1. Introduction
An important limitation to the capacity of wireless communication systems is a correlation, which mostly depends upon the antenna spacing of multi-antenna systems [1]. Likewise, it has recently been also proved that the effect of correlation decreases the diversity gain [2]. However, diversity combining techniques are the traditional means to combat the effects of correlation significantly. On the other hand, multicasting is an efficient wireless communication technique for group-oriented and personal communication such as video-conferencing, e-learning, etc. Due to the increase in application areas and the mobility of users with network components, security is a crucial aspect of wireless multicasting systems because the medium of wireless multicasting is susceptible to eavesdropping and fraud [3]. Therefore, the explosive growth of wireless multicasting services inevitably renders security into a challenging quality of service constraint that must be accounted for in the design of wireless multicasting networks.
Mitigating the effects of correlation, the enhancing security in multicasting through correlated fading channels is also a challenging task for the researchers in this field. Since the diversity combining techniques are the efficient means to combat the effects of correlation significantly, it is well recognized that the security in the correlated multicast networkscan be improved by employing diversity combining techniques.
A. Related Works
Recently, Shrestha et al. [4] studied a secure wireless multicasting scenario through a quasi-static Rayleigh fading channel in the presence of multiple eavesdroppers where each eavesdropper was equipped with multiple antennas. Authors showed that the physical layer security could be achieved even in the presence of multiple multi-antenna eavesdroppers. But authors did not consider the effect of correlation on the security in multicasting. In [5] [6], Giti et al. respectively used selective precoding and phase alignment precoding to enhance the security in multicasting by eliminating interference power. Sayed et al. [7] studied a secure wireless multicasting scenarios through multi-cellular multiple-input multiple-output (MIMO) networks with linear equalization and investigated the effect of interference on the distributed and co-located MIMO channels. But authors did not consider the effect of correlation and the method that can be used to reduce the effect of correlation. An iterative algorithm was used by Nguyen et al. [8] to enhance the security in cooperative cognitive radio multicast networks. The opportunistic relaying technique was also used by Nguyen et al. [9] to study the security of a half-duplex cognitive radio network. But authors did not consider the effects of correlation on the security analysis of multicasting. Kundu et al. [10] studied secure wireless multicasting through Generalized-K fading channels and derived the closed-form analytical expressions for the probability of non-zero secrecy multicast capacity and the secure outage probability for multicasting without considering the effects of correlation. Borshon et al. [11] investigated the effects of Weibull fading parameter on the security in multicasting. In [12], A. S. M. Badrudduza and M. K. Kundu investigated the effects of
fading parameters on the security in a multicasting scenario. Atallah and Kaddoum [13] used partial cooperation to enhance the security in wireless networks in the presence of passive eavesdroppers. Sultana et al. [14] enhanced the security in cognitive radio multicast network using interference power. But authors did not consider the effects of correlation on the security of multicasting and did not use any technique to eliminate the effects of correlation. In [15], the opportunistic relaying technique was used by Kibria et al. to enhance the security in multicasting without considering the effects of correlation. Sun et al. [16] investigated the impact of antenna correlation on the security of single-input multiple-output (SIMO) channel in the presence of multiple eavesdroppers. But authors used a unicasting scenario to investigate that effect and did not consider the effect of correlation on the multicasting network. In [17], Badrudduza et al. used the opportunistic relaying technique to reduce the effect of correlation on the security in multicasting over Nakagami-m fading channels. The authors did not mention the method that can be used to reduce that effect of correlation and which method is more efficient.
B. Existing Research Gap
Based on the aforementioned scenario available in the literature, it is observed that the compensation of the loss of security due to correlation in multicellular interference network using 1) diversity combining and 2) opportunistic relaying is still an open problem. Moreover, the performance comparison of different diversity combining techniques is an important issue to know, which combining technique is more significant for enhancing security in multicellular interference network mitigating the effect of correlation.
C. Contributions
Motivated by the aforementioned research gap in the literature and the importance of security in practical multicasting, in this paper, the authors studied a multicasting scenario through a cellular network and developed the mathematical model to ensure its security considering the effect of correlation. The authors use SC and SSC diversity schemes and compare their performance in enhancing security in correlated cellular networks and mitigating the effects of correlation. The major contributions of this paper can be summarized as follows.
