Araştırma Makalesi
BibTex RIS Kaynak Göster

Secrecy Outage Probability of Modified TAS/Alamouti-STBC Schemes under Pilot Contamination Attacks

Yıl 2019, Cilt: 23 Sayı: 1, 94 - 105, 01.02.2019
https://doi.org/10.16984/saufenbilder.453314

Öz

Modified transmit antenna selection (M-TAS)/Alamouti orthogonal space-time
block coding (STBC) schemes have been shown to achieve superior error
performance together with a reduced-rate feedback channel in the presence of
feedback imperfections when compared to the conventional TAS/Alamouti-STBC
schemes. By shifting the focus of the investigation, this paper answers the
query on whether the modified schemes provide enhancements in also the secrecy
outage probability (SOP) performance of multi-antenna schemes in wiretap
channels. The exact expressions of the SOP for the modified TAS/Alamouti-STBC
schemes in Rayleigh fading channels have been derived and validated via Monte
Carlo simulations. Additionally, the deteriorating effects of active
eavesdropping has been demonstrated by simulating the pilot contamination
attacks (PCAs) on the feedback channel. The extensive investigation and
comparisons to the conventional schemes have shown that M-TAS/Alamouti-STBC schemes employed at the transmission end of the
legitimate link provide considerable enhancements in the secrecy rates of
wireless communications systems in the presence of PCAs.

Kaynakça

  • C. E. Shannon, “Communication theory of secrecy systems,” Bell Syst. Technol. J., vol. 28, pp. 656-715, Oct. 1949.
  • B. Schneier, “Cryptographic design vulnerabilities,” Comput., vol. 31, no. 9, pp. 29-33, Sep. 1998.
  • A. Wyner, “The wire-tap channel,” Bell Syst. Technol. J., vol. 54, no. 8, pp. 1355-1-387, Oct. 1975.
  • S. K. Leung-Yan-Cheong, and M. E. Hellman, “The Gaussian wire-tap channel,” IEEE Trans. Inf. Theory, vol. 24, no. 4, pp. 451-456, July 1978.
  • X. Zhou, B. Maham and A. Hjørungnes, “Pilot Contamination for Active Eavesdropping,” IEEE Trans. Wire. Commun., vol. 11, no. 3, pp. 903-907, March 2012.
  • A. Khisti and G. W. Wornell, “Secure transmission with multiple antennas - part I: the MISOME wire-tap channel,” IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3088-3104, July 2010.
  • A. Khisti and G. W. Wornell, “Secure transmission with multiple antennas - part II: the MIMOME wire-tap channel,” IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515-5532, Nov. 2010.
  • F. Oggier and B. Hassibi, “The secrecy capacity of the MIMO wiretap channel,” IEEE Trans. Inf. Theory, vol. 57, no. 8, pp. 4961-4972, Aug. 2011.
  • F. He, H. Man, and W. Wang, “Maximal ratio diversity combining enhanced security,” IEEE Commun. Lett., vol. 15, no. 5, pp. 509-511, May 2011.
  • V. U. Prabhu and M. R. D. Rodrigues, “On wireless channels with M-antenna eavesdroppers: characterization of the outage probability and ε-outage secrecy capacity,” IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 853-860, Sep. 2011.
  • A. Mukherjee and A. L. Swindlehurst, “Robust beamforming for security in MIMO wiretap channels with imperfect CSI,” IEEE Trans. Signal Process., vol. 59, no. 1, pp. 351-361, Jan. 2011.S. A. A. Fakoorian and A. L. Swindlehurst, “MIMO interference channel with confidential messages: achievable secrecy rates and precoder design,” IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 640-649, Sep. 2011.
  • X. Jiang, C. Zhong, X. Chen, T. Q. Duong, T. A. Tsiftsis, and Z. Zhang, “Secrecy performance of wirelessly powered wiretap channels," IEEE Trans. Commun., vol. 64, no. 9, pp. 3858-3871, September 2016.
  • Y. Zhang, Y. Ko, R. Woods, and A. Marshall, “Defining spatial secrecy outage probability for exposure region-based beamforming," IEEE Trans. Wirel. Commun., vol. 16, no. 2, pp. 900-912, February 2017.
  • H. Alves, M. De C. Tomé, P. H. J. Nardelli, C. H. M. De Lima, and M. Latva-Aho, “Enhanced transmit antenna selection scheme for secure throughput maximization without CSI at the transmitter," IEEE Access, vol. 4, pp. 4861-4873, 2016.
  • N. Yang, P. L. Yeoh, M. Elkashlan, R. Schober, and I. B. Collings, “Transmit antenna selection for security enhancement in MIMO wiretap channels," IEEE Trans. Commun., vol. 61, no. 1, pp. 144-154, Jan. 2013.
  • J. Xiong, Y. Tang, D. Ma, P. Xiao, and K.-K. Wong, “Secrecy performance analysis for TAS-MRC system with imperfect feedback," IEEE Trans. Inf. Foren. Sec., vol. 10, no. 8, pp. 1617-1619, August 2015.
  • J. Hu, Y. Cai, N. Yang, and W. Yang, “A new secure transmission scheme with outdated antenna selection," IEEE Trans. Inf. Foren. Sec., vol. 10, no. 11, pp. 2435-2446, November 2015.
  • J. Zhu, Y. Zou, G. Wang, Y.-D. Yao, and G. K. Karagiannidis, “On secrecy performance of antenna-selection-aided MIMO systems against eavesdropping," IEEE Trans. Vehic. Tech., vol. 65, no. 1, pp. 214-225, Jan. 2016.
  • N. Yang, P. L. Yeoh, M. Elkashlan, R. Schober, and J. Yuan, “MIMO wiretap channels: Secure transmission using transmit antenna selection and receive generalized selection combining," IEEE Commun. Lett., vol. 17, no. 9, pp. 1754-1757, Sept. 2013.
  • S. Yan, N. Yang, R. Malaney, J. Yuan, “Transmit antenna selection with Alamouti coding and power allocation in MIMO wiretap channels," IEEE Trans. Wirel. Commun., vol. 13, no. 3, pp. 1656-1667, March 2014.
  • A. F. Coşkun, O. Kucur, “Feedback-rate efficient transmit antenna selection/Alamouti scheme with robust error performance in the presence of feedback errors," IEEE Comm. Lett., vol. 17, no. 5, pp. 908-911, May 2013.
  • I. Gradshteyn, I. Ryzhik, Tables of Integrals, Series and Products, Academic Press: San Diego CA, 1994.
  • H. A. David and H. N. Nagaraja, Order Statistics, 3rd ed. Hoboken, NJ: Wiley, 2003.
  • P. Prudnikov, Y. A. Brychkov, O. I. Marichev, Integrals and Series, Vol. 5, Gordon and Breach Science Publishers: New York, 1986.
Yıl 2019, Cilt: 23 Sayı: 1, 94 - 105, 01.02.2019
https://doi.org/10.16984/saufenbilder.453314

