You are on page 1of 17

1

Performance Analysis of
Maximal Ratio Diversity
Combining Enhanced Security
EEE
2
Pabna University of Science and
Technology

Under Supervision of Prepared by


• Rosni sayed • Tanvir Ahmed
• Roll: 140203
• Assistant professor • 4th year 1st semester
• Electrical and Electronic Engineering • Department of EEE
• Pabna University of Science & Technology • Pabna University of Science & Technology

1/15/2020
3
Outline

 Introduction
 Literature review
 Motivation
 System model
 Performance analysis
 Result
 Discussion on result
 Conclusion
 Future work
 References

EEE 1/15/2020
4
Introduction

Security: Security is an important issue in the multicasting wireless communication system, since
the wireless medium is susceptible to eavesdropping and fraud. Wireless multicasting networks are
mainly used to transmit personal and confidential information and we use diversity combining
technique for improvement of security

Main Channel Reciever


Transmitter
Eavesdropper
Eavesdropper
channel

Figure 1: Security in communication channel


EEE 1/15/2020
5
Introduction
Diversity: A signal transmitted at a particular carrier frequency and at a particular instant of
time may be received in a multipath null. Diversity reception reduces the probability of
occurrence of communication failures (outages) caused by fades by combining several
copies of the same message received over different channels. In general, the efficiency of
the diversity techniques reduces if the signal fading is correlated at different branches.

Maximal Ratio Combining: Maximum-ratio combining (MRC) is a method of diversity


combining in which:
1. the signals from each channel are added together
2. the gain of each channel is made proportional to the rms signal level and inversely
proportional to the mean square noise level in that channel.
3. different proportionality constants are used for each channel.
MRC can restore a signal to its original shape.

EEE 1/15/2020
6
Introduction

An observation from these studies is that the secrecy capacity


decreases dramatically as the SNR of the legitimate
user decreases. In this work, we propose a solution which can
take the advantage of possible channel diversity to improve
the secrecy capacity, even under very low SNRs.

EEE 1/15/2020
7
Literature review

1.In Paper [1], Shannon first developed the conception of the information theoretic security.
2.In Paper [2], Secrecy capacity of independent identically distributed fast fading channel is
characterized under imperfect main channel estimation at the transmitter.
3.In Paper [3], A performance comparison among optimum selection combining (OSC),
maximal ratio combing(MRC) and conventional selection combining(CSC) diversity is
made by Ning Kong.
4. In Paper [4], A method of utilizing channel diversity to increase secrecy capacity in wireless
communication is analyzed.
5. In Paper [5], Bounds on the secrecy capacity with SC and MRC diversity techniques for
independent and identically distributed (i.i.d.) and evenly correlated Rayleigh fading
channel has been studied.

EEE 1/15/2020
8
Motivation

Motivated by their work discussed in [4],We would like to work in this sector.

With the presence of channel diversity, an intended


receiver can achieve a relatively high secrecy capacity even
at low SNRs. They present a theoretical analysis on the outage
probability at a normalized target secrecy capacity in Rayleigh
fading environment. Their numerical results strongly support the
conclusion that maximal ratio combining of channel diversity
can enhance the security of the wireless communication system
in normal operating scenarios.

EEE 1/15/2020
9
System Model

EEE
Figure 2. Diagram of the system model. 1/15/2020
10
Performance Analysis

1.Probability of Non-Zero Secrecy Capacity


The probability of non-zero secrecy capacity in the presence of multiple
eavesdropper can be defined as

𝑃𝑟(𝐶𝑠>0)=𝑃𝑟(𝐶𝑚>𝐶𝑒)=𝑃(𝛾 >𝛾 )
𝑀 𝑊
[6]

EEE 1/15/2020
11
Performance Analysis

2. Secure Outage Probability


The secure outage probability that the instantaneous secrecy capacity 𝐶𝑠 is less than a
target secrecy rate
Rs > 0, is

𝑃𝑜𝑢𝑡(𝑅𝑠) = 𝑃𝑟 (𝐶𝑠 < 𝑅𝑠) = [8]

