On Physical Layer Security of Double Rayleigh Fading Channels for Vehicular Communications
Summary (1 min read)
Introduction
- There is an increasing number of research exploring the physical layer secrecy performance of communication systems over different fading conditions.
- This motivates the research on vehicular communications from the perspective of communication security.
- Due to the high mobility of vehicles, the well-known channel models such as Rayleigh, Rician or Nakagami-m, Manuscript received February 8, 2018; revised April 24, 2018; accepted June 29, 2018.
II. CHANNEL AND SYSTEM MODELS
- The authors consider the classical Wyner’s wiretap model in their analysis [3].
- Under Wyner’s model, the vehicle S sends confidential information to the desired receiver D (another moving vehicle in V2V scenario) whereas the eavesdropper vehicle E tries to intercept the information by decoding its received signal.
- Personal use is permitted, but republication/redistribution requires IEEE permission.
- Range of protected zone as proposed in [6] while the upper limit R2 is the maximum transmission distance due to S’s coverage limit.
B. Average Secrecy Capacity
- The average secrecy capacity Cs can be obtained from [17].
- The second term of (8) demonstrates the impact of the location uncertainty of node E on the ASC, where the parameter R2−R12 represents the mean uncertainty range and R2+R12 denotes the mean distance to the source node S. From (8), the effects of eavesdropper’s location uncertainty on the ASC can be readily evaluated.
- Next, the authors consider the following special cases to provide more insights.
- Personal use is permitted, but republication/redistribution requires IEEE permission.
IV. NUMERICAL RESULTS AND DISCUSSION
- It can be observed that the ASC performance can be improved by increasing the transmit SNR within the low transmit SNR region, whereas the transmit SNR has a limited impact on the ASC in the high transmit SNR region, which is clearly independent of the transmit SNR and is theoretically verified in Lemma 2.
- This reveals that the secrecy capacity limit does not depend on the transmit SNR but the relative locations of the nodes, which is confirmed in Fig.
- Figure 3 depicts the ASC versus the path loss exponent with fixed values of input SNR.
- Additionally, it is observed that under the condition of eavesdropper location uncertainty, the uncertainty range R2−R12 poses a greater impact on the ASC when the mean uncertainty distance R2+R12 is small.
- Personal use is permitted, but republication/redistribution requires IEEE permission.
V. CONCLUSION
- The physical layer secrecy capacity over double Rayleigh fading channels were derived and analyzed.
- The obtained results can be used for the secrecy capacity analysis for V2V and M2M communications as well as for keyhole channels.
Did you find this useful? Give us your feedback
Citations
104 citations
Cites background from "On Physical Layer Security of Doubl..."
...Motivated by the latest advances in physical layer security analysis [11], [15]–[18] and the potential of the hybrid satellite-FSO system in various scenarios, we study the secrecy performance of satellite-FSO cooperative system for both the cases of amplify-and-forward (AF) and decode-andforward (DF) relayings in this paper....
[...]
...The instantaneous secrecy capacity of the considered system is mathematically expressed as C s = max{ln(1 + γeq) − ln(1 + γE ), 0} [18]....
[...]
...In the active eavesdropping scenario, full CSI of both the main and eavesdropper channels is available to the node S, which can adapt the achievable secrecy rate accordingly [18]....
[...]
92 citations
Cites background from "On Physical Layer Security of Doubl..."
...Significant research efforts have been expended in studying vehicular networks with [11] or without PLS [12]–[15]....
[...]
...The terms hi,n = √ gi,nr −β i , i ∈ {D,E}, is the channel coefficient from S to the receiving vehicles D and E, where ri is the V2V link distance, β is the path-loss exponent and gi,n is the channel gain from the RIS to the receiver, following independent double Rayleigh fading [11]....
[...]
...The vehicles D and E are known to lie within a certain radius from S, the precise relative distances of the V2V links are unknown during transmission, which is a realistic assumption for a network of this nature [11], [19]....
[...]
63 citations
Cites background from "On Physical Layer Security of Doubl..."
..., vehicular-toinfrastructure (V2I)) [8]....
[...]
...For the link between vehicles S and E, the double-bounce scattering components caused by scatterers around both vehicles’ local environments lead to a cascaded Rayleigh fading process [8]....
[...]
48 citations
45 citations
Cites background from "On Physical Layer Security of Doubl..."
...In [7], the ASC performance over double-Rayleigh fading channel under the vehicular communication scenario was studied....
[...]
References
17,608 citations
[...]