Öz

Kaynakça

  • C. E. Shannon, “Communication theory of secrecy systems,” Bell Syst. Technol. J., vol. 28, pp. 656-715, Oct. 1949.
  • B. Schneier, “Cryptographic design vulnerabilities,” Comput., vol. 31, no. 9, pp. 29-33, Sep. 1998.
  • A. Wyner, “The wire-tap channel,” Bell Syst. Technol. J., vol. 54, no. 8, pp. 1355-1-387, Oct. 1975.
  • S. K. Leung-Yan-Cheong, and M. E. Hellman, “The Gaussian wire-tap channel,” IEEE Trans. Inf. Theory, vol. 24, no. 4, pp. 451-456, July 1978.
  • X. Zhou, B. Maham and A. Hjørungnes, “Pilot Contamination for Active Eavesdropping,” IEEE Trans. Wire. Commun., vol. 11, no. 3, pp. 903-907, March 2012.
  • A. Khisti and G. W. Wornell, “Secure transmission with multiple antennas - part I: the MISOME wire-tap channel,” IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3088-3104, July 2010.
  • A. Khisti and G. W. Wornell, “Secure transmission with multiple antennas - part II: the MIMOME wire-tap channel,” IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515-5532, Nov. 2010.
  • F. Oggier and B. Hassibi, “The secrecy capacity of the MIMO wiretap channel,” IEEE Trans. Inf. Theory, vol. 57, no. 8, pp. 4961-4972, Aug. 2011.
  • F. He, H. Man, and W. Wang, “Maximal ratio diversity combining enhanced security,” IEEE Commun. Lett., vol. 15, no. 5, pp. 509-511, May 2011.
  • V. U. Prabhu and M. R. D. Rodrigues, “On wireless channels with M-antenna eavesdroppers: characterization of the outage probability and ε-outage secrecy capacity,” IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 853-860, Sep. 2011.
  • A. Mukherjee and A. L. Swindlehurst, “Robust beamforming for security in MIMO wiretap channels with imperfect CSI,” IEEE Trans. Signal Process., vol. 59, no. 1, pp. 351-361, Jan. 2011.S. A. A. Fakoorian and A. L. Swindlehurst, “MIMO interference channel with confidential messages: achievable secrecy rates and precoder design,” IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 640-649, Sep. 2011.
  • X. Jiang, C. Zhong, X. Chen, T. Q. Duong, T. A. Tsiftsis, and Z. Zhang, “Secrecy performance of wirelessly powered wiretap channels," IEEE Trans. Commun., vol. 64, no. 9, pp. 3858-3871, September 2016.
  • Y. Zhang, Y. Ko, R. Woods, and A. Marshall, “Defining spatial secrecy outage probability for exposure region-based beamforming," IEEE Trans. Wirel. Commun., vol. 16, no. 2, pp. 900-912, February 2017.
  • H. Alves, M. De C. Tomé, P. H. J. Nardelli, C. H. M. De Lima, and M. Latva-Aho, “Enhanced transmit antenna selection scheme for secure throughput maximization without CSI at the transmitter," IEEE Access, vol. 4, pp. 4861-4873, 2016.
  • N. Yang, P. L. Yeoh, M. Elkashlan, R. Schober, and I. B. Collings, “Transmit antenna selection for security enhancement in MIMO wiretap channels," IEEE Trans. Commun., vol. 61, no. 1, pp. 144-154, Jan. 2013.
  • J. Xiong, Y. Tang, D. Ma, P. Xiao, and K.-K. Wong, “Secrecy performance analysis for TAS-MRC system with imperfect feedback," IEEE Trans. Inf. Foren. Sec., vol. 10, no. 8, pp. 1617-1619, August 2015.
  • J. Hu, Y. Cai, N. Yang, and W. Yang, “A new secure transmission scheme with outdated antenna selection," IEEE Trans. Inf. Foren. Sec., vol. 10, no. 11, pp. 2435-2446, November 2015.
  • J. Zhu, Y. Zou, G. Wang, Y.-D. Yao, and G. K. Karagiannidis, “On secrecy performance of antenna-selection-aided MIMO systems against eavesdropping," IEEE Trans. Vehic. Tech., vol. 65, no. 1, pp. 214-225, Jan. 2016.
  • N. Yang, P. L. Yeoh, M. Elkashlan, R. Schober, and J. Yuan, “MIMO wiretap channels: Secure transmission using transmit antenna selection and receive generalized selection combining," IEEE Commun. Lett., vol. 17, no. 9, pp. 1754-1757, Sept. 2013.
  • S. Yan, N. Yang, R. Malaney, J. Yuan, “Transmit antenna selection with Alamouti coding and power allocation in MIMO wiretap channels," IEEE Trans. Wirel. Commun., vol. 13, no. 3, pp. 1656-1667, March 2014.
  • A. F. Coşkun, O. Kucur, “Feedback-rate efficient transmit antenna selection/Alamouti scheme with robust error performance in the presence of feedback errors," IEEE Comm. Lett., vol. 17, no. 5, pp. 908-911, May 2013.
  • I. Gradshteyn, I. Ryzhik, Tables of Integrals, Series and Products, Academic Press: San Diego CA, 1994.
  • H. A. David and H. N. Nagaraja, Order Statistics, 3rd ed. Hoboken, NJ: Wiley, 2003.
  • P. Prudnikov, Y. A. Brychkov, O. I. Marichev, Integrals and Series, Vol. 5, Gordon and Breach Science Publishers: New York, 1986.
Toplam 24 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Konular Elektrik Mühendisliği
Bölüm Araştırma Makalesi
Yazarlar

