2016
DOI: 10.1109/tvt.2015.2412140
|View full text |Cite
|
Sign up to set email alerts
|

Physical-Layer Security Over Non-Small-Scale Fading Channels

Abstract: In this paper, we propose a comprehensive framework for performance analysis of secure communications over non-small scale fading channels. Considering the three different cases where the main and eavesdropper channels experience independent/correlated log-normal fading, or independent composite fading, we study secrecy capacity and secrecy outage (including the probability of non-zero secrecy capacity and secure outage probability), respectively. The approximated closed-form expressions for secrecy capacity, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

6
53
0
2

Year Published

2016
2016
2021
2021

Publication Types

Select...
7

Relationship

2
5

Authors

Journals

citations
Cited by 95 publications
(61 citation statements)
references
References 42 publications
6
53
0
2
Order By: Relevance
“…So far, most of the open literature on the secrecy performance analysis focused on particular fading channels, such as Rayleigh [3], [4], Nakagami-m [1], [5], [6], Weibull [7], [8], or log-normal [9]. Few works focus on the secrecy performance over generalized fading channels, except [10], [11], [12].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…So far, most of the open literature on the secrecy performance analysis focused on particular fading channels, such as Rayleigh [3], [4], Nakagami-m [1], [5], [6], Weibull [7], [8], or log-normal [9]. Few works focus on the secrecy performance over generalized fading channels, except [10], [11], [12].…”
Section: Introductionmentioning
confidence: 99%
“…SYSTEM MODEL We consider the classic Wyner's wiretap model, as assumed in [9], [10], [12]. It is assumed that all the channels experience independent α-µ fading and the CSI of all the channels is available at S since active eavesdropping is considered in our work.…”
Section: Introductionmentioning
confidence: 99%
“…Although the authors in [17], [18] used the exact PDF of the GK fading model to derive the SOP expression, the SOP expression was derived based on the assumption of a large average signal-to-noise ratio (SNR) of the wiretap channel, which means that the derived results will deviate the exact results significantly in the low SNR region of the wiretap channel. The secure approximation analysis in [19] for Log-normal and Log-normal-Rayleigh composite fading channels based on the work of [20] shows a strong robustness in the low variance region of the wiretap channel, where the difference calculation takes place of the integration calculation, resulting in a much faster computation for the SOP. Although the asymptotic SOP (ASOP) valid in the high SNR region of the main channel, showing the secrecy diversity order and array gain, was analyzed in [13], [15], the authors only considered a special parameter setting of GK fading, which cannot be used in the general GK fading case.…”
Section: Introductionmentioning
confidence: 99%
“…In this letter, we consider the approximation method proposed by [19], [20] to derive a simple and robust closedform expression for the SOP in the typical Wyner's three-node model over GK fading channels. When the average SNR of the main channel is sufficiently large, the asymptotic analysis in the general case is also presented to get the secrecy diversity order and array gain, which is useful and important for the secure system design.…”
Section: Introductionmentioning
confidence: 99%
“…We also can find that there is a mismatch between simulation and analytical results because of the adopted Fenton Wilkinson approximation [23] and the approximated result of the SOP in non-CR scenarios as suggested by Eq. (26) in [24].…”
Section: Numerical and Simulation Resultsmentioning
confidence: 99%