Next Article in Journal
Factors Affecting e-Government Adoption by Dairy Farmers: A Case Study in the North-West of Spain
Next Article in Special Issue
Spatiotemporal Traffic Prediction Using Hierarchical Bayesian Modeling
Previous Article in Journal
A DFT-Based Running Time Prediction Algorithm for Web Queries
Previous Article in Special Issue
Implementation of Parallel Cascade Identification at Various Phases for Integrated Navigation System
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Cascaded κ-μ Fading Channels with Colluding and Non-Colluding Eavesdroppers: Physical-Layer Security Analysis

Department of Electrical and Computer Engineering, Concordia University, Montreal, QC H3G 1M8, Canada
*
Author to whom correspondence should be addressed.
Both authors contributed equally to this work.
Future Internet 2021, 13(8), 205; https://0-doi-org.brum.beds.ac.uk/10.3390/fi13080205
Submission received: 29 June 2021 / Revised: 25 July 2021 / Accepted: 31 July 2021 / Published: 4 August 2021

Abstract

:
In this paper, the physical-layer security for a three-node wiretap system model is studied. Under the threat of multiple eavesdroppers, it is presumed that a transmitter is communicating with a legitimate receiver. The channels are assumed to be following cascaded κ - μ fading distributions. In addition, two scenarios for eavesdroppers’ interception and information-processing capabilities are investigated: colluding and non-colluding eavesdroppers. The positions of these eavesdroppers are assumed to be random in the non-colluding eavesdropping scenario, based on a homogeneous Poisson point process (HPPP). The security is examined in terms of the secrecy outage probability, the probability of non-zero secrecy capacity, and the intercept probability. The exact and asymptotic expressions for the secrecy outage probability and the probability of non-zero secrecy capacity are derived. The results demonstrate the effect of the cascade level on security. Additionally, the results indicate that as the number of eavesdroppers rises, the privacy of signals exchanged between legitimate ends deteriorates. Furthermore, in this paper, regarding the capabilities of tapping and processing the information, we provide a comparison between colluding and non-colluding eavesdropping.

1. Introduction

This work is an extension for a previous paper that has been presented in 2020 International Conference on Communications, Signal Processing, and their Applications (ICCSPA) [1]. Security is one of the fundamental challenges that must be addressed in all types of networks, particularly with the tremendous number of connections and services planned in 5G and beyond. In this context, physical-layer security (PLS) has emerged as a critical and reliable approach to effectively addressing the security concern [2,3]. PLS does not depend on the exchange of security keys between authorized endpoints since there is no necessity for decryption and encryption operations, as in higher-layer security techniques [4,5]. As a result, PLS is more suitable for use in 5G networks and beyond. That is, there is no additional complexity introduced to the current complicated networks. Shannon was the first to propose the notion of PLS [6], which was then expanded upon by Wyner [7]. The PLS notion claimed that the confidentiality of private information is assured when the main channel (the link between the transmitter and the legitimate receiver) is more reliable than the wiretap channel (the one between the transmitter and the eavesdropper) [8].
κ - μ fading model is one of the general fading distributions, which have been confirmed by field measurement campaigns to better suit the experimental data compared to other known distributions, such as Rayleigh, Rician, and Nakagami-m fading [9]. κ - μ distribution suits the line-of-sight (LOS) applications with the two physical parameters; κ and μ . κ > 0 is recognized as the ratio between the total power of the dominant components and the power of the scattered waves, while μ > 0 demonstrates the number of the multipath clusters. κ - μ fading channel includes some of the well-known channels as special cases, which is a reason for its flexibility property, such as Rician ( μ = 1 and κ = LOS component in the Rician channel), Rayleigh ( κ = 0 , μ = 1 ), Nakagami-m ( κ = 0 , μ = m ), and the one-sided Gaussian ( κ = 0 , μ = 0.5 ) distributions [9].
Recently, various forms of networks have been investigated under the premise of cascaded channels rather than single regular channels. These channels presume that the entities in the networks are moving or that they reside in dense scattering regions [10]. The principle of cascaded channels suggests that the signal that leaves the transmitter does not travel directly to the receiver without encountering objects and obstacles along the way. In addition, the received signal is composed of the multiplication of multiple rays reflected from the objects obstructing the path [11]. Cascaded channels have a variety of applications, which has made them intriguing for recent research in signal propagation modeling. These applications include mobile-to-mobile/vehicle-to-vehicle communications (M2M/V2V) [12], the multi-hop relaying systems, and the keyhole channels in multiple-input–multiple-output (MIMO) system models [13,14].
Physical-layer security performance over cascaded fading channels has recently been thoroughly investigated. PLS was studied for a system model consisting of a transmitter, a receiver, and one eavesdropper in terms of the secrecy outage probability (SOP) and the strictly positive secrecy capacity (SPSC) over double Rayleigh fading channel in [15] and over double Nakagami-m fading channel in [16]. Similar analyses were performed in [17] over cascaded α μ fading channel and in [12,18] over cascaded Nakagami-m fading channel. In [18], the secrecy performance was explored for two scenarios of one eavesdropper and two eavesdroppers. Secrecy was investigated over cascaded Fisher-Snedecor F fading channels using stochastic geometry in [19] in the presence of randomly distributed eavesdroppers. Intercept probability is evaluated in this model, where two different cases are considered, which are the k t h nearest and k t h best eavesdropper. PLS was studied over cascaded κ - μ fading channels over the main link only in [20].
To the best of the authors’ knowledge, no prior works studied the physical-layer security (PLS) for a three-node wiretap system model over cascaded κ - μ fading channels at the main and the wiretap links and under the threat of multiple eavesdroppers. Moreover, no previous research has investigated the difference between colluding and non-colluding eavesdroppers with multiple antennas. Therefore, in this work, we explore the PLS of a system model consisting of a transmitter interacting with a legitimate receiver in the presence of multiple eavesdroppers. In one scenario, these eavesdroppers are considered to be colluding to intercept the information effectively, whereas in another, the eavesdroppers are considered to be non-colluding and have random positions. In the case of colluding eavesdroppers, it is assumed that each has a single antenna. These eavesdroppers can be replaced by a single eavesdropper equipped with several antennas. This assumption is valid since these colluding eavesdroppers can perform cooperative processing on the gathered intercepted information by sending it to a centralized processor [21,22,23,24,25]. The PLS is investigated in terms of the secrecy outage probability O P s e c , the probability of non-zero secrecy capacity P n s c , and the intercept probability ( P i n t ) . Exact and asymptotic equations for the O P s e c and the P n s c are derived. The results demonstrate the influence of multiple eavesdroppers on information privacy. Moreover, the impact of the cascade levels of the main and the wiretap channels over the security is addressed. This paper also investigates the effect of distances on security. Finally, a comparison between the two scenarios of the eavesdroppers’ capabilities on degrading the main channel’s privacy is provided.

