nearly saturates at higher values of K.

Figure 6
figure 6

The secrecy outage probability versus target secrecy rate R s for W=L A =L B =L E =2 .

5 Conclusions

We proposed an opportunistic scheduling with TAS to enhance physical layer security. At the transmitter, a single antenna is selected to maximize the instantaneous SNR of the main channel, while at the receiver and the eavesdropper, MRC or SC is applied. The scheduler at Alice selects a single best user out of K users. The security performance metrics, i.e., probability of positive secrecy and secrecy outage probability are improved by combination of transmit diversity, receive diversity, and multiuser diversity simultaneously. The asymptotic analysis demonstrated that the outage diversity order of the proposed scheme is given by the product of the number of legitimate receivers and the number of antennas at the transmitter and receiver. We can also conclude that the secrecy outage probability is almost independent of the number of antennas and eavesdroppers in high SNR region.

Appendix 1

Proof of (35)

As γ ̄ B →∞, the CDF of Bob’s channel with MRC can be approximated as

F B MRC ( a ) ( γ B ) ≈ [ F B ( γ B ) ] KL A = 1 - Γ ( L B , γ B γ ̄ B ) Γ ( L B ) KL A = 1 - ( L B - 1 ) ! - γ B γ ̄ B L B 1 L B 1 + O γ B γ ̄ B ( L B - 1 ) ! KL A = γ B KL A L B γ ̄ B KL A L B ( L B ! ) A KL ,
(44)

where denotes higher-order terms such that f(x)=O(g(x)) implies that there exists a non-negative constant τ so that lim x → ∞ f ( x ) g ( x ) ≤τ. We select only the first order terms in (44) and finally substitute (15) and (44) in (30) to obtain (35).

Appendix 2

Proof of (37)

As γ ̄ B →∞, the CDF of Bob’s channel with SC can be approximated as

F B SC(a) ( γ B ) ≈ [ 1 - e - γ B γ ̄ B ] KL A L B = 1 - 1 + γ B γ ̄ B + O γ B γ ̄ B KL A L B = γ B KL A L B γ ̄ B KL A L B .
(45)

Neglecting higher terms in (45) and substituting (15) and (45) in (30), we can obtain (37).

References

  1. Wyner AD: The wire-tap channel. Bell Syst. Techn. J 1975, 54: 1355-1387.

    Article  MathSciNet  Google Scholar 

  2. Csiszár I, Körner J: Broadcast channels with confidential messages. IEEE Trans. Inf. Theory 1978, 24(3):339-348. 10.1109/TIT.1978.1055892

    Article  Google Scholar 

  3. Leung-Yan-Cheong S, Hellman M: The Gaussian wire-tap channel. IEEE Trans. Inf. Theory 1978, 24(4):451-456. 10.1109/TIT.1978.1055917

    Article  MathSciNet  Google Scholar 

  4. Bloch M, Barros J, Rodrigues MRD, McLaughlin SW: Wireless information-theoretic security. IEEE Trans. Inf. Theory 2008, 54(6):2515-2534.

    Article  MathSciNet  Google Scholar 

  5. Awan Z, Zaidi A, Vandendorpe L: Secure communication over parallel relay channel. IEEE Trans. on Info. Forensics Secur 2012, 7(2):359-371.

    Article  Google Scholar 

  6. Zou Y, Wang X, Shen W: Optimal relay selection for physical-layer security in cooperative wireless networks. IEEE J. Sel. Areas Commun 2013, 31(10):2099-2111.

    Article  Google Scholar 

  7. Awan Z, Zaidi A, Vandendorpe L: Multiaccess channel with partially cooperating encoders and security constraints. IEEE Trans. on Inf. Forensics Secur 2013, 8(7):1243-1254.

    Article  Google Scholar 

  8. Zaidi A, Awan ZH, Shamai S, Vandendorpe L: Secure degrees of freedom of MIMO X-channels with output feedback and delayed CSI. IEEE Trans. Inf. Forensics Secur 2013, 8(11):1760-17774.

    Article  Google Scholar 

  9. Ferdinand NS, da Costa DB, Latva-aho M: Effects of outdated CSI on the secrecy performance of MISO wiretap channels with transmit antenna selection. IEEE Commun. Lett, in press 2013, 17(5):864-867.