11,190 citations
7,538 citations
389 citations
"On Physical Layer Security of Doubl..." refers background or methods in this paper
...Instead, double Rayleigh fading has been proposed as a more precise characterization of the dynamic non line-of-sight (NLOS) vehicular links based on both field measurement and theoretical analysis in [9]–[11] and the references therein, where the double-bounce scattering components caused by scatterers around both the transmitter’s and receiver’s local environments lead to a cascaded Rayleigh fading processes [11]....
[...]
...Due to the high mobility of vehicles, the well-known channel models such as Rayleigh, Rician or Nakagami-m, which were initially proposed for stationary communication links, do not fit well for a lot of V2V channel measurements [9]–[11]....
[...]
336 citations
Related Papers (5)
Frequently Asked Questions (12)
Q2. What is the channel gain for transmission distance between nodes S and X?
Incorporating the effects of small-scale fading and path loss, the channel gain for transmission distance dX between nodes S and X can be further expressed as follows [14]:hX = gX√1 + dαX , (2)where gX represents the channel gain following double Rayleigh distribution and α denotes the path loss exponent.
Q3. What is the effect of uncertainty on the ASC?
it is observed that under the condition of eavesdropper location uncertainty, the uncertainty range R2−R12 poses a greater impact on the ASC when the mean uncertainty distance R2+R12 is small.
Q4. What is the eavesdropper’s distance between nodes?
(3)With gX being double Rayleigh distributed, the probability density function (PDF) f|gX |2(x) and cumulative distribution function (CDF) F|gX |2(x) of the random variable (RV) |gX |2 are given by [15]f|gX |2(x)=2K0(2 √ x), F|gX |2(x)=1− 2 √ xK1(2 √ x). (4)Since the distance dD is a constant known to node S, the CDF FγD (γ) of the instantaneous SNR γD can be readily derived by applying the change of RVs and written as [15]
Q5. What is the definition of the ASC under the location uncertainty?
Remark 1: Observing (8), the ASC under the eavesdropper location uncertainty is bounded by the first term, which is only related to the legitimate node D. Indeed, the ASC is always less than the capacity of the legitimate channel capacity.
Q6. What is the signal-to-noise ratio for the transmission of information between nodes?
From (2), the instantaneous signal-to-noise ratio (SNR) received at node X, X ∈ {D,E}, can be expressed asγX = |hX |2Es N0 = |gX |2Es (1 + dαX)N0 .
Q7. What is the purpose of this letter?
The obtained results can be used for the secrecy capacity analysis for V2V and M2M communications as well as for keyhole channels.
Q8. What is the corresponding value of the ASC?
It can be observed that the ASC performance can be improved by increasing the transmit SNR within the low transmit SNR region, whereas the transmit SNR has a limited impact on the ASC in the high transmit SNR region, which is clearly independent of the transmit SNR and is theoretically verified in Lemma 2.
Q9. what is the secrecy capacity of the system?
2,2:2,0:2,0 3,3:0,2:0,2 ( a2|b|c| 1, ρ1) · π√ρ1+π √ ρ1G 2,2:2,0:2,0 3,3:0,2:0,2 ( a2−1|b|c| 1, ρ1 ) −ln(ν)√ρ2 ·G 2,22,2 ( ρ2| a1 ) + π √ ρ2G 2,2:2,0:2,0 3,3:0,2:0,2 ( a2|b|c| 1, ρ2) + π √ ρ2G 2,2:2,0:2,0 3,3:0,2:0,2 ( a2 − 1|b|c| 1, ρ2 ) − 2C, (10)where a1 = (−0.5,−0.5 0.5,−0.5 ) , a2 = (−0.5,−0.5,−1 −0.5,−0.5,−1 ) , b= ( − 0, 0 ) ,c= ( − 0.5,−0.5 ) , µ = 1(1+dαD) , ν = 1 (1+dαE) , ρ1 = µν , ρ2 = ν µ .
Q10. What is the average secrecy capacity of the system?
Lemma 2: When the node S has information on the position of node E and the transmit SNR EsN0 → ∞, the asymptotic ASC Cs can be calculated as Cs = ln(µ)[1− √ ρ1G 2,2 2,2 ( ρ1| a1 )] +G
Q11. What is the effect of the location uncertainty on the ASC?
The second term of (8) demonstrates the impact of the location uncertainty of node E on the ASC, where the parameter R2−R12 represents the mean uncertainty range and R2+R12 denotes the mean distance to the source node S. From (8), the effects of eavesdropper’s location uncertainty on the ASC can be readily evaluated.
Q12. What is the definition of the distance between nodes?
Proposition 1: The CDF FγE (γ) of the instantaneous SNR γE received by node E given that its distance to node S is any distance between R1 and R2 with equal probability, can be closely approximated numerically by the expression in (6) at the top of next page, where wι and tι are the weights and abscissas detailed in [16, Eq. 25.4.30].