2. Materials and Methods

2.1. Physical-Layer Security Analysis: Colluding Eavesdroppers

A three-node wiretap system model is shown in Figure 1. In the presence of an eavesdropper ( E ) equipped with several antennas, it is assumed that the transmitter (Alice) is communicating with a legitimate receiver (Bob) over the main channel. This eavesdropper replaces the multiple colluding eavesdroppers, each equipped with a single antenna [20,21,25]. Moreover, the eavesdropper utilizes the maximal ratio combining (MRC) technique over the received messages to improve the received signal-to-noise ratio (SNR). Through the wiretap channel, E is attempting to capture the messages conveyed between Alice and Bob. Both the main and wiretap channels follow the cascaded κ - μ fading model.
The received signal at the legitimate receiver (Bob) is given by
y m = P Z N x + w m ,
where P is the transmit power. x is the transmitted symbol at Alice and w m is the additive white Gaussian noise (AWGN) at the receiver with zero mean and variance N 0 . Z N is the channel gain for the main link, which is defined by Z N = i = 1 N X i . X i is a set of independent κ - μ random variables (RVs) with the parameters κ i and μ i i 1 , 2 , , N . Therefore, Z N follows cascaded κ μ fading with the following probability density function (PDF) [20]
f Z N ( z ) = v 1 = 0 v 2 = 0 v N = 0 a 1 z 2 μ 1 + 2 v 1 1 G 0 N N 0 ϵ | 1 z 2 i = 1 N μ i 1 + κ i ,
where G m n p q a r b s | z is the Meijer G-function defined in [26] (Equation 9-301), ϵ = μ 1 μ 2 + v 1 v 2 + 1 , , μ 1 μ N + v 1 v N + 1 , 1 , and
a 1 = 2 i = 1 N μ i 1 + κ i μ 1 μ i + v 1 v i μ i 1 + κ i μ i + 1 2 κ i μ i 1 2 exp κ i μ i Γ v i + μ i i = 1 N 2 μ i κ i 1 + κ i 2 v i + μ i 1 ( v i ) ! 2 2 v i + μ i 1 ·
The cumulative distribution function (CDF) of the RV Z N is given by [20]
F Z N z = v 1 = 0 v 2 = 0 v N = 0 a 1 2 z 2 μ 1 + v 1 G N 1 1 N + 1 1 μ 1 v 1 ρ | z 2 i = 1 N μ i 1 + κ i ,
where ρ = μ 1 + μ 2 v 1 + v 2 , , μ 1 + μ N v 1 + v N , 0 , μ 1 v 1 . The intercepted message at E is given by
y E , k = P Z E , k x + w E , k ,
where w E , k is the AWGN at the k t h antenna of E with zero mean and variance N 0 . Z E , k is the channel gain for the wiretap link, which is the one between Alice and the k t h antenna of E for k = 1 , 2 , , K . K is the total number of eavesdroppers, which also represents the number of antennas at E. Z E , k is defined by Z E , k = j = 1 n e Y j ( k ) . Y j ( k ) is a set of independent κ - μ RVs with the parameters κ e j ( k ) and μ e j ( k ) j 1 , 2 , , n e for the k t h link. Hence, Z E , k follows the cascaded κ μ fading distribution with the following PDF
f Z E , k ( z e ) = r 1 ( k ) = 0 r 2 ( k ) = 0 r n e ( k ) = 0 a 2 ( k ) z e 2 μ e 1 ( k ) + 2 r 1 ( k ) 1 G 0 n e ( k ) n e ( k ) 0 β e ( k ) | 1 z e 2 j = 1 n e ( k ) μ e j ( k ) 1 + κ e j ( k ) ,
where β e ( k ) = μ e 1 ( k ) μ e 2 ( k ) + r 1 ( k ) r 2 ( k ) + 1 , , μ e 1 ( k ) μ e n e ( k ) + r 1 ( k ) r n e ( k ) + 1 , 1 and
a 2 ( k ) = 2 j = 1 n e ( k ) μ e j ( k ) 1 + κ e j ( k ) μ e 1 ( k ) μ e j ( k ) + r 1 ( k ) r j ( k ) μ e j ( k ) κ e j ( k ) μ e j ( k ) 1 2 exp κ e j ( k ) μ e j ( k ) Γ r j ( k ) + μ e j ( k ) j = 1 n e ( k ) 2 μ e j ( k ) κ e j ( k ) 1 + κ e j ( k ) 2 r j ( k ) + μ e j ( k ) 1 ( r j ( k ) ) ! 2 2 r j ( k ) + μ e j ( k ) 1 × j = 1 n e ( k ) 1 + κ e j ( k ) μ e j ( k ) + 1 2 ·
The CDF of the RV Z E , k is expressed as
F Z E , k z e = r 1 ( k ) = 0 r 2 ( k ) = 0 r n e ( k ) = 0 a 2 ( k ) 2 z e 2 μ e 1 ( k ) + r 1 ( k ) G n e ( k ) 1 1 n e ( k ) + 1 1 μ e 1 ( k ) r 1 ( k ) s ( k ) | z e 2 j = 1 n e ( k ) μ e j ( k ) 1 + κ e j ( k ) ,
where s ( k ) = μ e 1 ( k ) + μ e 2 ( k ) r 1 ( k ) + r 2 ( k ) , , μ e 1 ( k ) + μ e n e ( k ) r 1 ( k ) + r n e ( k ) , 0 , μ e 1 r 1 ( k ) . The SNR at Bob is given by γ B = Z N 2 P N with the following being the PDF and the CDF of γ B
f γ B γ = v 1 = 0 v 2 = 0 v N = 0 a 1 2 i = 1 N E X i 2 γ B ¯ μ 1 + v 1 G 0 N N 0 ϵ | γ B ¯ γ i = 1 N E X i 2 μ i 1 + κ i × γ μ 1 + v 1 1 ,
F γ B γ = v 1 = 0 v 2 = 0 v N = 0 a 1 2 γ i = 1 N E X i 2 γ B ¯ μ 1 + v 1 × G N 1 1 N + 1 1 μ 1 v 1 ρ | γ i = 1 N E X i 2 μ i 1 + κ i γ B ¯ ,
where γ B ¯ is the average received SNR at Bob. The eavesdropper utilizes the MRC on the received messages. Hence, the received SNR at E is given by γ E = i = 1 K γ E , i = i = 1 K Z E , i 2 P N 0 . Using [27] and (5), the PDF of γ E is given by
f γ E γ e = r 1 = 0 r 2 = 0 r n e = 0 c x , e 2 j = 1 n e E X j 2 γ E ¯ K μ e 1 K + r 1 γ e μ e 1 K + r 1 1 × G 0 n e n e 0 β e | γ E ¯ K γ e j = 1 n e E X j 2 μ e j K j 1 + κ e j ,
where γ E ¯ is the average received SNR at E, β e = μ e 1 K μ e 2 K + r 1 r 2 + 1 , , μ e 1 K μ e n e K + r 1 r n e + 1 , 1 , and
c x , e = 2 j = 1 n e 2 μ e j K j κ e j 1 + κ e j 2 r j + μ e j K j 1 ( r j ) ! 2 2 r j + μ e j K j 1 j = 1 n e μ e j K j 1 + κ e j μ e 1 K μ e j K j + r 1 r j κ e j μ e j K j 1 2 exp κ e j μ e j K j × j = 1 n e μ e j K j 1 + κ e j μ e j K j + 1 2 Γ r j + μ e j K j ·
Proving the accuracy of (9), the PDF of γ E is plotted in Figure 2 with Monte-Carlo simulations.
Using (9) and ([28] Equation (26)), the CDF of γ E can be given by
F γ E γ e = r 1 = 0 r 2 = 0 r n e = 0 c x , e 2 G n e 1 1 n e + 1 ϵ η e | A γ e γ E ¯ K γ e j = 1 n e E X j 2 γ E ¯ K μ e 1 K + r 1 ,
where ϵ = 1 μ e 1 K r 1 , η e = μ e 1 K + μ e 2 K r 1 + r 2 , , μ e 1 K + μ e n e K r 1 + r n e , 0 , μ e 1 K r 1 , and A = j = 1 n e E X j 2 μ e j K j 1 + κ e j .

