Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
1, FEBRUARY 2013
1+U
Manuscript received September 10, 2012. The associate editor coordinating = Pr ln >h , (7)
the review of this letter and approving it for publication was X. Wang. 1+W
X. Liu is with the Department of Systems Engineering, University of
Arkansas at Little Rock, USA (e-mail: xxliu@ualr.edu). where h = ln 2. The OP defined in (7) can be further
Digital Object Identifier 10.1109/WCL.2012.101812.120660 elaborated to the following expression:
2162-2337/13$31.00
c 2013 IEEE
LIU: PROBABILITY OF STRICTLY POSITIVE SECRECY CAPACITY OF THE RICIAN-RICIAN FADING CHANNEL 51
Ph 2
1+U Q1 (0, ) = exp . (13)
= Pr > exp(h) 2
1+W
= b(1 + kb ) exp(kb )
III. P ERFORMANCE E VALUATION
exp[b(1 + kb )w]I0 2 bkb (1 + kb )w
0 The relative strength of the main channel compared to the
Q1 2ka , 2a(1 + ka )[exp(h)(1 + w) 1] dw. eavesdropper channel can be characterized by the ratio of the
average of U to the average of W , i.e.,
(8)
E(U ) b
The derivation of (8) is included in the Appendix. r = = . (14)
In secure communications, the probability of strictly pos- E(W ) a
itive secrecy capacity (SPSC) is a fundamental benchmark.
Then (10) can be rewritten as follows:
This probability can be obtained by setting h = 0 in (8):
2kb (1+ka ) 2ka r(1+kb )
P0 = b(1 + kb ) exp(kb ) exp[b(1 + kb )w] P0 = 1 Q1 r(1+kb )+(1+ka ) , r(1+kb )+(1+ka )
0
+ r(1+kr(1+kb )
exp kb (1+ka )+rka (1+kb )
I0 2 bkb (1 + kb )w b )+(1+ka ) r(1+kb )+(1+ka )
2 rka kb (1+kb )(1+ka )
Q1 2ka , 2a(1 + ka )w dw. (9) I0 r(1+kb )+(1+ka ) . (15)
r
2 abka kb (1+kb )(1+ka ) P0 = 1 + 1
I0 b(1+kb )+a(1+ka ) . (10) r + 1 + ka
r(r + 1)
The derivation outline of (10) is included in the Appendix. exp(r) exp . (16)
r + 1 + ka
We note that the Marcum Q function is supported by most
engineering mathematics software packages, including Matlab. The impact of ka on P0 can be analytically evaluated by
The availability of a closed-form expedites many procedures
in numerical simulation. P0 ka r2 r(r + 1)
= exp(r) exp .(17)
In the communication theory, the Rician factor k is defined ka (r + 1 + ka )3 r + 1 + ka
as the ratio of the signal power of the dominant path to the
sum of scattered power. The values of k up to 16 (about 12 dB) Since the value of (17) is always positive, it is concluded
were reported in the literature. On the other hand, when k = that P0 will increase as ka increases. This result is especially
0, the Rician distribution becomes the Rayleigh distribution. important in the regime of r < 1, since it implies that the
Therefore, (10) can be used to characterize the following four secrecy can still be improved even when the eavesdropper
cases: channel is stronger than the main channel on the average. The
1) Rayleigh/Rayleigh (ka = kb = 0); similar result can also be obtained for the case of kb > 0.
2) Rayleigh/Rician (ka = 0, kb > 0); However, it is cumbersome to conduct an analysis like (17).
3) Rician/Rayleigh (ka > 0, kb = 0); So we turn to the numerical means. To gain an insight for the
4) Rician/Rician (ka > 0, kb > 0). impact of the eavesdropper channel, eq. (15) can be rewritten
as follows:
In particular, for the first case, (10) could be reduced to:
E(U ) 2cka (1+ka ) 2ka r(1+cka )
P0 =
b
= . (11) P0 = 1 Q1 r(1+cka )+1+ka , r(1+cka )+1+ka
b+a E(U ) + E(W )
r(1+cka ) rka (1+cka )+cka (1+ka )
+ r(1+cka )+1+ka exp r(1+cka )+1+ka
This is just the result reported in [6] (eq. 7). The second case
is not representative in practice. For the third case, (10) could 2ka cr(1+cka )(1+ka )
I0 r(1+cka )+1+ka , (18)
be simplified to:
bka
P0 = 1 exp where c = kb /ka . Three example profiles of (18) are illus-
b + a(1 + ka )
trated in Figs. 2 through 4. It is observed that the probability
b bka of SPSC is nonzero even when r < 1. Secondly, P0 will
+ exp
b + a(1 + ka ) b + a(1 + ka ) increase as ka increases. Finally, as kb decreases while ka is
a(1 + ka ) bka fixed, P0 will increase in the regime of r < 1 but tend to be
= 1 exp (12)
.
b + a(1 + ka ) b + a(1 + ka ) flat in the regime of r > 1.