EEE 1/15/2020
12
Result

EEE 3 4 1/15/2020
13
Discussion on Result

Figure 3 shows the outage probability 𝑃𝑜𝑢𝑡(𝑅𝑠) of the expected secrecy capacity 𝑅𝑠 = 0.1 for 𝐿𝑊 = 2 and  ̄𝛾𝑊 = 10𝑑𝐵
under different  ̄𝛾𝑀 and ratios of 𝐿𝑀/𝐿𝑊. It illustrates that 𝑃𝑜𝑢𝑡(𝑅𝑠) decreases with the increase of the diversity order. In
the extreme case that the available diversity for intended receiver is much larger than that of eavesdropper
(i.e. 𝐿𝑀/𝐿𝑊 →∞), 𝑃𝑜𝑢𝑡(𝑅𝑠) → 0.
Figure 4 shows the outage probability with two different 𝑅𝑠(𝑅𝑠 = 0.1 and 𝑅𝑠 = 1) as functions of  ̄𝛾𝑀 under
different ̄𝛾𝑀. Here, 𝐿𝑀 and 𝐿𝑊 are fixed to be 4 and 2 respectively. It could be observed that the outage probability
under 𝑅𝑠 = 0.1 is always lower than that under 𝑅𝑠 = 1. It also depicts that the higher  ̄𝛾𝑀, the lower outage
probability; and the higher  ̄𝛾𝑊, the higher the probability of an outage. With respect to the
asymptotic behavior of the outage secrecy capacity, it may be observed that when  ̄𝛾𝑀 ≫  ̄𝛾𝑊 and  ̄𝛾𝑀 →∞,
𝑃𝑜𝑢𝑡(𝑅𝑠) → 0.
Therefore, for the wireless channel with a low SNR, we can utilize the diversity to increase  ̄𝛾𝑀 and improve the
secrecy capacity.

EEE 1/15/2020
14
Conclusion

Based on our formulation and numerical results, we conclude that legitimate users
can take advantage of possible cooperative diversities to increase the secrecy
capacity. In order to obtain the target secrecy capacity with a reasonably low
outage probability, we can adjust the transmission power and diversity order.

Increasing the diversity order can effectively reduce the outage probability of a
normalized target secrecy capacity.

EEE 1/15/2020
15
Future work

We would like to extend the system model and outage probability formulation
in [4] with maximum ratio diversity combining. It is also
related to the MIMO channel models in [5]–[9].
However The is focus more on the diversity combining effects instead of
power allocation schemes, and studying the outage probability at a normalized
target secrecy capacity instead of the secrecy capacity itself.

1/15/2020
16
References
[1] C. E. Shannon, “Communication theory of secrecy systems,” Bell System Technical
Journal, vol. 28, pp. 656–715, October, 1949.
[2] A. A. M.-S. Rezki, Z.; Khisti, “On the ergodic secrecy capacity of the wiretap channel
under imperfect main channel estimation,” IEEEConference on Signals, Systems and
Computers (ASILOMAR), vol. 21, no. 1,pp. 952–957, November 1973.
[3] N. Kong, “Performance comparison among conventional selection combining,
optimum selection combining and maximal ratio combining,” IEEE International
Conference on Communications (ICC ’09), pp.1–6, 2009.
[4] F. He, H. Man, and W. Wang, “Maximal ratio diversity combining enhanced security,”
IEEE Commun. Letts., vol. 15, no. 5, pp. 509–511, December 2011.
[5] M. Sarkar and T. Ratnarajah, “Bounds on the secrecy capacity with diversity
combining techniques,” IEEE Wireless Communications and Networking Conference
(WCNC ’2012), pp. 2847–2851, April 2012.

EEE 1/15/2020
17
References
[6] P. Gopala, L. Lai, and H. El Gamal, “On the secrecy capacity of fading
channels,” IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687–4698,
2008.
[7] F. Oggier and B. Hassibi, “The secrecy capacity of the MIMO wiretap
channel,” in Proc. IEEE International Symposium on Information
Theory, 2008, pp. 524–528.
[8] A. Khisti and G. Wornell, “The MIMOME channel,” in Proc. 45th
Allerton Conference on Comnunication, Control and Computing, Sep.
2007, pp. 625–632.

EEE 1/15/2020

You might also like