2.1.1. Secrecy Outage Probability

The secrecy outage probability ( O P s e c ) is defined as the probability that the secrecy capacity C s is less than a predetermined threshold C t h . The secrecy capacity can be expressed as [29]
C s = C m C e , if γ B > γ E 0 , if γ B γ E ,
where C m and C e are the capacities of the main and the wiretap channels, respectively. O P s e c is expressed as
O P s e c = P r C s < C t h = 0 f γ E γ e F γ B 2 C t h 1 + γ e 1 d γ e ,
Due to the complexity of the expression in (12), a lower bound for the secrecy outage probability is obtained instead ( O P s e c L ) . Hence, O P s e c L is given by [30]
O P s e c L = 0 f γ E γ e F γ B 2 C t h γ e d γ e ·
Using (8) and (9) with the help of ([31] Equation (2.3.31)) and ([26] Equation (7.813-1)) yields
O P s e c L = v 1 = 0 v 2 = 0 v N = 0 r 1 = 0 r 2 = 0 r n e = 0 c a G N n e + 1 n e + 1 N + 1 ξ ρ | D ,
where ξ = 1 μ 1 v 1 , 1 μ 1 v 1 μ e 2 K r 2 , , 1 μ 1 v 1 μ e n e K r n e , 1 μ e 1 K r 1 μ 1 v 1 , D = 2 C t h γ E ¯ K i = 1 N E X i 2 μ i 1 + κ i γ B ¯ j = 1 n e E [ X j 2 ] μ e j K j 1 + κ e j , and
c a = a 1 c x , e 4 2 C t h μ 1 + v 1 i = 1 N E X i 2 γ B ¯ μ 1 + v 1 j = 1 n e E [ X j 2 ] μ e j K 1 + κ e j γ E ¯ K μ e 1 K r 1 μ 1 v 1 × j = 1 n e E [ X j 2 ] γ E ¯ K μ e 1 K + r 1 ·

2.1.2. Asymptotic Secrecy Outage Probability as γ E ¯

In this section, the asymptotic O P s e c L is evaluated when γ E ¯ . Rewriting (14) with the help of ([32] Equation (2.2.1)) and ([32] Equation (3.11.3)) yields
O P s e c L = v 1 = 0 v 2 = 0 v N = 0 r 1 = 0 r 2 = 0 r n e = 0 c a c b H N n e + 1 n e + 1 N + 1 ϵ d η d | D ,
where H m n p q a b | · is the H-function defined in ([32] (Equation 3.11.1)), ϵ d = 1 , 1 , 1 μ e 2 K r 2 , 1 , , 1 μ e n e K r n e , 1 , 1 μ e 1 K r 1 , 1 , η d = μ 2 + v 2 , 1 , , μ N + v N , 1 , μ 1 + v 1 , 1 , 0 , 1 , and c b = γ B ¯ j = 1 n e E [ X j 2 ] μ e j K j 1 + κ e j 2 C t h K i = 1 N E X i 2 μ i 1 + κ i μ 1 + v 1 · Furthermore, the H-function can be rewritten again using its integral representation. Hence, (15) is given by
O P s e c L = v 1 = 0 v 2 = 0 v N = 0 r 1 = 0 r 2 = 0 r n e = 0 c a c b 2 π i × C Γ [ s ] i = 1 N Γ [ μ i + v i s ] Γ [ 1 + s ] j = 1 n e Γ [ μ e j K + r j + s ] D s d s ·
To obtain the asymptotic expression for O P s e c L , the residue method is utilized [33]. Hence, as γ E ¯ , D with the asymptotic expression of O P s e c L given by
O P s e c , E L v 1 = 0 v 2 = 0 v N = 0 r 1 = 0 r 2 = 0 r n e = 0 c a c b 2 π i Res g ( s ) , 0 v 1 = 0 v 2 = 0 v N = 0 r 1 = 0 r 2 = 0 r n e = 0 c a c b i = 1 N Γ [ μ i + v i ] j = 1 n e Γ [ μ e j K + r j ] ,
where g ( s ) is given by
g ( s ) = D s Γ [ s ] i = 1 N Γ [ μ i + v i s ] j = 1 n e Γ [ μ e j K + r j + s ] Γ [ 1 + s ] ·
It is evident from (17) that the diversity order is zero since the expression is independent of γ ¯ . This implies that the secrecy is completely compromised when the wiretap channel’s conditions are highly improved ( γ E ¯ ) . In such circumstances, the confidential information can be overheard and decoded successfully by E.

