Enhancement of Multicast Security with Opportunistic Relaying Technique over κ-μ Shadowed Fading Channels ()
1. Introduction
The statistical characterization of fading is an important issue in wireless communication system. The most promising method, for improving wireless links by reducing the impacts of fading, scatterers, fluctuations, etc., is cooperative diversity with the best relay selection [1] [2] [3] [4]. On the other hand, multicasting is an effective means of group-oriented wireless data transmission such as video-conference, distance education [5], etc. The open nature of wireless network makes them vulnerable to fraud and eavesdropping. The conventional cryptographic schemes are not able to provide a secure framework for multicasting. Therefore, a key strategy for achieving information-theoretic security in multicasting is the physical layer security.
1.1. Related Works
Recently, zero-forcing (ZF) multiplexing system was used in [6] [7] to increase the spectral efficiency with the help of linear equalization. The secrecy performance of wireless physical layer security was analyzed in [8] over α-κ-μ and α-η-μ fading channels. The physical layer security was studied in [9] over κ-μ/Gamma composite fading channels. In [10], author focused on the performance comparison of multicasting over Rician-K and Rayleigh fading channels. In [11] [12], authors investigated the secrecy performance over the cascaded α-μ fading channels. In the above papers, they did not consider the effects of shadowing.
Wyner’s wiretap model was used in [13] [14] to investigate the secrecy performance over κ-μ shadowed fading channels. In [15], author studied the performance of receiver by different types of diversity combining techniques. Authors analyzed the secrecy capacity in [16] considering the effects of interferences. The security in κ-μ shadowed fading channels was analyzed in [17] with the ergodic secrecy capacity. In [18], author showed the effects of scattering over multiple-input multiple-output (MIMO) system. In [19], author investigated the effects of shadowing on the performance of multicasting over κ-μ shadowed fading channels. In [20], authors investigated the effects of correlation and shadowing on the performance of multicasting. But the authors of the above papers did not consider the opportunistic relaying technique enhancing security for multicasting.
1.2. Contributions
Based on the aforementioned scenario available in the literature and motivated by the importance of security in multicasting, the authors in this work investigated a secure wireless multicasting scenario using κ-μ shadowed fading channels when multiple eavesdroppers are present. Authors developed a mathematical model to ensure that security in κ-μ shadowed fading channels with opportunistic relaying system. We can summarize the major contributions of this paper below.
● At first, based on the probability density function (PDF) of κ-μ shadowed fading channels [15], authors derived closed-form analytical expressions for the PNSMC and the SOPM.
● Then, the effects of power ratio between dominant and scattered waves, fluctuation parameter, and the number of propagation clusters, multicast users, eavesdroppers and relays on the PNSMC and the SOPM are investigated.
● Finally, the derived analytical expressions are justified via Monte-Carlo simulation.
The remaining part of this paper has been arranged as follows. Section II explains the system model and section III narrates the problem formulation. The equations for the PNSMC and the SOPM have been derived respectively in Section IV and V. Section VI describes the numerical results. In the end, the conclusions of this paper are represented in Section VII.
2. System Model
A secure wireless multicasting communication scenario shown in Figure 1 is considered through κ-μ Shadowed fading channels in the presence of multiple eavesdroppers. This figure consists of one transmitter, a group of R relays, M number of destination receivers and N number of eavesdroppers. The transmitter sends a common stream of confidential information to the M destination receivers via R relays. The eavesdroppers are trying to decode that confidential information. The objective of this research is to establish a secure communication between transmitter and destination receivers by preventing this eavesdropping. The channel between transmitter and destination receiver is known as multicast channel and the channel between transmitter and eavesdropper is known as eavesdropper’s channel. We consider all the multicast channels and eavesdropper’s
channels experience independent κ-μ shadowed fading. κ and μ denote two physical fading parameters of this system. κreflects a real positive number representing the power ratio between dominant and scattered-wave components and μ reflects a positive real number representing the effective number of propagation clusters.
3. Problem Formulation
This section deals with the derivation of the closed-form analytical expressions for the PDFs of multicast channels and eavesdropper’s channels.
3.1. The PDF of κ-μ Shadowed Fading Channels
Let
denotes the SNR of each sub-channel of multicast channel. Then, the PDF of
denoted by
for the κ-μ shadowed fading channels is given by [15] [17],
(1)
where
is the confluent hypergeometric function which is defined as
. Substituting this formula in Equation (1),
can be found as
(2)
where
,
,
and
.
3.2. The PDF of SNR of Source-to-kth Relay
Let
denotes the SNR of source-to-kth relay. Then, the PDF of
denoted by
for the κ-μ shadowed fading channels is given by,
(3)
where
,
,
and
.
3.3. The PDF of the SNR of kth Relay-to-ith Destination Receiver
Let
denotes the SNR of kth relay-to-ith destination receiver. Then, the PDF of the SNR of
denoted by
for the κ-μ shadowed fading channel is given by,
(4)
where
,
,
and
.
3.4. The PDF of SNR of kth Relay-to-jth Eavesdropper
Let
denotes the SNR of kth relay-to-jth eavesdropper. Then, the PDF of the SNR of
denoted by
for κ-μ shadowed fading channels is given by,
(5)
where
,
,
and
.
3.5. The CDF of SNR of Best Relay for Source-to-ith Destination Link
Let
denotes the SNR of best relay for source-to-destination link. Then, the
CDF of
denoted by
for the κ-μ shadowed fading channels is given by,
(6)
where
and
. Substituting the values of
and
, and using the following identity of [21],
(7)
the value of
and
can be calculated in closed-form. Then, substituting the values of
and
in Equation (6) and using the following identities of [21],
(8)
(9)
where
for
and
for
and n is an integer number, the closed-form expression for the
can be derived as
(10)
where
,
and
.
3.6. The CDF of SNR of Best Relay for Source-to-jth Eavesdropper Link
Let
denotes the SNR of best relay for source-to-eavesdropper link. Then, the
CDF of
denoted by
, for κ-μ shadowed fading channels is given by,
(11)
where
and
. Substituting the values of
and
, and using the identities of Equations (7)-(9), the closed-form expression for the
can be defined as
(12)
where
,
and
.
3.7. The PDF of SNR of Best Relay for Source-to-ith Destination Link
The PDF of
denoted by
for κ-μ shadowed fading channel can be obtained as
(13)
where the value of
can be calculated from the following expression
(14)
Substituting the value of
in Equation (14) and after differentiation, the closed-form expression of
is given by,
(15)
where
and
. Finally, substituting the values of
and
in Equation (13) we have
(16)
where
,
,
,
and
.
3.8. The PDF of SNR of Best Relay for Source-to-jth Eavesdropper Link
The PDF of
denoted by
for κ-μ shadowed fading channel can be defined as
(17)
The value of
is calculated as follows,
(18)
where
and
. Substituting the values of
and
in Equation (17), the closed-form expression for the
can be derived as,
(19)
where
,
,
,
and
.
3.9. The PDF of dmin
Let
denotes the SNR of multicast channel. Then, the PDF of
denoted by
, for the κ-μ shadowed fading channel is given by,
(20)
Substituting the value of
and
in Equation (20), the closedform analytical expression for the
can be derived as
(21)
where
and
3.10. The PDF of dmax
Let
denotes the maximum SNR of eavesdropper’s channel. Then, the PDF of
denoted by
, for the κ-μ shadowed fading channel is given by,
(22)
Substituting the values of
and
in Equation (22), the closed-form analytical expression for the
can be derived as
(23)
where
,
and
.
4. Probability of Non-Zero Secrecy Multicast Capacity
The PNSMC is defined as
(24)
Substituting the values of
and
in Equation (24) and using the following identities of [21],
(25)
(26)
the derived analytical expression in the closed-form for the
is shown in Equation (27) at the top of the next page, where
,
and
.
(27)
5. Secure Outage Probability for Multicasting
The SOPM is defined as
(28)
where
,
,
and
denotes the target secrecy multicast rate which is indicated as RS in the figure.
Substituting the values of
and
in Equation (28) and using the identities of Equations (25) and (26), the derived analytical expression in the closed-form for the
is shown below in Equation (29) as
(29)
where,
,
and
.
6. Numerical Results
The PNSMC represented by
is depicted in Figure 2 as a function of the multicast channel’s average SNR (
), for various values of κ and μ. This figure shows the impacts of κ and μ on the
for the given values of system parameters. We see that the
increases, if κ decrease from 2 (represented by the dot line) to 1 (represented by the solid line) when
. Again the
decreases, if μ increase from 1 (represented by the short dash line) to 1.4 (represented by the dash dot line) when
.
The
is depicted in Figure 3 as a function of the multicast channel’s average SNR (
), for various values of M and N. This figure shows the impacts of M and N on the
for the selected values of system parameters. It is found that the
increases, if N decrease from 2
Figure 2. The effects of the power ratio between dominant and scattered-wave components, κ, and the effective number of propagation clusters, μ, on the
for
,
,
,
and
.
Figure 3. The effects of the number of multicast user, M, and the number of eavesdropper, N, on the
for
,
,
,
and
.
