Secrecy Capacity Analysis over α−μ Fading Channels
dc.contributor.author | Lei, Hongjiang | |
dc.contributor.author | Ansari, Imran Shafique | |
dc.contributor.author | pan, Gaofeng | |
dc.contributor.author | Alomair, Basel | |
dc.contributor.author | Alouini, Mohamed-Slim | |
dc.date.accessioned | 2017-02-26T06:34:21Z | |
dc.date.available | 2017-02-26T06:34:21Z | |
dc.date.issued | 2017-02-15 | |
dc.identifier.citation | Lei H, Ansari IS, Pan G, Alomair B, Alouini M-S (2017) Secrecy Capacity Analysis over α−μ Fading Channels. IEEE Communications Letters: 1–1. Available: http://dx.doi.org/10.1109/LCOMM.2017.2669976. | |
dc.identifier.issn | 1089-7798 | |
dc.identifier.doi | 10.1109/LCOMM.2017.2669976 | |
dc.identifier.uri | http://hdl.handle.net/10754/622927 | |
dc.description.abstract | In this work, we study the secrecy capacity of the classic Wyner’s model over the α − μ fading channels, where α and μ specify the nonlinearity and clustering of fading channels, respectively. The average secrecy capacity (ASC) is derived in closed-form by using the extended generalized bivariate Fox’s Hfunction (EGBFHF). Moreover, the asymptotic analysis of ASC in high signal-to-noise ratio (SNR) regime is conducted. The asymptotic results unveil that the ASC follows the scaling law of Θ(ln p), where p stands for the ratio between the average powers of main channels and eavesdropping channels. Moreover, the ASC can be enhanced by increasing the transmit SNR, while there exists a ceiling of ASC as the SNRs at both sides are improved simultaneously. The accuracy of the analytical results is validated by Monte-Carlo simulations. The numerical results show that rigorous fading channels are beneficial to the secrecy performance, that is, serious nonlinearity (small α) and sparse clustering (small μ) will lead to the improvement of ASC. | |
dc.description.sponsorship | This work was supported in part by the National Natural Science Foundation of China (NSFC) under Grant 61471076, 61401372, the Project of Fundamental and Frontier Research Plan of Chongqing under Grant cstc2015jcyjBX0085, and the Scientific and Technological Research Program of Chongqing Municipal Education Commission under Grant KJ1600413. | |
dc.publisher | Institute of Electrical and Electronics Engineers (IEEE) | |
dc.relation.url | http://ieeexplore.ieee.org/document/7856980/ | |
dc.rights | (c) 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. | |
dc.subject | extended generalized bivariate Fox’s Hfunction | |
dc.subject | Physical layer security | |
dc.subject | average secrecy capacity | |
dc.subject | − μ fading channel | |
dc.title | Secrecy Capacity Analysis over α−μ Fading Channels | |
dc.type | Article | |
dc.contributor.department | Computer, Electrical and Mathematical Sciences and Engineering (CEMSE) Division | |
dc.contributor.department | Electrical Engineering Program | |
dc.identifier.journal | IEEE Communications Letters | |
dc.eprint.version | Post-print | |
dc.contributor.institution | Chongqing Key Lab of Mobile Communications Technology, Chongqing University of Posts and Communications, Chongqing 400065, China | |
dc.contributor.institution | Department of Electrical and Computer Engineering (ECEN), Texas A&M University at Qatar (TAMUQ), Education City, Doha, Qatar | |
dc.contributor.institution | Chongqing Key Laboratory of Nonlinear Circuits and Intelligent Information Processing, Southwest University, Chongqing, 400715, China | |
dc.contributor.institution | National Center for Cybersecurity Technology (C4C), King Abdulaziz City for Science and Technology (KACST), Riyadh 11442, Saudi Arabia | |
kaust.person | Lei, Hongjiang | |
kaust.person | Alouini, Mohamed-Slim | |
refterms.dateFOA | 2018-06-13T16:11:54Z | |
dc.date.published-online | 2017-02-15 | |
dc.date.published-print | 2017-06 |
Files in this item
This item appears in the following Collection(s)
-
Articles
-
Electrical and Computer Engineering Program
For more information visit: https://cemse.kaust.edu.sa/ece -
Computer, Electrical and Mathematical Science and Engineering (CEMSE) Division
For more information visit: https://cemse.kaust.edu.sa/