52 IEEE WIRELESS COMMUNICATIONS LETTERS, VOL. 2, NO. 1, FEBRUARY 2013
k =2 k = 10
a a
0.8 1
0.8
0.6
0.6
0.4
P0
0
P
0.4
0.2
0.2
0 0
2 2
1.5 1 1.5 1
0.8 0.8
1 0.6 1 0.6
0.5 0.4 0.5 0.4
0.2 0.2
r 0 0 r 0 0
c c
ka = 6
A PPENDIX
1
Proof of (8):
From (7), we have:
0.8
1+U
0.6 Ph = Pr > exp(h)
1+W
P0
0.4
= Pr[U > (1 + W ) exp(h) 1]
0.2
= fW (w) fU (u)du dw
0 0 (1+w) exp(h)1
2
1.5 1
1
0.8 = fW (w) (1 FU [exp(h)(1 + w) 1]) dw
0.6 0
0.5 0.4
0.2
r 0 0
c = 1 fW (w)FU [exp(h)(1 + w) 1]dw
0
From [8] (eq. 2.5), we have: Combining (19) with (20), we obtain:
2
P0,0 (A, B; r) x + A2
2
x exp I0 (Ax)Q1 (B, rx)dx
x + A2 0 2
= x exp I0 (Ax)
0 2 Ar B
rx 2
= 1 Q1 ,
y + B2 1 + r2 1 + r2
y exp I0 (By)dy dx
2 1 (A2 r2 + B 2 ) ABr
0 2
+ exp I0 . (21)
x + A2 1 + r2 2(1 + r2 ) 1 + r2
= x exp I0 (Ax)
0 2 With appropriate variable substitutions, (21) leads to (10).
2
y + B2
1 y exp I0 (By)dy dx
rx 2 R EFERENCES
2
x + A2 [1] C. E. Shannon, Communication theory of secrecy systems, Bell Syst.
= x exp I0 (Ax)[1 Q1 (B, rx)]dx
0 2 Tech. J., vol. 28, pp. 656715, 1949.
2
[2] A. D. Wyner, The wire-tap channel, Bell Syst. Tech. J., vol. 54, pp.
x + A2 13551387, 1975.
= 1 x exp I0 (Ax)Q1 (B, rx)dx. [3] I. Csiszar and J. Korner, Broadcast channels with confidential mes-
0 2
sages, IEEE Trans. Inf. Theory, IT-vol. 24, no. 3, pp. 339348, 1978.
(19) [4] S. K. Leung-Yan-Cheong and M. E. Hellman, The Gaussian wiretap
channel, IEEE Trans. Inf. Theory, vol. IT-24, no. 4, pp. 451456, 1978.
Note that in [8] the lower-case symbols (a, b) were used. [5] P. K. Gopala, L. Lai, and H. E. Gamal, On the secrecy capacity of
In (19) the upper-case symbols (A, B) are used, since in fading channels, IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687
the present work we have used the lower-case counterpart to 4698, 2008.
[6] M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin,
represent 1/E(U ) and 1/E(W ). On the other hand, from [8] Wireless information-theoretic security, IEEE Trans. Inf. Theory, vol.
(eq. 3.5), we have: 54, no. 6, pp. 25152534, 2008.
[7] M. K. Simon and M.-S. Alouini, Digital Communication over Fading
P0,0 (A, B; r) Channels, 2nd edition. Wiley-Interscience, 2005.
[8] R. Price, Some non-central F-distributions expressed in closed form,
Ar B
= Q1 , Biometrika, vol. 51, pp. 107122, 1964.
1 + r2 1 + r2
1 (A2 r2 + B 2 ) ABr
exp I0 .(20)
1 + r2 2(1 + r2 ) 1 + r2