Enhancing Security in Multicellular Multicast Channels Reducing Interference Power with the Best Relay Selection ()
1. Introduction
An important limitation to the capacity of wireless communication systems is interference, which depends upon a number of factors including the locations of interfering transmitters. Although, the issue of interference has been studied extensively in the literature; however, much less attention has been paid to the topic of canceling simultaneous effect of the interference and correlation. The simultaneous effect of interference and correlation generally captures the fact that the interference created by interfering transmitters is a correlated stochastic process both spatially and temporally. It is well recognized that correlated fading reduces the performance gain in multi-antenna communications [1]. