Average Secrecy Mutual Information of the Non-Identically Independently Distributed Hoyt Fading Wireless Channels
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33093
Average Secrecy Mutual Information of the Non-Identically Independently Distributed Hoyt Fading Wireless Channels

Authors: Md. Sohidul Islam, Mohammad Rakibul Islam

Abstract:

In this paper, we consider a non-identically independently distributed (non-i.i.d.) Hoyt fading single-input multiple-out put (SIMO) channel, where the transmitter sends some confidential information to the legitimate receiver in presence of an eavesdropper. We formulated the probability of non-zero secrecy mutual information; secure outage probability and average secrecy mutual information (SMI) for the SIMO wireless communication system. The calculation has been carried out using small limit argument approximation (SLAA) on zeroth-order modified Bessel function of first kind. In our proposed model, an eavesdropper observes transmissions of information through another Hoyt fading channel. First, we derived the analytical expression for non-zero secrecy mutual information. Then, we find the secure outage probability to investigate the outage behavior of the proposed model. Finally, we find the average secrecy mutual information. We consider that the channel state information (CSI) is known to legitimate receiver.

Keywords: Hoyt fading, main channel, eavesdropper channel, secure outage probability, average secrecy mutual information.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1111835

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1399

References:


[1] C. Shannon, “Communication theory of secrecy systems”, Bell System Technical Journal, 29, pp. 656–715, 1949.
[2] I. Csiszar and J. Korner, “Broadcast channels with confidential messages,” IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339–348, May 1978.
[3] M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, “Wireless information-theoretic security,” IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515–2534, 2008.
[4] Sarkar, M.Z.I.; Ratnarajah, T.,” Secure communication through Rayleigh fading SIMO Channel with multiple eavesdroppers”, International Conference on Communications (ICC), IEEE, 2010.
[5] Fraidenraich, Gustavo and Lévêque, Olivier and Cioffi, John M., “On the MIMO channel capacity for the dual and asymptotic cases over Hoyt channels.” IEEE Communications Letters,11, 2007, pp.31-33.
[6] M. K. Simon and M.S. Alouini, Digital Communication over Fading Channels, 2nd edition, New York. Wiley, 2000.
[7] A. M. Magableh and M. M. Matalgah, “Capacity of SIMO systems over non-identically independent nakagami-m channels,” in Proc. IEEE Sarnoff Symposium, April 2007, pp. 1–5.
[8] P. Wang, G. Yu, and Z. Zhang, “On the secrecy capacity of fading wireless channel with multiple eavesdroppers,” in Proc. IEEE Int. Symp. Inform. Theory (ISIT2007), Nice, France, 2007, pp. 1301–130.
[9] Md. Sohidul Islam and Mohammad Rakibul Islam, “Positive Secrecy Mutual Information over non-identically independently distributed Nakagami-q Fading Wireless Channel,” in proc. International Conference on Engineering, Research, Innovation and Education, p.477-482, Sylhet, 2013.