Ahmet Faruk Coşkun 0000-0002-7972-6386

Yayımlanma Tarihi 1 Şubat 2019
Gönderilme Tarihi 13 Ağustos 2018
Kabul Tarihi 15 Ekim 2018
Yayımlandığı Sayı Yıl 2019 Cilt: 23 Sayı: 1

Kaynak Göster

APA Coşkun, A. F. (2019). Secrecy Outage Probability of Modified TAS/Alamouti-STBC Schemes under Pilot Contamination Attacks. Sakarya University Journal of Science, 23(1), 94-105. https://doi.org/10.16984/saufenbilder.453314
AMA Coşkun AF. Secrecy Outage Probability of Modified TAS/Alamouti-STBC Schemes under Pilot Contamination Attacks. SAUJS. Şubat 2019;23(1):94-105. doi:10.16984/saufenbilder.453314
Chicago Coşkun, Ahmet Faruk. “Secrecy Outage Probability of Modified TAS/Alamouti-STBC Schemes under Pilot Contamination Attacks”. Sakarya University Journal of Science 23, sy. 1 (Şubat 2019): 94-105. https://doi.org/10.16984/saufenbilder.453314.
EndNote Coşkun AF (01 Şubat 2019) Secrecy Outage Probability of Modified TAS/Alamouti-STBC Schemes under Pilot Contamination Attacks. Sakarya University Journal of Science 23 1 94–105.
IEEE A. F. Coşkun, “Secrecy Outage Probability of Modified TAS/Alamouti-STBC Schemes under Pilot Contamination Attacks”, SAUJS, c. 23, sy. 1, ss. 94–105, 2019, doi: 10.16984/saufenbilder.453314.
ISNAD Coşkun, Ahmet Faruk. “Secrecy Outage Probability of Modified TAS/Alamouti-STBC Schemes under Pilot Contamination Attacks”. Sakarya University Journal of Science 23/1 (Şubat 2019), 94-105. https://doi.org/10.16984/saufenbilder.453314.
JAMA Coşkun AF. Secrecy Outage Probability of Modified TAS/Alamouti-STBC Schemes under Pilot Contamination Attacks. SAUJS. 2019;23:94–105.
MLA Coşkun, Ahmet Faruk. “Secrecy Outage Probability of Modified TAS/Alamouti-STBC Schemes under Pilot Contamination Attacks”. Sakarya University Journal of Science, c. 23, sy. 1, 2019, ss. 94-105, doi:10.16984/saufenbilder.453314.
Vancouver Coşkun AF. Secrecy Outage Probability of Modified TAS/Alamouti-STBC Schemes under Pilot Contamination Attacks. SAUJS. 2019;23(1):94-105.

30930 This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.