• Based on the PDFs of dual arbitrarily correlated Nakagami-m fading channel with SC and SSC diversity schemes, at first, authors derive the expressions for the PDFs of the SNR of each multicast user and eavesdropper considering the effect of correlation.
• Secondly, using these PDFs of SNRs, the authors derive the PDFs of multicast channel and eavesdropper channel.
• Thirdly, the authors use the PDFs of multicast channel and eavesdropper channel to derive the analytical expressions for the probability of non-zero secrecy multicast capacity and the secure outage probability for multicasting.
• Finally, authors investigate the effect of correlation on the SC and SSC diversity schemes and quantify, which diversity scheme is more efficient in enhancing the security of cellular multicast network by mitigating the effects of correlation.
The remainder of this paper is organized as follows. Sections 2 and 3 describe the system model and problem formulation, respectively. The expressions for the probability of non-zero secrecy multicast capacity and the secure outage probability for multicasting are derived respectively in Sections 4 and 5. Numerical results are presented in Section 6. Finally, Section 7 draws the conclusions of this work.
2. System Model
A confidential wireless multicasting scenario shown in Figure 1 is considered in which a base station (BS) communicates with a group of M multicast users in the presence of N eavesdroppers. The BS is equipped with single antenna, and each multicast user and eavesdropper are equipped with
and
antennas, respectively. The antennas of multicast users and eavesdroppers are correlated with coefficient
. The transmitter transmits x with power P to the destination users M, and N eavesdroppers try to decode the transmitted signal. Let
and
are the received signals at the ith (
) destination user and jth (
) eavesdropper, respectively. Then, we have
(1)
(2)
where
and
denote the channel coefficients from BS to ith destination user, and to jth eavesdropper, respectively.
and
denote the additive white Gaussian noise (AWGN) at the ith destination user, and jth eavesdropper with zero mean and variances
and
, respectively. The instantaneous signal-to-noise ratio (SNR) at the ith destination user and jth eavesdropper can be expressed as
and
, respectively.
3. Problem Formulation
In this section, authors derive the expressions for the probability density functions (PDFs) of the SNRs of multicast channels and eavesdropper channels based on the PDFs of SNRs of ith destination user and jth eavesdropper with SC and SSC diversity schemes, respectively.
A. The PDF of
and
Let
and
denotes the PDFs of
and
with SC, and
and
denotes the PDFs of
and
with SSC diversity schemes, respectively.
1) PDF with SC diversity: Since the SC scheme chooses the highest SNR’s branch using the relationship
, therefore the PDF of
for dual arbitrary correlated Nakagami-m fading channel with SC diversity is given by [18]
(3)
where
, m denotes the Nakagami-m fading parameter and
is the first order Marcum Q-function defined as
(4)
Using the identity of Equation (4), the expression of
can be written as
(5)
Similarly, the PDF of
for dual arbitrary correlated Nakagami-m fading channel with SC diversity is given by,
(6)
2) PDF with SSC diversity: Since the SSC diversity scheme selects a particular diversity branch until its SNR drops a predetermined threshold value, therefore, the PDF of SNR with SSC diversity can be defined considering two cases such as, when 1)
and 2)
, where
denotes the threshold SNR. Hence, the PDF of
for dual arbitrary correlated Nakagami-m fading channel with SSC diversity is given by [18]
(7)
where
and
. Using the identity of Equation (4), the expressions of
can be written as
(8)
where
. Similarly, the expression of
can be expressed as
(9)
where
and
.
B. The PDF of SNR for Multicast Channels
Let
, then the PDF of
can be defined as [19] [20]
(10)
where
denotes the cumulative distribution function (CDF) of
.
1) The PDF of
with SC diversity: Let
denotes the PDF of
with SC diversity. Then,
can be defined as
(11)
Substituting the value of
in Equation (11) and using the following identities of [21] stated in Equations (3.351.2) and (1.111),
(12)
(13)
the expression of
can be derived as
(14)
where the expression of
is shown in Equation (15) at the bottom of the next page,
,
,
,
,
,
,
,
and
.
(15)
2) The PDF of
with SSC diversity: Let
denotes the PDF of
with SSC diversity. Then,
can be defined as
(16)
In order to simplify, only the case of
is considered to derived the expression of
. Substituting the value of
in Equation (16) and using the identities of Equations (12) and (13), the expression of
can be written as
(17)
where
.