2.1.3. Asymptotic Secrecy Outage Probability as γ B ¯

In this section, we assess the impact of having very reliable conditions on the main link in terms of the average received SNR over the security. That is, the asymptotic O P s e c L as γ B ¯ is evaluated. The secrecy outage probability in (14) can be rewritten as
O P s e c L = v 1 = 0 v 2 = 0 v N = 0 r 1 = 0 r 2 = 0 r n e = 0 c a c d μ 1 v 1 2 π i × C j = 1 N Γ [ μ j + v j s ] Γ [ s ] j = 1 n e Γ [ μ e j K j + r j + s ] Γ [ s ] Γ [ 1 + s ] M s d s ,
where c d = 2 C t h γ E ¯ K i = 1 N E [ X i 2 ] μ i ( 1 + κ i ) j = 1 n e μ e j K j ( 1 + κ e j ) and M = c d γ B ¯ . Similar to the previous section, using the residue method [33], the asymptotic secrecy outage probability can be finally given by
O P s e c , B L v 1 = 0 v 2 = 0 v N = 0 r 1 = 0 r 2 = 0 r n e = 0 c a c d μ 1 v 1 j = 1 , j I N Γ [ μ j + v j μ I v I ] } × j = 1 n e Γ [ μ e j K j + r j + μ I + v I ] M μ I + v I ,
where μ I + v I = min μ j + v j , for j = 1 , 2 , , N , which represents the minimum pole at which the residue method is evaluated.

2.1.4. Probability of Non-Zero Secrecy Capacity

The probability of non-zero secrecy capacity ( P n s c ) is recognized as the probability that the main channel’s capacity is larger than the wiretap channel’s capacity. This implies that the main channel is more reliable than the wiretap channel. Mathematically, P n s c is expressed as
P n s c = P r C s > 0 = 1 P r γ B γ E = 1 0 F γ B ( y ) f γ E ( y ) ,
Substituting (8) and (9) into (20) and with the help of ([34] Equation (2.24.1.1)), P n s c is solved as
P n s c = 1 r 1 = 0 r 2 = 0 r n e = 0 v 1 = 0 v 2 = 0 v N = 0 c x , e a 1 4 i = 1 N E X i 2 γ B ¯ μ 1 + v 1 j = 1 n e E X j 2 γ E ¯ K μ e 1 K + r 1 × i = 1 N E X i 2 μ i ( 1 + κ i ) γ B ¯ μ 1 v 1 μ e 1 K r 1 G n e + 1 N N + 1 n e + 1 ψ ψ | γ B ¯ j = 1 n e E [ X j 2 ] μ e j K j 1 + κ e j γ E ¯ K i = 1 N E X i 2 μ i 1 + κ i ,
where ψ = 1 μ e 1 K r 1 μ 2 v 2 , , 1 μ e 1 K r 1 μ N v N , 1 μ 1 v 1 μ e 1 K r 1 , 1 μ e 1 K r 1 and ψ = μ e 1 K + μ e 2 K r 1 + r 2 , , μ e 1 K + μ e n e K r 1 + r n e , 0 ,
μ e 1 K r 1 .

2.1.5. Asymptotic Probability of Non-Zero Secrecy Capacity

To study the impact of enhancing the wiretap channel’s conditions over the privacy of the shared information, asymptotic P n s c is evaluated as γ E ¯ . Following the same approach used to find the asymptotic secrecy outage probability, the asymptotic probability of non-zero secrecy capacity is expressed as
P n s c 1 v 1 = 0 v 2 = 0 v N = 0 r 1 = 0 r 2 = 0 r n e = 0 c x , e a 1 c c i = 1 N Γ [ μ i + v i ] j = 1 n e Γ [ μ e j K + r j ] ,
where c c = j = 1 n e E [ X j 2 ] 4 i = 1 N E [ X i 2 ] j = 1 n e μ e j K j 1 + κ e j μ e 1 K + r 1 i = 1 N μ i 1 + κ i μ 1 + v 1 ·
Equation (22) demonstrates that the eavesdropper taps the information and decodes it effectively since the characteristics of the wiretap channel are extremely strong in terms of the average received SNR ( γ E ¯ ) . A similar scenario is attainable when the eavesdropper is relatively close to the transmitter, enabling it to effectively decode the intercepted information.

2.1.6. Intercept Probability

The intercept probability ( P i n t ) estimates the probability that the eavesdropper is able to intercept the information. This occurs when the wiretap channel conditions are more reliable than the main channel conditions. Mathematically, P i n t is expressed as
P i n t = P r C s < 0 = P r γ B < γ E = 1 P n s c .
Substituting (21) and (22) into (23) yields the exact and asymptotic intercept probability, respectively. It is worth mentioning that while the probability of non-zero secrecy capacity highlights the reliability level of the main channel, the intercept probability measures the intercept capabilities of the eavesdropper instead. This aids in comprehending the security implications of both channels.

2.2. Physical-Layer Security Analysis: Non-Colluding Eavesdroppers

This section considers the second scenario, in which the eavesdroppers are expected to process the intercepted information independently without the messages being jointly processed. In this context, the eavesdroppers’ locations are assumed to be random according to a homogeneous Poisson point process (HPPP) with a density of λ e . We assume that the eavesdroppers are distributed in an unbounded Euclidean space of dimension U. The eavesdroppers’ information regarding the positions related to Alice can be obtained by assuming that the eavesdroppers are users in the network but are untrusted and do not have the authorization to access the channel [35,36]. Our analyses are based on selecting the i t h closest eavesdropper to the transmitter Alice, once the distances between Alice and the eavesdroppers have been ordered in an ascending manner [19].