    Article  Google Scholar 

  10. Shrestha AP, Kwak KS: On maximal ratio diversity with weighting errors for physical layer security. IEEE Commun. Lett, in press. http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=06746738

  11. Zou Y, Wang X, Shen W: Physical-layer security enhancement with multiuser scheduling in cognitive radio. IEEE Trans. Commun, in press http://arxiv.org/pdf/1311.0404.pdf

  12. He F, Man H, Wang W: Maximal ratio diversity combining enhanced security. IEEE Commun. Lett 2011, 15(5):509-511.

    Article  Google Scholar 

  13. Sarkar MZI, Ratnarajah T: Enhancing security in correlated channel with maximal ratio combining diversity. IEEE Trans. on Signal Process 2012, 60(12):6745-6751.

    Article  MathSciNet  Google Scholar 

  14. Prabhu VU, Rodrigues MRD: On wireless channels with m-antenna eavesdroppers: characterization of the outage probability and ε -outage secrecy capacity. IEEE Trans. Inf. Forensics Secur 2011, 6(3):853-860.

    Article  Google Scholar 

  15. Mukherjee A, Swindlehurst AL: Robust beamforming for security in MIMO wiretap channels with imperfect CSI. IEEE Trans. Signal Process 2011, 59(1):351-361.

    Article  MathSciNet  Google Scholar 

  16. Alves H, Souza RD, Debbah M: Enhanced physical layer security through transmit antenna selection. In IEEE GlobeCOM Workshops (GC Wkshps), Texas, 5–9 December 2011. Houston, Tx; 2011:879-883.

    Chapter  Google Scholar 

  17. Alves H, Souza RD, Debbah M, Bennis M: Performance of transmit antenna selection physical layer security schemes. IEEE Signal Process. Lett 2012, 19(6):372-375.

    Article  Google Scholar 

  18. Yang N, Yeoh PL, Elkashlan M, Schober R, Collings IB: Transmit antenna selection for security enhancement in MIMO wiretap channels. IEEE Trans. on Commun 2013, 61(1):144-154.

    Article  Google Scholar 

  19. Yang N, Suraweera HA, Collings IB, Yuen C: Physical layer security of TAS/MRC with antenna correlation. IEEE Trans. Inf. Forensics Secur 2013, 8(1):254-259.

    Article  Google Scholar 

  20. Sun D, Benaboud H, Noufissa M, Li J: Exploring opportunistic scheduling in ad-hoc network with physical layer security. 2012 National Days of Network Security and Systems (JNS2), Marrakech, 20–21 April 2012 62-67.

    Chapter  Google Scholar 

  21. Shrestha AP, Kwak KS: Secure opportunistic scheduling with transmit antenna selection. In IEEE 24th International Symposium on Personal Indoor and Mobile Radio Communications PIMRC’13, London, 8–11 September 2013. London; 2013:461-465.

    Chapter  Google Scholar 

  22. Cho H, Andrews JG: Resource-redistributive opportunistic scheduling for wireless systems. IEEE Trans. Wireless Commun 2009, 8(7):3510-3522.

    Article  Google Scholar 

  23. Goldsmith A: Wireless Communications. New York: Cambridge University; 2005.

    Book  Google Scholar 

  24. Gradshteyn IS, Ryzhik IM: Table of Integrals, Series, and Products. New York: Academic; 2007.

    Google Scholar 

  25. David HA, Nagaraja HN: Order Statistics. Hoboken: Wiley; 2005.

    Google Scholar 

  26. Chen CJ, Wang LC: A unified capacity analysis for wireless systems with joint multiuser scheduling and antenna diversity in Nakagami fading channels. IEEE Trans. on Commun 2006, 54(3):469-478.

    Article  Google Scholar 

Download references

Acknowledgements

This research was supported by a grant (12-TI-C01) from Advanced Water Management Research Program funded by Ministry of Land, Infrastructure and Transport of the Korean government.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kyung Sup Kwak.

Additional information

Competing interests

The authors declare that they have no competing interests.

Authors’ original submitted files for images

Rights and permissions

Open Access This article is distributed under the terms of the Creative Commons Attribution 2.0 International License (https://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Reprints and permissions

About this article

Cite this article

Shrestha, A.P., Kwak, K.S. Performance of opportunistic scheduling for physical layer security with transmit antenna selection. J Wireless Com Network 2014, 33 (2014). https://doi.org/10.1186/1687-1499-2014-33

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1186/1687-1499-2014-33

Keywords