Skip to main content
Erschienen in: Wireless Personal Communications 4/2024

17.05.2024 | Research

Secret DMT Analysis for a Multiuser MIMO Fading Channel

verfasst von: Atefeh Roostaei, Mostafa Derakhtian

Erschienen in: Wireless Personal Communications | Ausgabe 4/2024

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In wireless communications, eavesdropping is a threat due to the broadcast nature of the channel. Therefore, in addition to the rate and the error probability, the secrecy level should be considered in design and analysis of a system. In this study, by the error probability and the channel outage analysis, we derive the secret diversity-multiplexing tradeoff (DMT) for a multiuser multiple-input multiple-output (MIMO) fading channel. We consider two multiuser schemes, multiple-access channel and user-selection. Secret DMT characterizes the relation of the error probability, the secrecy and the rate of the system at high signal-to-noise ratio (SNR). We quantify how the number of users and antennas at all the nodes affects the secret DMT performance of the system.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Literatur
2.
Zurück zum Zitat Hamamreh, J. M., Furqan, H. M., & Arslan, H. (2019). Classifications and applications of physical layer security techniques for confidentiality, a comprehensive survey. IEEE Communications Surveys & Tutorials, 21(2), 1773–1828.CrossRef Hamamreh, J. M., Furqan, H. M., & Arslan, H. (2019). Classifications and applications of physical layer security techniques for confidentiality, a comprehensive survey. IEEE Communications Surveys & Tutorials, 21(2), 1773–1828.CrossRef
3.
Zurück zum Zitat Liu, Y., Chen, H.-H., & Wang, L. (2017). Physical layer security for next generation wireless networks: Theories, technologies, and challenges. IEEE Communications Surveys & Tutorials, 19(1), 347–376.CrossRef Liu, Y., Chen, H.-H., & Wang, L. (2017). Physical layer security for next generation wireless networks: Theories, technologies, and challenges. IEEE Communications Surveys & Tutorials, 19(1), 347–376.CrossRef
5.
Zurück zum Zitat Leung-Yan-Cheong, S. K., & Hellman, M. E. (1978). The Gaussian wire-tap channel. IEEE Transactions on Information Theory, 24(4), 451–456.MathSciNetCrossRef Leung-Yan-Cheong, S. K., & Hellman, M. E. (1978). The Gaussian wire-tap channel. IEEE Transactions on Information Theory, 24(4), 451–456.MathSciNetCrossRef
6.
Zurück zum Zitat Tekin, E., & Yener, A. (2008). The Gaussian multiple access wire-tap channel. IEEE Transactions on Information Theory, 54(12), 5747–5755.MathSciNetCrossRef Tekin, E., & Yener, A. (2008). The Gaussian multiple access wire-tap channel. IEEE Transactions on Information Theory, 54(12), 5747–5755.MathSciNetCrossRef
7.
Zurück zum Zitat Shafiee, S., Liu, N., & Ulukus, S. (2009). Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: The 2-2-1 channel. IEEE Transactions on Information Theory, 55(9), 4033–4039.MathSciNetCrossRef Shafiee, S., Liu, N., & Ulukus, S. (2009). Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: The 2-2-1 channel. IEEE Transactions on Information Theory, 55(9), 4033–4039.MathSciNetCrossRef
8.
Zurück zum Zitat Khisti, A., & Wornell, G. W. (2010). Secure transmission with multiple antennas-II: The MIMOME wiretap channel. IEEE Transactions on Information Theory, 56(11), 5515–5532.MathSciNetCrossRef Khisti, A., & Wornell, G. W. (2010). Secure transmission with multiple antennas-II: The MIMOME wiretap channel. IEEE Transactions on Information Theory, 56(11), 5515–5532.MathSciNetCrossRef
9.
