Abstract

We investigate individual secrecy performance in a K-user quasi-static Rayleigh fading homogeneous multiple access wiretap channel (MAC-WT), where a legitimate receiver employs successive interference cancellation (SIC) decoding. We first evaluate individual secrecy performance under an arbitrary SIC order by deriving closed-form expressions with respect to secrecy outage probability and effective secrecy throughput (EST) as main metrics. The resulting closed-form expressions disclose a significant impact on the secrecy performance from the order of SIC decoding. Therefore, we propose three SIC decoding order scheduling schemes: (1) round-robin scheme, absolutely fair and served as a benchmark; (2) suboptimal scheme, based on each user’s main channel condition; and (3) optimal scheme, based on each user’s achievable secrecy rate. Comparison results show that the last two schemes outperform the first one with regard to both the EST and the multi-user diversity gain, whereas the performance of the suboptimal scheme is highly close to that of the optimal scheme which is usually impractical due to a requirement for the eavesdropper’s channel state information (CSI).

Highlights

  • Since Wyner introduced the notion of the wiretap channel in his seminal work [1], the studies of keyless physical-layer secrecy transmission have made tremendous progress

  • We later complicated the eavesdropper setting from a single-antenna to multi-antenna scenario in [40], where, besides the derivations of individual secrecy performance, we further proposed one successive interference cancellation (SIC) order scheduling scheme based on each user’s relative distance to the eavesdropper over the legitimate receiver, and gave a solution to the problem of uplink optimal power allocation

  • Different from issues of the MISO wiretap channel in [6, 47,48,49], we focus on the impact of the SIC order on the individual secrecy performance

Read more

Summary

Introduction

Since Wyner introduced the notion of the wiretap channel in his seminal work [1], the studies of keyless physical-layer secrecy transmission have made tremendous progress. Hassan Zivari-Fard et al [23] investigated a 2-user MAC-WT with a common message which can be decoded by both the legitimate receiver and the eavesdropper, and derived general inner and outer bounds on a secrecy capacity region for both discrete memoryless and Gaussian cases. We later complicated the eavesdropper setting from a single-antenna to multi-antenna scenario in [40], where, besides the derivations of individual secrecy performance, we further proposed one SIC order scheduling scheme based on each user’s relative distance to the eavesdropper over the legitimate receiver, and gave a solution to the problem of uplink optimal power allocation. The main contributions of the paper are summarized as follows: 1) Model the fading homogeneous MAC-WT and derive closed-form expressions of the cumulative distribution function (CDF) of signal-to-interference-plus-noise ratios (SINRs) for any individual transmitter at the legitimate receiver and the eavesdropper, respectively. Thereby, in this MAC-WT channel, the instantaneous achievable individual secrecy rate with SIC can be formulated as [21, 50]

Statistics of SINRs
Other secrecy performance metrics
Round-robin scheme
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call