2.2.1. Probability of Non-Zero Secrecy Capacity

To explore the physical-layer security for the three-node wiretap system model under the threat of non-colluding eavesdroppers, the probability of non-zero secrecy capacity is utilized. From (20), the probability of non-zero secrecy capacity is expressed as
P n s c = 1 0 F γ B ( y ) f Y ( y ) d y ,
where Y = γ E d α , in which d is the distance between the transmitter (Alice) and the i t h closest eavesdropper and α is the path loss exponent. The PDF of the path loss d α is distributed as [37]
f d α ( x ) = exp A e x δ δ A e i x δ i 1 Γ ( i ) ,
where A e = π λ e , δ = U α , and Γ · is the gamma function. First, one needs to obtain the PDF of Y as
f Y ( y ) = 0 y b f γ E ( y y b ) f d α ( y b ) d y b ·
Substituting (9) and (25) and with the help of ([34] Equation (2.24.3.1)) yields
f Y y = r 1 = 0 r 2 = 0 r n e = 0 C 1 y 1 δ i G 1 δ n e δ n e 1 F F | A e δ δ n e γ E ¯ K δ y δ j = 1 n e E X j 2 μ e j K j 1 + κ e j δ ,
where
C 1 = j = 1 n e E X j 2 γ E ¯ K μ e 1 K + r 1 c x , e A e i δ n e δ i + μ e 1 K + r 1 + ρ * 2 Γ ( i ) ( 2 π ) ( δ 1 ) n e 2 j = 1 n e E X j 2 μ e j K j 1 + κ e j γ E ¯ K δ i μ e 1 K r 1 ,
F = 1 δ i μ e 2 K r 2 δ , , 1 δ i μ e n e K r n e δ , 1 δ i μ e 1 K r 1 δ , F = 0 , and ρ * = j = 1 n e 1 β e + 1 n e 2 . Using (8), (27), and ([34] Equation (2.24.3.1)), the probability of non-zero secrecy capacity given in (24) is solved as
P n s c = 1 r 1 = 0 r 2 = 0 r n e = 0 v 1 = 0 v 2 = 0 v N = 0 C 2 G δ n e + δ δ N + 1 δ N + 1 + δ δ n e + δ ζ ζ | ϕ ,
where
C 2 = C 1 a 1 2 i = 1 N E X i 2 γ B ¯ μ 1 + v 1 δ N μ 1 + v 1 δ i 1 + q ( 2 π ) ( δ 1 ) N 2 i = 1 N E X i 2 μ i 1 + κ i γ B ¯ δ i μ 1 v 1 ,
q = j = 1 N + 1 ρ + μ 1 + v 1 N 2 , ζ = 1 , 1 + δ i μ 2 v 2 δ , , 1 + δ i μ N v N δ , 1 + δ i μ 1 v 1 δ , 1 + δ i δ , ζ = 1 F , i , and ϕ = j = 1 n e E X j 2 μ e j K j 1 + κ e j δ A e δ δ n e γ E ¯ K δ i = 1 N E X i 2 μ i 1 + κ i γ B ¯ δ .

2.2.2. Asymptotic Probability of Non-Zero Secrecy Capacity

In this section, the security is evaluated as the wiretap channel’s conditions are extremely strong. Particularly, we evaluate the probability of non-zero secrecy capacity as γ E ¯ . Hence, (28) is rewritten as
P n s c = 1 v 1 = 0 v 2 = 0 v N = 0 r 1 = 0 r 2 = 0 r n e = 0 C 2 c f i 2 π j × C j = 1 δ n e Γ i + δ i + μ e j K j + r j δ s Γ [ s ] j = 1 δ N Γ 1 + i + 1 δ i + μ j + r j δ + s Γ [ i + s ] Γ 1 δ + s T s d s ,
where c f = ( j = 1 n e E [ X j 2 ] μ e j K j ( 1 + κ e j ) ) δ A e δ δ n e ( γ E ¯ K ) δ ( i = 1 N E [ X i 2 ] μ i ( 1 + κ i ) ) δ and T = c f γ E ¯ δ . Using the residue method [33], the probability of non-zero secrecy capacity can be finally approximated as
P n s c 1 v 1 = 0 v 2 = 0 v N = 0 r 1 = 0 r 2 = 0 r n e = 0 C 2 c f i j = 1 N Γ 1 1 δ + μ j + v j δ } × j = 1 δ n e Γ μ e j K j + r j δ Γ [ i ] Γ [ 1 / δ ] .
It is worth mentioning that according to (30), the security is independent of the average received SNR at the eavesdropper ( γ E ¯ ) . This indicates that the probability of achieving a positive secrecy capacity under such conditions is extremely low. This represents the scenario where the wiretap channel is very reliable and the eavesdropper has a very strong reception level as opposed to the legitimate receiver reception quality.

2.2.3. Intercept Probability

Intercept probability is evaluated with the help of (28) as
P i n t = 1 P n s c .
Moreover, the asymptotic P i n t can be directly attained from (30) as γ E ¯ .

3. Results and Discussion

In this section, the results and Monte-Carlo simulations are given. The analytical curves are plotted by truncating the infinite series summations ( v and r ) to the first twenty terms.
Figure 3 shows the secrecy outage probability versus the average received SNR at Bob ( γ B ¯ ) . In this figure, setting the fading channel parameters for the main and the wiretap channels to κ = 0 and μ = 1 results in the Rayleigh fading as a special case of the κ - μ fading model. The impact of the cascade levels (number of keyholes) for the main channel ( N ) and for the wiretap channel ( n e ) is provided in this figure. Indeed, privacy worsens as the cascade level grows in the main channel or reduces in the wiretap channel. The fact is that a greater N signifies a larger number of scatters and obstacles in the main channel, resulting in a more severe fading. Additionally, it is noted that the probability of an outage in the security of the transmitted messages is higher as the eavesdropper channel’s circumstances improve by increasing the average received SNR ( γ E ¯ ) . Moreover, the figure includes the asymptotic secrecy outage probability derived in (17) as γ E ¯ becomes very high. At the highest value of γ E ¯ , a zero slope appears, and a value of one for the secrecy outage probability is provided. This demonstrates that for these parameters, the secrecy is completely compromised and the information will be certainly intercepted by E irrespective of the value of γ B ¯ . Finally, the results show that the information may be delivered more securely regardless of the cascade levels as the main channel conditions improve in terms of γ B ¯ . Finally, the asymptotic secrecy outage probability derived in (19) as γ B ¯ is included, and it is clear that it matches the results as γ B ¯ takes high values.