Zurück zum Zitat Ragheb, M., Kuhestani, A., Kazemi, M., Ahmadi, H., & Hanzo, L. (2024). RIS-aided secure millimeter-wave communication under RF-chain impairments. IEEE Transactions on Vehicular Technology, 73(1), 952–963.CrossRef Ragheb, M., Kuhestani, A., Kazemi, M., Ahmadi, H., & Hanzo, L. (2024). RIS-aided secure millimeter-wave communication under RF-chain impairments. IEEE Transactions on Vehicular Technology, 73(1), 952–963.CrossRef
10.
Zurück zum Zitat Forouzesh, M., Samsami Khodadad, F., Azmi, P., Kuhestani, A., & Ahmadi, H. (2023). Simultaneous secure and covert transmissions against two attacks under practical assumptions. IEEE Internet of Things Journal, 10(12), 10160–10171.CrossRef Forouzesh, M., Samsami Khodadad, F., Azmi, P., Kuhestani, A., & Ahmadi, H. (2023). Simultaneous secure and covert transmissions against two attacks under practical assumptions. IEEE Internet of Things Journal, 10(12), 10160–10171.CrossRef
11.
Zurück zum Zitat Gopala, P. K., Lai, L., & Gamal, H. E. (2008). On the secrecy of capacity of fading channels. IEEE Transactions on Information Theory, 54(10), 4687–4698.MathSciNetCrossRef Gopala, P. K., Lai, L., & Gamal, H. E. (2008). On the secrecy of capacity of fading channels. IEEE Transactions on Information Theory, 54(10), 4687–4698.MathSciNetCrossRef
12.
Zurück zum Zitat Liang, Y., Poor, H. V., & Shamai, S. (2008). Secure communication over fading channels. IEEE Transactions on Information Theory, 54(6), 2470–2492.MathSciNetCrossRef Liang, Y., Poor, H. V., & Shamai, S. (2008). Secure communication over fading channels. IEEE Transactions on Information Theory, 54(6), 2470–2492.MathSciNetCrossRef
13.
Zurück zum Zitat Allen, T., Tajer, A., & Al-Dhahir, N. (2017). Secure alamouti MAC transmissions. IEEE Transactions on Wireless Communications, 16(6), 3674–3687.CrossRef Allen, T., Tajer, A., & Al-Dhahir, N. (2017). Secure alamouti MAC transmissions. IEEE Transactions on Wireless Communications, 16(6), 3674–3687.CrossRef
14.
Zurück zum Zitat Mobini, Z. (2020). Secrecy performance of non-orthogonal multiple access cognitive untrusted relaying with friendly jamming. AEU International Journal of Electronics and Communications, 118, 153–156.CrossRef Mobini, Z. (2020). Secrecy performance of non-orthogonal multiple access cognitive untrusted relaying with friendly jamming. AEU International Journal of Electronics and Communications, 118, 153–156.CrossRef
15.
Zurück zum Zitat Salem, A., Musavian, L., Jorswieck, E. A., & Aïssa, S. (2020). Secrecy outage probability of energy-harvesting cooperative NOMA transmissions with relay selection. IEEE Transactions on Green Communications and Networking, 4(4), 1130–1148.CrossRef Salem, A., Musavian, L., Jorswieck, E. A., & Aïssa, S. (2020). Secrecy outage probability of energy-harvesting cooperative NOMA transmissions with relay selection. IEEE Transactions on Green Communications and Networking, 4(4), 1130–1148.CrossRef
16.
Zurück zum Zitat Li, M., Yin, H., Huang, Y., Wang, Y., & Yu, R. (2019). The security of cognitive multiuser networks over space-and-time correlated channels. IEEE Systems Journal, 13(3), 2806–2817.CrossRef Li, M., Yin, H., Huang, Y., Wang, Y., & Yu, R. (2019). The security of cognitive multiuser networks over space-and-time correlated channels. IEEE Systems Journal, 13(3), 2806–2817.CrossRef
17.
Zurück zum Zitat Son, W., Nam, H., Shin, W.-Y., & Jung, B. C. (2021). Secrecy outage analysis of multiuser downlink wiretap networks with potential eavesdroppers. IEEE Systems Journal, 15(2), 3093–3096.CrossRef Son, W., Nam, H., Shin, W.-Y., & Jung, B. C. (2021). Secrecy outage analysis of multiuser downlink wiretap networks with potential eavesdroppers. IEEE Systems Journal, 15(2), 3093–3096.CrossRef
