Performance analysis of physical layer security over independent/correlated log-normal fading channels

Xv Zhang, Gaofeng Pan, Chaoqing Tang, Tingting Li, Ying Weng

Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

9 Citations (Scopus)

Abstract

In this paper, we analyze the performance of the physical layer security for the classic Wyner's three-node model (including an eavesdropper) over independent/correlated lognormal fading channels. Considering the cases where the main and eavesdropper channels experience independent/correlated log-normal fading, we study the average secrecy capacity and secrecy outage (including the probability of non-zero secrecy capacity and secure outage probability), respectively. The approximated closed-form expressions for the average secrecy capacity, the probability of non-zero secrecy capacity, and secure outage probability have been derived for independent/correlated lognormal fading channels, respectively. Finally, the accuracy of our performance analysis is verified by simulation results.

Original languageEnglish
Title of host publication2014 Australasian Telecommunication Networks and Applications Conference, ATNAC 2014
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages23-27
Number of pages5
ISBN (Electronic)9781479950447
DOIs
Publication statusPublished - 23 Jan 2015
Externally publishedYes
Event2014 Australasian Telecommunication Networks and Applications Conference, ATNAC 2014 - Melbourne, Australia
Duration: 26 Nov 201428 Nov 2014

Publication series

Name2014 Australasian Telecommunication Networks and Applications Conference, ATNAC 2014

Conference

Conference2014 Australasian Telecommunication Networks and Applications Conference, ATNAC 2014
Country/TerritoryAustralia
CityMelbourne
Period26/11/1428/11/14

Keywords

  • Physical layer security
  • average secrecy capacity
  • log-normal channel
  • secure outage probability
  • the probability of non-zero secrecy capacity

ASJC Scopus subject areas

  • Computer Science Applications
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Performance analysis of physical layer security over independent/correlated log-normal fading channels'. Together they form a unique fingerprint.

Cite this