Figure 4 depicts the effect of varying the number of antennas at E ( K ) over the security. It can be seen that increasing the number of antennas improves the eavesdropper’s reception capabilities and aids in effectively decoding the tapped messages owing to the use of the MRC method. Hence, the shared information’s privacy is compromised. Additionally, the figure illustrates that improving the wiretap channel conditions in terms of the average received SNR at E ( γ E ¯ ) will eventually result in an extremely low probability of non-zero secrecy capacity. This indicates the P n s c asymptotic case derived in (22). However, the privacy of shared information may be enhanced by raising the value of γ B ¯ , which can be achieved by having fewer scatters ( N ) obstructing the main channel path.
To take the path loss effect over the secrecy into considerations, Figure 5 shows a two-dimensional (2D) graph where the transmitter Alice (A) is the reference location. That is, Alice is located at ( 0 , 0 ) and the other receivers ( B and E ) have different distances from Alice, and B stands for the legitimate receiver Bob. Assume d X Y β = 1 2 λ J , where β is the path loss exponent, X A , p 1 , p 2 , , Y B , E , p 1 , p 2 , , and J B , E . λ J = 1 2 σ J 2 is the Rayleigh fading parameter, and σ J is the scale parameter of the distribution. d X Y represents the distance from node X to node Y in meters ( m ) . p i ( for i = 1 , 2 , , N 1 ) are the locations of the obstacles in the main channel. This is to note the effect of the cascade level between A and B. Figure 6 corresponds to the 2D graph and it indicates that regardless of the number of antennas at E and the effectiveness of the MRC technique, as the eavesdropper moves further away from the transmitter Alice, i.e., as d A E becomes larger, the privacy of the transferred information improves. This can be interpreted by the fact that as d A E rises, the wiretap channel’s conditions worsen and the received SNR at E deteriorates accordingly. This graph demonstrates the importance of considering the impact of distances between nodes on privacy.
Figure 7 illustrates the intercept probability ( P i n t ) versus the density of eavesdroppers ( λ e ) for two different values of i, in which i represents the selection of the closest eavesdropper. For example, i = 1 denotes choosing the first nearest eavesdropper to the transmitter, and thus the wiretap channel will be the one between Alice and this selected eavesdropper. We assume a 2D area ( U = 2 ) , and we generate 10 5 realizations of the positions of the eavesdroppers in a square area of 20 m 2 . The figure shows that the probability of the information interception grows as the density of eavesdroppers increases. This is owing to the fact that the probability of a more harmful eavesdropper is rising as the λ e grows. That is, as λ e rises, there is a greater probability of having a closer eavesdropper to Alice. Additionally, the privacy of the shared information is under a higher risk when selecting the first closest eavesdropper ( i = 1 ) as opposed to selecting the second closest one ( i = 2 ) . The reason is that the first closest eavesdropper is more probable to have better channel conditions compared to the other farther eavesdroppers. This figure proves the significance of considering random locations for the eavesdroppers, rather than being fixed at specific locations and distances from the transmitter.
Figure 8 presents a comparison between colluding and non-colluding eavesdroppers with a density of λ e = 0.1 . In the case of non-colluding eavesdroppers, the security declines as the number of antennas rise. Moreover, comparing the case of non-colluding eavesdroppers for K = 2 with the colluding eavesdroppers case, it is noted that although the number of non-colluding eavesdroppers is greater, the interception and decoding ability of the colluding eavesdroppers is stronger. Hence, the privacy of information is more vulnerable when colluding eavesdroppers exist in the network. This leads to the realization that further countermeasures should be adopted at the main channel in the presence of colluding eavesdroppers.
As a final investigation, Figure 9 demonstrates the probability of non-zero secrecy capacity for different values of the average received SNR at E ( γ E ¯ ) for the non-colluding eavesdroppers case. The results clearly demonstrate how the system’s privacy behaves as the eavesdroppers’ channel quality improves. Particularly, fixing the legitimate receiver received SNR, the privacy of the shared information is severely compromised as γ E ¯ takes high values. After a certain limit, the P n s c approaches its asymptotic degree, i.e., lowest value. That is, the curve reaches a value of zero as γ E ¯ . Indeed, this is in agreement with the asymptotic results obtained in (30).