C. The PDF of SNR for Eavesdropper Channels
Let
, then the PDF of
can be defined as [3] [19]
(18)
where
denotes the CDF of
.
1) PDF with SC diversity
Let
denotes the PDF of
with SC diversity. Then,
can be defined as
(19)
Substituting the value of
in Equation (19) and using the identities of Equations (12) and (13), the expression of
can be derived as
(20)
where the expression of
is shown in Equation (21) at the bottom of the next page,
,
,
,
,
,
,
,
and
.
(21)
2) PDF with SSC diversity: Let
denotes the PDF of
with SSC diversity. Then,
can be defined as
(22)
Substituting the value of
in Equation (22) and using the identities of Equations (12) and (13), the expression of
is given by,
(23)
where
.
4. Probability of Non-Zero Secrecy Multicast Capacity
The probability of non-zero secrecy multicast capacity can be defined as
(24)
A.
with SC diversity
Let
denotes the probability of non-zero secrecy multicast capacity with SC diversity, then
is defined as
(25)
Substituting the values of
and
in Equation (25) and performing integration, the closed-form analytical expression for
is given in Equation (26) at the bottom of this page, where
,
,
,
,
,
,
(26)
B.
with SSC Diversity
Let
denotes the probability of non-zero secrecy multicast capacity with SSC diversity, then
is defined as
(27)
Substituting the values of
and
in Equation (27) and performing integration using the following identity of [21] stated in Equations (3.351.3), the closed-form analytical expression for
is given in Equation (28) at the bottom of the nest page,
where
,
,
,
and
.
(28)
5. Secure Outage Probability for Multicasting
The secure outage probability for multicasting can be defined as
(29)
where
and
denotes the target secrecy multicast rate.
A.
with SC diversity
Let
denotes the secure outage probability for multicasting with SC diversity, then
is defined as
(30)
Substituting the values of
and
in Equation (30) and performing integration, the closed-form analytical expression for
is given in Equation (31) at the bottom of the next page, where
(31)
B.
with SSC diversity
Let
denotes the secure outage probability for multicasting with SSC diversity, then
is defined as
(32)
Substituting the values of
and
in Equation (32) and performing integration, the closed-form analytical expression for
is given in Equation (33) at the bottom of the next page,
(33)
where
and
.
6. Numerical Results
Figure 2 shows the probability of non-zero secrecy multicast capacity,
, with SC and SSC diversity schemes, as a function of the average SNR of the multicast channel,
, with
. This figure shows the comparison between SC and SSC diversity schemes in terms of the effect of channel correlation,
, on the
for selected values of system parameters. It is observed that the effect of correlation on the SSC diversity is higher than the SC diversity scheme. Hence, it can be concluded that SC outperforms than SSC diversity in enhancing security of correlated cellular networks.
The
is shown in Figure 3 as a function of the average SNR of the multicast channel,
, for different values of
. This figure describes the effect of channel correlation,
, on the
for SC diversity scheme for selected values of system parameters. It is seen that the
Figure 2. Comparison between SC and SSC diversity schemes in terms of the effect of channel correlation,
, on the
with
,
,
,
,
and
.
Figure 3. Effect of channel correlation,
, on the
for SC diversity scheme with
,
,
,
,
and
.
decreases if the values of
increases from 0.5 (indicated by the solid line) to 0.9 (indicated by the dash-dot line). This is because, the increase in correlation coefficient decreases the antenna diversity gain of multicast users which in turn causes the reduction in secrecy multicast capacity.
Figure 4 describes the effect of channel correlation,
, on the
for SSC diversity scheme for selected values of system parameters. Similar to the case of SC diversity,
decreases if the values of
increases from 0.5 (indicated by the solid line) to 0.9 (indicated by the dash-dot line). But the effect of
on the
is higher compared to the case of SC diversity scheme.
The
is shown in Figure 5 as a function of the average SNR of the multicast channel,
, for different values of M. This figure illustrates the effects of the number of multicast users, M, on the
for SC and SSC diversity schemes for selected values of system parameters. It is observed that, in the case of SC diversity, the
decreases, if the value of M increases from 10 (indicated by the dash-dot-dot line) to 20 (indicated by the solid line) keeping the value of
. Similarly, in the case of SSC diversity, the
decreases, if the values of M increases from 10 (indicated by the dash-dot line) to 20 (indicated by the solid line with square) keeping the value of
. It is seen that although
decreases with M, but the effect of M is higher in the case of SSC diversity compared to the case of SC diversity. This is because, the increasing in M, the bandwidth of each user decreases and the SSC diversity scheme enhances this effect compared to the SC diversity.