18.
Zurück zum Zitat Namadchi, F., Ghanami, F., & Hodtani, G. A. (2020). On the secrecy rate region and outage probability of secondary wiretap multiple access channel over dissimilar Rayleigh/Nakagami fading. Physical Communication, 41, 101117.CrossRef Namadchi, F., Ghanami, F., & Hodtani, G. A. (2020). On the secrecy rate region and outage probability of secondary wiretap multiple access channel over dissimilar Rayleigh/Nakagami fading. Physical Communication, 41, 101117.CrossRef
19.
Zurück zum Zitat Choi, J., Joung, J., & Jung, B. C. (2021). Space–time line code for enhancing physical layer security of multiuser MIMO uplink transmission. IEEE Systems Journal, 15(3), 3336–3347.CrossRef Choi, J., Joung, J., & Jung, B. C. (2021). Space–time line code for enhancing physical layer security of multiuser MIMO uplink transmission. IEEE Systems Journal, 15(3), 3336–3347.CrossRef
20.
Zurück zum Zitat Kuhestani, A., Mohammadi, A., & Yeoh, P. L. (2018). Security-reliability trade-off in cyber-physical cooperative systems with non-ideal untrusted relaying. In IEEE 4th world forum on Internet of Things (WF-IoT) (pp. 552–557). Kuhestani, A., Mohammadi, A., & Yeoh, P. L. (2018). Security-reliability trade-off in cyber-physical cooperative systems with non-ideal untrusted relaying. In IEEE 4th world forum on Internet of Things (WF-IoT) (pp. 552–557).
21.
Zurück zum Zitat Yuksel, M., & Erkip, E. (2011). Diversity-Multiplexing tradeoff for the multiple-antenna wire-tap channel. IEEE Transactions on Wireless Communications, 10(3), 762–771.CrossRef Yuksel, M., & Erkip, E. (2011). Diversity-Multiplexing tradeoff for the multiple-antenna wire-tap channel. IEEE Transactions on Wireless Communications, 10(3), 762–771.CrossRef
22.
Zurück zum Zitat Tekin, E., Serbetli, S., & Yener, A. (2005). On secure signaling for the Gaussian multiple access wire-tap channel. In Proceedings of 39th Asilomar conference on signals, systems and computers (pp. 1747–1751). Tekin, E., Serbetli, S., & Yener, A. (2005). On secure signaling for the Gaussian multiple access wire-tap channel. In Proceedings of 39th Asilomar conference on signals, systems and computers (pp. 1747–1751).
23.
Zurück zum Zitat Tse, D. N. C., Viswanath, P., & Zheng, L. (2004). Diversity-multiplexing tradeoff in multiple-access channels. IEEE Transactions on Information Theory, 50(9), 1859–1874.MathSciNetCrossRef Tse, D. N. C., Viswanath, P., & Zheng, L. (2004). Diversity-multiplexing tradeoff in multiple-access channels. IEEE Transactions on Information Theory, 50(9), 1859–1874.MathSciNetCrossRef
24.
Zurück zum Zitat Li, B., Zou, Y., Zhou, J., Wang, F., Cao, W., & Yao, Y.-D. (2019). Secrecy outage probability analysis of friendly jammer selection aided multiuser scheduling for wireless networks. IEEE Transactions on Communications, 67(5), 3482–3495.CrossRef Li, B., Zou, Y., Zhou, J., Wang, F., Cao, W., & Yao, Y.-D. (2019). Secrecy outage probability analysis of friendly jammer selection aided multiuser scheduling for wireless networks. IEEE Transactions on Communications, 67(5), 3482–3495.CrossRef
25.
Zurück zum Zitat Zou, Y., & Zhu, J. (2016). Intercept probability analysis of joint user-jammer selection against eavesdropping. In IEEE global communications conference (GLOBECOM) (pp. 1–6). Zou, Y., & Zhu, J. (2016). Intercept probability analysis of joint user-jammer selection against eavesdropping. In IEEE global communications conference (GLOBECOM) (pp. 1–6).
26.