4. Conclusions

In this paper, the physical-layer security for a three-node wiretap system model with multiple eavesdroppers over cascaded κ - μ fading channels is investigated. The secrecy was assessed in terms of the secrecy outage probability, the probability of non-zero secrecy capacity, and the intercept probability. Two scenariosw were examined for the way in which eavesdroppers tap and analyze the information: colluding and non-colluding eavesdroppers. Results reveal that the cascade level has a significant impact over the privacy of the shared information. In addition, the results show that the security can be improved by enhancing the average received SNR at the main channel. However, confidentiality is reduced by the increasing number of antennas for the two eavesdroppers’ scenarios. Additionally, the effect of the distances between the nodes is investigated, suggesting that the privacy deteriorates significantly as the eavesdropper draws closer to the transmitter. Moreover, our results prove that having colluding eavesdroppers in the network is more threatening and challenging to combat than having non-colluding eavesdroppers. This is maintained even when the density of non-colluding eavesdroppers is larger.

Author Contributions

Formal analysis, D.T.; Supervision, W.H. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Tashman, D.H.; Hamouda, W. Cascaded κ-μ Fading Channels with Colluding Eavesdroppers: Physical-Layer Security Analysis. In Proceedings of the 2020 International Conference on Communications, Signal Processing, and their Applications (ICCSPA), Sharjah, United Arab Emirates, 16–18 March 2021; pp. 1–6. [Google Scholar] [CrossRef]
  2. Moualeu, J.M.; Hamouda, W.; Takawira, F. Secrecy Performance of Generalized Selection Diversity Combining Scheme with Gaussian Errors. In Proceedings of the 2018 IEEE 88th Vehicular Technology Conference (VTC-Fall), Chicago, IL, USA, 27–30 August 2018; pp. 1–5. [Google Scholar] [CrossRef]
  3. Moualeu, J.M.; Hamouda, W. Performance analysis of secure communications over α-μ/κ-μ fading channels. In Proceedings of the 2017 12th International Conference on Computer Engineering and Systems (ICCES), Cairo, Egypt, 19–20 December 2017; pp. 473–478. [Google Scholar] [CrossRef]
  4. Jameel, F.; Wyne, S.; Kaddoum, G.; Duong, T.Q. A Comprehensive Survey on Cooperative Relaying and Jamming Strategies for Physical Layer Security. IEEE Commun. Surv. Tutor. 2019, 21, 2734–2771. [Google Scholar] [CrossRef] [Green Version]
  5. Moualeu, J.M.; Sofotasios, P.C.; da Costa, D.B.; Muhaidat, S.; Hamouda, W.; Dias, U.S. Physical-Layer Security of SIMO Communication Systems over Multipath Fading Conditions. IEEE Trans. Sustain. Comput. 2021, 6, 105–118. [Google Scholar] [CrossRef]
  6. Shannon, C.E. Communication theory of secrecy systems. Bell Syst. Tech. J. 1949, 28, 656–715. [Google Scholar] [CrossRef]
  7. Ozarow, L.H.; Wyner, A.D. Wire-tap channel II. AT&T Bell Lab. Tech. J. 1984, 63, 2135–2157. [Google Scholar]
  8. Tashman, D.H.; Hamouda, W. An Overview and Future Directions on Physical-Layer Security for Cognitive Radio Networks. IEEE Netw. 2020, 35, 205–211. [Google Scholar] [CrossRef]
  9. Yacoub, M.D. The κ-μ distribution and the η-μ distribution. IEEE Antennas Propag. Mag. 2007, 49, 68–81. [Google Scholar] [CrossRef]
  10. Tashman, D.H.; Hamouda, W. Physical-Layer Security on Maximal Ratio Combining for SIMO Cognitive Radio Networks over Cascaded κ-μ Fading Channels. IEEE Trans. Cogn. Commun. Netw. 2021. [Google Scholar] [CrossRef]
  11. Tashman, D.H.; Hamouda, W. Physical-Layer Security for Cognitive Radio Networks over Cascaded Rayleigh Fading Channels. In Proceedings of the GLOBECOM 2020—2020 IEEE Global Communications Conference, Taipei, Taiwan, 7–11 December 2020; pp. 1–6. [Google Scholar] [CrossRef]
  12. Ata, S.Ö. Secrecy performance analysis over cascaded fading channels. IET Commun. 2019, 13, 259–264. [Google Scholar] [CrossRef]
  13. Eshteiwi, K.; Kaddoum, G.; Selim, B.; Gagnon, F. Impact of Co-Channel Interference and Vehicles as Obstacles on Full-Duplex V2V Cooperative Wireless Network. IEEE Trans. Veh. Technol. 2020, 69, 7503–7517. [Google Scholar] [CrossRef]
  14. Ghareeb, I.; Tashman, D. Statistical analysis of cascaded Rician fading channels. Int. J. Electron. Lett. 2018, 8, 46–59. [Google Scholar] [CrossRef]
  15. Ata, S.Ö. Physical layer security over cascaded Rayleigh fading channels. In Proceedings of the 2018 26th Signal Processing and Communications Applications Conference (SIU), Izmir, Turkey, 2–5 May 2018; pp. 1–4. [Google Scholar] [CrossRef]
  16. Ata, S.Ö. Secrecy Performance Analysis Over Double Nakagami-m Fading Channels. In Proceedings of the 2018 41st International Conference on Telecommunications and Signal Processing (TSP), Athens, Greece, 4–6 July 2018; pp. 1–4. [Google Scholar] [CrossRef]
  17. Kong, L.; Kaddoum, G.; da Costa, D.B. Cascaded α-μ Fading Channels: Reliability and Security Analysis. IEEE Access 2018, 6, 41978–41992. [Google Scholar] [CrossRef]
  18. Singh, R.; Rawat, M. Unified Analysis of Secrecy Capacity Over N*Nakagami Cascaded Fading Channel. In Proceedings of the 2018 18th International Symposium on Communications and Information Technologies (ISCIT), Bangkok, Thailand, 26–29 September 2018; pp. 422–427. [Google Scholar] [CrossRef]
  19. Kong, L.; Ai, Y.; He, J.; Rajatheva, N.; Kaddoum, G. Intercept Probability Analysis over the Cascaded Fisher-Snedecor F Fading Wiretap Channels. In Proceedings of the 2019 16th International Symposium on Wireless Communication Systems (ISWCS), Oulu, Finland, 27–30 August 2019; pp. 672–676. [Google Scholar] [CrossRef] [Green Version]
  20. Tashman, D.H.; Hamouda, W.; Dayoub, I. Secrecy Analysis Over Cascaded κ-μ Fading Channels With Multiple Eavesdroppers. IEEE Trans. Veh. Technol. 2020, 69, 8433–8442. [Google Scholar] [CrossRef]
  21. Jia, S.; Zhang, J.; Zhao, H.; Zhang, R. Relay Selection for Improved Security in Cognitive Relay Networks With Jamming. IEEE Wireless Commun. Lett. 2017, 6, 662–665. [Google Scholar] [CrossRef]
  22. Wang, H.; Wang, C.; Ng, D.W.K.; Lee, M.H.; Xiao, J. Artificial Noise Assisted Secure Transmission for Distributed Antenna Systems. IEEE Trans. Signal Process. 2016, 64, 4050–4064. [Google Scholar] [CrossRef]
  23. Zhou, X.; McKay, M.R. Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation. IEEE Trans. Veh. Technol. 2010, 59, 3831–3842. [Google Scholar] [CrossRef] [Green Version]
  24. Goel, S.; Negi, R. Secret communication in presence of colluding eavesdroppers. In Proceedings of the MILCOM 2005—2005 IEEE Military Communications Conference, Atlantic City, NJ, USA, 17–20 October 2005; Volume 3, pp. 1501–1506. [Google Scholar] [CrossRef]
  25. Jiang, K.; Jing, T.; Huo, Y.; Zhang, F.; Li, Z. SIC-Based Secrecy Performance in Uplink NOMA Multi-Eavesdropper Wiretap Channels. IEEE Access 2018, 6, 19664–19680. [Google Scholar] [CrossRef]
  26. Gradshteyn, I.S.; Ryzhik, I.M. Table of Integrals, Series, and Products; Academic Press: Cambridge, MA, USA, 2007. [Google Scholar]