Figure 6 shows
as a function of the average SNR of the multicast channel,
, for different values of m and
. This figure compares the effects of m and
on the
for SC and SSC diversity schemes. The effects of fading parameter m and
on the SC diversity is higher than the SSC diversity scheme. This is because, the SC scheme chooses the highest
Figure 4. Effect of channel correlation,
, on the
for SSC diversity scheme with
,
,
,
,
and
.
Figure 5. Effect of the number of multicast users, M, on the
for SC and SSC diversity schemes with
,
,
,
and
.
Figure 6. Effect of fading parameter, m, and the average SNR of eavesdropper channel,
on the
for SC and SSC diversity schemes with
,
,
,
and
.
SNR’s branch and the SSC diversity scheme selects a particular diversity branch until its SNR drops a predetermined threshold value. In the case of SC diversity, when the value of
increases the capacity of eavesdropper’s channel increases which causes an reduction in the secrecy capacity. On the other hand, the selection of a particular diversity branch cannot ensures the selection of highest SNR branch of eavesdropper channel. The effect of fading causes an reduction in the SNRs of multicast channel and eavesdropper channel. Therefore, the choice of highest SNR branch of eavesdropper channel incorporate lower effect of fading parameter. Moreover, fading is not the enemy of secrecy capacity. Hence, the effects of m and
on the SC diversity decrease the security significantly compared to the effects of m and
on the SSC diversity.
The
is shown in Figure 7 as a function of the average SNR of the multicast channel,
, for different values of M and N. This figure describes the effects of M on the SSC diversity and the effects of N on the SC diversity in terms of
for selected values of system parameters. It is observed that the
increases if the values of M increases from 4 (indicated by the solid line with square) to 8 (indicated by the dash line) keeping the value of
.
also increases if the values of N increases from 4 (indicated by the solid line) to 8 (indicated by the long dash-dot line) keeping the value of
. Hence, it can be concluded that the security for any kind of diversity scheme decreases due to the effects of both M and N.
The
is shown in Figure 8 as a function of the average SNR of the multicast channel,
, for different values of
. This figure describes the effects of
on the SC and SSC diversity schemes in terms of
for selected values of system parameters. It is seen that in both the cases of SC and SSC diversity schemes, the
increases if the values of
increases from 0.5 (indicated by the dash-dot line for SC and dash dot-dot line for SSC) to 0.9 (indicated by the long dash-dot line for SC and solid line for SSC), which causes an reduction in the security of multicast network.
Figure 7. Effect of the number of multicast users, M, and eavesdroppers, N, on the
for SSC and SC diversity schemes, respectively, with
,
,
,
and
.
Figure 8. Effect of channel correlation,
, on the
for SC and SSC diversity schemes with
,
,
,
,
and
.
Therefore, based on the closed-form analytical expressions for the probability of non-zero secrecy multicast capacity and the secure outage probability for multicasting, and from the observations of numerical results, the main findings of this paper can be summarized as follows: the security in multicasting degrades with the number of multicast users and eavesdroppers, and due to the antenna correlation. The effect of antenna correlation is more significant in the case of SSC diversity compared to the case of SC diversity. Due to the selection mechanism of SC diversity, it is more sensitive to the change of SNR of eavesdropper’s channel compared to the case of SSC diversity scheme.
7. Conclusion
This paper focuses on the comparison of SC and SSC diversity schemes in enhancing the security of correlated cellular network and mitigating the effects of antenna correlation. To achieve this goal, an analytical model has been developed consisting of the closed-form analytical expressions for the probability of non-zero secrecy multicast capacity and the secure outage probability for multicasting considering the effects of antenna correlation. The developed analytical model is verified via Monte-Carlo simulation. The matching between the analytical and simulation results justifies the validity of the developed analytical model. Based on the analytical model and the observation of the numerical results, it can be concluded that the antenna correlation degrades the security of the cellular network in both the cases of SC and SSC diversity schemes, but the effect of this correlation is more significant in the case of SSC diversity compared with the case of SC diversity. In general, diversity schemes reduce the effect of correlation, but this result paves the way for selecting an efficient diversity scheme to mitigate the effect of correlation efficiently.