论文标题
$κ$ - $μ$阴影褪色渠道的信息理论安全性
Information-Theoretic Security of MIMO Networks under $κ$-$μ$ Shadowed Fading Channels
论文作者
论文摘要
本文研究了现实的繁殖条件对在窃听者存在下多输入多输出系统可实现的保密性能的影响。具体而言,我们专注于$κ$ - $μ$阴影褪色的模型,因为其物理基础捕获了广泛的传播条件,与此同时,它允许比其他最先进的褪色模型更好地拖延。通过考虑合法和窃听的接收器方面的发射天线选择和最大比率组合接收,我们研究了两个相关的方案$(i)$ $(i)$不知道窃听的通道状态信息(CSI)和$(ii)$ $(ii)$ csi csi csi csi csi eavesdropper链接的发射机知识。为此,我们首先获得了与合法路径相关的最大和相同分布(i.i.d.)变体的最大统计数据的新颖和可进行的表达式。基于这些结果,我们得出了保密中断概率(SOP)和平均保密能力(ASC)的新型闭合表达式,以评估被动和主动窃听场景中的保密性能。此外,我们在高信噪比方面开发了SOP和ASC的分析渐近表达。在所有情况下,保密性能指标均以封闭形式为特征,而无需评估Meijer或Fox功能。还提供了一些有用的见解,这些见解还提供了如何提供保密性能的不同传播条件和天线的数量。
This paper investigates the impact of realistic propagation conditions on the achievable secrecy performance of multiple-input multiple-output systems in the presence of an eavesdropper. Specifically, we concentrate on the $κ$-$μ$ shadowed fading model because its physical underpinnings capture a wide range of propagation conditions, while, at the same time, it allows for much better tractability than other state-of-the-art fading models. By considering transmit antenna selection and maximal ratio combining reception at the legitimate and eavesdropper's receiver sides, we study two relevant scenarios $(i)$ the transmitter does not know the eavesdropper's channel state information (CSI), and $(ii)$ the transmitter has knowledge of the CSI of the eavesdropper link. For this purpose, we first obtain novel and tractable expressions for the statistics of the maximum of independent and identically distributed (i.i.d.) variates related to the legitimate path. Based on these results, we derive novel closed-form expressions for the secrecy outage probability (SOP) and the average secrecy capacity (ASC) to assess the secrecy performance in passive and active eavesdropping scenarios, respectively. Moreover, we develop analytical asymptotic expressions of the SOP and ASC at the high signal-to-noise ratio regime. In all instances, secrecy performance metrics are characterized in closed-form, without requiring the evaluation of Meijer or Fox functions. Some useful insights on how the different propagation conditions and the number of antennas impact the secrecy performance are also provided.