  27. Milisic, M.; Hamza, M.; Hadzialic, M. Outage and symbol error probability performance of L-branch maximal-ratio combiner for generalized κ-μ fading. In Proceedings of the 2008 50th International Symposium ELMAR, Borik Zadar, Croatia, 10–12 September 2008; Volume 1, pp. 231–236. [Google Scholar]
  28. Adamchik, V.; Marichev, O. The algorithm for calculating integrals of hypergeometric type functions and its realization in REDUCE system. In Proceedings of the International Symposium on Symbolic and Algebraic Computation, Tokyo, Japan, 20–24 August 1990; pp. 212–224. [Google Scholar]
  29. Kamel, M.; Hamouda, W.; Youssef, A. Physical Layer Security in Ultra-Dense Networks. IEEE Commun. Lett. 2017, 6, 690–693. [Google Scholar] [CrossRef]
  30. Moualeu, J.M.; Hamouda, W. On the Secrecy Performance Analysis of SIMO Systems Over κ-μ Fading Channels. IEEE Commun. Lett. 2017, 21, 2544–2547. [Google Scholar] [CrossRef]
  31. Proakis, J.; Salehi, M. Digital Communications, 5th ed.; McGraw-Hill: New York, NY, USA, 2008. [Google Scholar]
  32. Mathai, A.M. A Handbook of Generalized Special Functions for Statistical and Physical Sciences; Oxford University Press: Oxford, MI, USA, 1993. [Google Scholar]
  33. Chergui, H.; Benjillali, M.; Saoudi, S. Performance Analysis of Project-and-Forward Relaying in Mixed MIMO-Pinhole and Rayleigh Dual-Hop Channel. IEEE Commun. Lett. 2016, 20, 610–613. [Google Scholar] [CrossRef] [Green Version]
  34. Prudnikov, A.; Brychkov, Y.; Marichev, O. Integrals Series: More Special Functions, Volume III of Integrals and Series; Gordon and Breach Science Publishers: New York, NY, USA, 1990. [Google Scholar]
  35. Singh, A.; Bhatnagar, M.R.; Mallik, R.K. Secrecy Outage of a Simultaneous Wireless Information and Power Transfer Cognitive Radio System. IEEE Wirel. Commun. Lett. 2016, 5, 288–291. [Google Scholar] [CrossRef]
  36. Su, R.; Wang, Y.; Sun, R. Destination-assisted jamming for physical-layer security in SWIPT cognitive radio systems. In Proceedings of the 2018 IEEE Wireless Communications and Networking Conference (WCNC), Barcelona, Spain, 15–18 April 2018; pp. 1–6. [Google Scholar] [CrossRef]
  37. Haenggi, M. On distances in uniformly random networks. IEEE Trans. Inf. Theory 2005, 51, 3584–3586. [Google Scholar] [CrossRef]
Figure 1. The system model.
Figure 1. The system model.
Futureinternet 13 00205 g001
Figure 2. The PDF of the received SNR at the eavesdropper ( γ E ) for multiple values of cascade level of the wiretap channel ( n e ) and multiple number of antennas at E ( K ) . κ e = 1 and μ e = 2 .
Figure 2. The PDF of the received SNR at the eavesdropper ( γ E ) for multiple values of cascade level of the wiretap channel ( n e ) and multiple number of antennas at E ( K ) . κ e = 1 and μ e = 2 .
Futureinternet 13 00205 g002
Figure 3. The lower bound of the secrecy outage probability ( O P s e c L ) versus the average received SNR at Bob ( γ B ¯ ) . For the main channel, κ = 0 , μ = 1 , and for the wiretap channel, κ e = 0 , μ e = 1 (Rayleigh). C t h = 1 , K = 2 , and γ E ¯ = 1 dB.
Figure 3. The lower bound of the secrecy outage probability ( O P s e c L ) versus the average received SNR at Bob ( γ B ¯ ) . For the main channel, κ = 0 , μ = 1 , and for the wiretap channel, κ e = 0 , μ e = 1 (Rayleigh). C t h = 1 , K = 2 , and γ E ¯ = 1 dB.
Futureinternet 13 00205 g003
Figure 4. The probability of non-zero secrecy capacity ( P n s c ) versus the average received SNR at Bob ( γ B ¯ ) . For the main channel, κ = 1 , μ = 2 , and for the wiretap channel, κ e = 1 , μ e = 2 . γ E ¯ = 10 dB.
Figure 4. The probability of non-zero secrecy capacity ( P n s c ) versus the average received SNR at Bob ( γ B ¯ ) . For the main channel, κ = 1 , μ = 2 , and for the wiretap channel, κ e = 1 , μ e = 2 . γ E ¯ = 10 dB.
Futureinternet 13 00205 g004
Figure 5. The 2D graph.
Figure 5. The 2D graph.
Futureinternet 13 00205 g005
Figure 6. The lower bound of the secrecy outage probability ( O P s e c L ) versus the distance between Alice and E for different number of antennas K. For the main channel, κ = 0 , μ = 1 , and for the wiretap channel, κ e = 0 , μ e = 1 . γ E ¯ = 1 dB, γ B ¯ = 10 dB, C t h = 1 , N = 2 , n e = 1 , β = 3 , d A p 1 = 5 m, and d p 1 B = 5 m.
Figure 6. The lower bound of the secrecy outage probability ( O P s e c L ) versus the distance between Alice and E for different number of antennas K. For the main channel, κ = 0 , μ = 1 , and for the wiretap channel, κ e = 0 , μ e = 1 . γ E ¯ = 1 dB, γ B ¯ = 10 dB, C t h = 1 , N = 2 , n e = 1 , β = 3 , d A p 1 = 5 m, and d p 1 B = 5 m.
Futureinternet 13 00205 g006
Figure 7. The intercept probability ( P i n t ) versus the density of E for different values of i. For the main channel, κ = 1 , μ = 1 , and for the wiretap channel, κ e = 1 , μ e = 1 . γ E ¯ = 1 dB, γ B ¯ = 5 dB, N = 2 , n e = 2 , α = 2 , K = 1 .
Figure 7. The intercept probability ( P i n t ) versus the density of E for different values of i. For the main channel, κ = 1 , μ = 1 , and for the wiretap channel, κ e = 1 , μ e = 1 . γ E ¯ = 1 dB, γ B ¯ = 5 dB, N = 2 , n e = 2 , α = 2 , K = 1 .
Futureinternet 13 00205 g007
Figure 8. The intercept probability ( P i n t ) versus the average received SNR at E. For the main channel, κ = 1 , μ = 1 , and for the wiretap channel, κ e = 1 , μ e = 1 . γ B ¯ = 5 dB, N = 2 , n e = 1 , α = 2 , λ e = 0.1 , and i = 1 .
Figure 8. The intercept probability ( P i n t ) versus the average received SNR at E. For the main channel, κ = 1 , μ = 1 , and for the wiretap channel, κ e = 1 , μ e = 1 . γ B ¯ = 5 dB, N = 2 , n e = 1 , α = 2 , λ e = 0.1 , and i = 1 .
Futureinternet 13 00205 g008
Figure 9. The probability of non-zero secrecy capacity ( P n s c ) for different values of the average received SNR at E ( γ E ¯ ) . For the main channel, κ = 2 , μ = 2 , and for the wiretap channel, κ e = 0 , μ e = 1 . N = 2 , n e = 1 , K = 1 , α = 2 , λ e = 0.1 , and i = 1 .
Figure 9. The probability of non-zero secrecy capacity ( P n s c ) for different values of the average received SNR at E ( γ E ¯ ) . For the main channel, κ = 2 , μ = 2 , and for the wiretap channel, κ e = 0 , μ e = 1 . N = 2 , n e = 1 , K = 1 , α = 2 , λ e = 0.1 , and i = 1 .
Futureinternet 13 00205 g009
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Tashman, D.; Hamouda, W. Cascaded κ-μ Fading Channels with Colluding and Non-Colluding Eavesdroppers: Physical-Layer Security Analysis. Future Internet 2021, 13, 205. https://0-doi-org.brum.beds.ac.uk/10.3390/fi13080205

AMA Style

Tashman D, Hamouda W. Cascaded κ-μ Fading Channels with Colluding and Non-Colluding Eavesdroppers: Physical-Layer Security Analysis. Future Internet. 2021; 13(8):205. https://0-doi-org.brum.beds.ac.uk/10.3390/fi13080205

Chicago/Turabian Style

Tashman, Deemah, and Walaa Hamouda. 2021. "Cascaded κ-μ Fading Channels with Colluding and Non-Colluding Eavesdroppers: Physical-Layer Security Analysis" Future Internet 13, no. 8: 205. https://0-doi-org.brum.beds.ac.uk/10.3390/fi13080205

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop