Professional Documents
Culture Documents
Maximal Ratio Diversity Combining Enhanced Security
Maximal Ratio Diversity Combining Enhanced Security
Performance Analysis of
Maximal Ratio Diversity
Combining Enhanced Security
EEE
2
Pabna University of Science and
Technology
1/15/2020
3
Outline
Introduction
Literature review
Motivation
System model
Performance analysis
Result
Discussion on result
Conclusion
Future work
References
EEE 1/15/2020
4
Introduction
Security: Security is an important issue in the multicasting wireless communication system, since
the wireless medium is susceptible to eavesdropping and fraud. Wireless multicasting networks are
mainly used to transmit personal and confidential information and we use diversity combining
technique for improvement of security
EEE 1/15/2020
6
Introduction
EEE 1/15/2020
7
Literature review
1.In Paper [1], Shannon first developed the conception of the information theoretic security.
2.In Paper [2], Secrecy capacity of independent identically distributed fast fading channel is
characterized under imperfect main channel estimation at the transmitter.
3.In Paper [3], A performance comparison among optimum selection combining (OSC),
maximal ratio combing(MRC) and conventional selection combining(CSC) diversity is
made by Ning Kong.
4. In Paper [4], A method of utilizing channel diversity to increase secrecy capacity in wireless
communication is analyzed.
5. In Paper [5], Bounds on the secrecy capacity with SC and MRC diversity techniques for
independent and identically distributed (i.i.d.) and evenly correlated Rayleigh fading
channel has been studied.
EEE 1/15/2020
8
Motivation
Motivated by their work discussed in [4],We would like to work in this sector.
EEE 1/15/2020
9
System Model
EEE
Figure 2. Diagram of the system model. 1/15/2020
10
Performance Analysis
𝑃𝑟(𝐶𝑠>0)=𝑃𝑟(𝐶𝑚>𝐶𝑒)=𝑃(𝛾 >𝛾 )
𝑀 𝑊
[6]
EEE 1/15/2020
11
Performance Analysis
EEE 1/15/2020
12
Result
EEE 3 4 1/15/2020
13
Discussion on Result
Figure 3 shows the outage probability 𝑃𝑜𝑢𝑡(𝑅𝑠) of the expected secrecy capacity 𝑅𝑠 = 0.1 for 𝐿𝑊 = 2 and  ̄𝛾𝑊 = 10𝑑𝐵
under different  ̄𝛾𝑀 and ratios of 𝐿𝑀/𝐿𝑊. It illustrates that 𝑃𝑜𝑢𝑡(𝑅𝑠) decreases with the increase of the diversity order. In
the extreme case that the available diversity for intended receiver is much larger than that of eavesdropper
(i.e. 𝐿𝑀/𝐿𝑊 →∞), 𝑃𝑜𝑢𝑡(𝑅𝑠) → 0.
Figure 4 shows the outage probability with two different 𝑅𝑠(𝑅𝑠 = 0.1 and 𝑅𝑠 = 1) as functions of  ̄𝛾𝑀 under
different ̄𝛾𝑀. Here, 𝐿𝑀 and 𝐿𝑊 are fixed to be 4 and 2 respectively. It could be observed that the outage probability
under 𝑅𝑠 = 0.1 is always lower than that under 𝑅𝑠 = 1. It also depicts that the higher  ̄𝛾𝑀, the lower outage
probability; and the higher  ̄𝛾𝑊, the higher the probability of an outage. With respect to the
asymptotic behavior of the outage secrecy capacity, it may be observed that when  ̄𝛾𝑀 ≫  ̄𝛾𝑊 and  ̄𝛾𝑀 →∞,
𝑃𝑜𝑢𝑡(𝑅𝑠) → 0.
Therefore, for the wireless channel with a low SNR, we can utilize the diversity to increase  ̄𝛾𝑀 and improve the
secrecy capacity.
EEE 1/15/2020
14
Conclusion
Based on our formulation and numerical results, we conclude that legitimate users
can take advantage of possible cooperative diversities to increase the secrecy
capacity. In order to obtain the target secrecy capacity with a reasonably low
outage probability, we can adjust the transmission power and diversity order.
Increasing the diversity order can effectively reduce the outage probability of a
normalized target secrecy capacity.
EEE 1/15/2020
15
Future work
We would like to extend the system model and outage probability formulation
in [4] with maximum ratio diversity combining. It is also
related to the MIMO channel models in [5]–[9].
However The is focus more on the diversity combining effects instead of
power allocation schemes, and studying the outage probability at a normalized
target secrecy capacity instead of the secrecy capacity itself.
1/15/2020
16
References
[1] C. E. Shannon, “Communication theory of secrecy systems,” Bell System Technical
Journal, vol. 28, pp. 656–715, October, 1949.
[2] A. A. M.-S. Rezki, Z.; Khisti, “On the ergodic secrecy capacity of the wiretap channel
under imperfect main channel estimation,” IEEEConference on Signals, Systems and
Computers (ASILOMAR), vol. 21, no. 1,pp. 952–957, November 1973.
[3] N. Kong, “Performance comparison among conventional selection combining,
optimum selection combining and maximal ratio combining,” IEEE International
Conference on Communications (ICC ’09), pp.1–6, 2009.
[4] F. He, H. Man, and W. Wang, “Maximal ratio diversity combining enhanced security,”
IEEE Commun. Letts., vol. 15, no. 5, pp. 509–511, December 2011.
[5] M. Sarkar and T. Ratnarajah, “Bounds on the secrecy capacity with diversity
combining techniques,” IEEE Wireless Communications and Networking Conference
(WCNC ’2012), pp. 2847–2851, April 2012.
EEE 1/15/2020
17
References
[6] P. Gopala, L. Lai, and H. El Gamal, “On the secrecy capacity of fading
channels,” IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687–4698,
2008.
[7] F. Oggier and B. Hassibi, “The secrecy capacity of the MIMO wiretap
channel,” in Proc. IEEE International Symposium on Information
Theory, 2008, pp. 524–528.
[8] A. Khisti and G. Wornell, “The MIMOME channel,” in Proc. 45th
Allerton Conference on Comnunication, Control and Computing, Sep.
2007, pp. 625–632.
EEE 1/15/2020