(dot line) to 1 (solid line) and M decrease from 2 (dash dot line) to 1 (short dash line) when
and
, respectively. This is due to the fact that when the number of multicast users increases, each user’s bandwidth decreases, which in turn lowers the multicast user’s capacity.
The
is depicted in Figure 4 as a function of the multicast channel’s average SNR (
), for various values of the number of relay, R, and fluctuation parameter, m. This figure shows the impacts of R and m on the
for selected values of system parameters. We see that the
increases, if R increase from 1 (dot line) to 2 (solid line) when
. The
also increases when the values of m decrease from 2.5 (dash dot line) to 1.5 (short dash line) when
. This is because, increasing in the number of relay increases the diversity gain provided by the relays, and decreasing in the LOS fluctuation parameter decreases the severity of fading in the multicast channels which causes an improvement in the capacity of multicast user.
In Figure 5, the SOPM represented by
is illustrated as a function of the multicast channel’s average SNR
for various values of κ and R. For the selected values of system parameters, this figure illustrates how κ and R affect the SOPM,
. We see that the
increases, if the values of κ increase from 1 to 1.6 and decreases if the values of R increase from 1 to 2 when
and
, respectively.
The impact of μ illustrates with R that is described in Figure 6 by plotting the
against
of the multicast channel. For the selected values of system parameters, this figure illustrates how μ and R affect the
. We see that the
increases, if the values of μ increase from 1.2 to 1.5
Figure 4. The effects of the number of relays R and fluctuation parameter, m, on the
for
,
,
,
and
.
Figure 5. The effects of κ and R on the
for
,
,
,
,
and
.
Figure 6. The effects of μ and R on the
for
,
,
,
,
and
.
and decreases if the value of R increase from 1 to 2 when
and
, respectively.
In Figure 7, the
is illustrated as a function of the multicast channel’s average SNR
for various values of M and R. For the given values of system parameters, this figure illustrates how M and R affect the
. We see that the
increases, if M increase from 1 to 2 when
. The
decreases if the value of R increase from 1 (represented by at the very top) to 2 (represented by lowest) when
in the high SNR region, as one expects.
In Figure 8, the
is illustrated as a function of the multicast channel’s average SNR
for various values of N and R. For the given values of system parameters, this figure narrates how N and R affect the SOPM,
. It is observed that the
increases, if N increase from 1 (dot line) to 2 (solid line) when
. The
decreases with R.
The
is plotted against
which shows in Figure 9 of the multicast channel for various values of m and R. This figure shows the impacts of m and R on the
for the given system parameters. We see that the
increases, if m increase from 1 to 2 when
. This effect of m increases when the value of R increases.
The
is depicted in Figure 10 as a function of the multicast channel’s average SNR (
), for the values of
and
. This figure shows the impacts of R on the
for the given system parameters. We see that the
increases if the values of R decrease from 2 to 1 when
. The cooperative diversity provided by the best relay increases with the number of relays which is a reason of an improvement in the multicast capacity.
Figure 7. The effects of M and R on the
for
,
,
,
,
and
.
Figure 8. The effects of N and R on the
for
,
,
,
,
and
.
Figure 9. The effects of m and R on the
for
,
,
,
,
and
.
Therefore, based on the closed-form analytical expressions for the
and the
and from the observations of numerical
Figure 10. The effects of the number of relay, R, on the
for
,
,
,
,
,
and
.
results, the main findings of this paper can be summarized as follows: The
decreases with κ, μ, m, M and N. Therefore, increase in κ, μ, m, M and N degrades the security of the system. On the other hand, if R increases
increases and
decreases. Therefore, increasing in R enhances the security of the system.
7. Conclusion
The creation of an analytical mathematical model to guarantee security in wireless multicasting using κ-μ shadowing fading channels with opportunistic relaying is the main topic of this article. The parameters such as κ, μ, m, the number of multicast users, eavesdroppers, and relays that assist in determining the values of N and R are used to derive the analytical formulas in the closed-form for the PNSMC and the SOPM. Our results conclude that the security in wireless multicasting through κ-μ fading channel degrades with the κ, μ, m, M and N. But increasing the number of relays helps to mitigate this loss of security which takes part in competition of opportunistic relaying technique to be the best relay. The effects of interferences on the security in multicasting through κ-μ shadowing fading channel are not considered in this paper. The zero-forcing precoding can be used to eliminate the effects of interferences and the selection and phase alignment precoding techniques can be used to enhance the security by using interference power. Finally, the validity of analytical expressions is verified via Monte-Carlo simulation.