Zurück zum Zitat Tang, T. -w., Tien, H. -t., & Lu, H. -f. (2014). Coding schemes with constant sphere-decoding complexity and high DMT performance for MIMO multiple access channels with low-rate feedback. In IEEE international symposium on information theory (pp. 1902–1906). Tang, T. -w., Tien, H. -t., & Lu, H. -f. (2014). Coding schemes with constant sphere-decoding complexity and high DMT performance for MIMO multiple access channels with low-rate feedback. In IEEE international symposium on information theory (pp. 1902–1906).
27.
Zurück zum Zitat Zheng, L., & Tse, D. N. C. (2003). Diversity and multiplexing: A fundamental tradeoff in multiple-antenna channels. IEEE Transactions on Information Theory, 49(5), 1073–1096.CrossRef Zheng, L., & Tse, D. N. C. (2003). Diversity and multiplexing: A fundamental tradeoff in multiple-antenna channels. IEEE Transactions on Information Theory, 49(5), 1073–1096.CrossRef
28.
Zurück zum Zitat Roostaei, A., & Derakhtian, M. (2017). Diversity-multiplexing tradeoff in an interweave multiuser cognitive radio system. IEEE Transactions on Wireless Communications, 16(1), 389–399.CrossRef Roostaei, A., & Derakhtian, M. (2017). Diversity-multiplexing tradeoff in an interweave multiuser cognitive radio system. IEEE Transactions on Wireless Communications, 16(1), 389–399.CrossRef
29.
Zurück zum Zitat Narasimhan, R. (2006). Finite SNR diversity multiplexing tradeoff for correlated Rayleigh and Rician MIMO channels. IEEE Transactions on Information Theory, 52(9), 3965–3979.MathSciNetCrossRef Narasimhan, R. (2006). Finite SNR diversity multiplexing tradeoff for correlated Rayleigh and Rician MIMO channels. IEEE Transactions on Information Theory, 52(9), 3965–3979.MathSciNetCrossRef
30.
Zurück zum Zitat Chang, W., Chung, S. -y., & Lee, Y. H. (2006). Diversity-multiplexing tradeoff in rank-deficient and spatially correlated MIMO channels. In IEEE international symposium on information theory, Seattle, WA, USA (pp. 1144–1148). Chang, W., Chung, S. -y., & Lee, Y. H. (2006). Diversity-multiplexing tradeoff in rank-deficient and spatially correlated MIMO channels. In IEEE international symposium on information theory, Seattle, WA, USA (pp. 1144–1148).
31.
Zurück zum Zitat Rezki, Z., Haccoun, D., Gagnon, F., & Ajib, W. (2008). Impact of spatial correlation on the finite-SNR diversity-multiplexing tradeoff. IEEE Transactions on Wireless Communications, 7(4), 1184–1189.CrossRef Rezki, Z., Haccoun, D., Gagnon, F., & Ajib, W. (2008). Impact of spatial correlation on the finite-SNR diversity-multiplexing tradeoff. IEEE Transactions on Wireless Communications, 7(4), 1184–1189.CrossRef
32.
Zurück zum Zitat Cover, T. M., & Thomas, J. A. (1991). Elements of information theory. New York: Wiley. Cover, T. M., & Thomas, J. A. (1991). Elements of information theory. New York: Wiley.
33.
Zurück zum Zitat Telatar, I. E. (1999). Capacity of multi-antenna Gaussian channels. European Transactions on Telecommunications, 10, 585–595.MathSciNetCrossRef Telatar, I. E. (1999). Capacity of multi-antenna Gaussian channels. European Transactions on Telecommunications, 10, 585–595.MathSciNetCrossRef
34.
Zurück zum Zitat David, H., & Nagaraja, H. (2003). Order statistics (3rd ed.). New York: Wiley.CrossRef David, H., & Nagaraja, H. (2003). Order statistics (3rd ed.). New York: Wiley.CrossRef
Metadaten
Titel
Secret DMT Analysis for a Multiuser MIMO Fading Channel
verfasst von
Atefeh Roostaei
Mostafa Derakhtian
Publikationsdatum
17.05.2024
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 4/2024
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-024-11176-2

Weitere Artikel der Ausgabe 4/2024

Wireless Personal Communications 4/2024 Zur Ausgabe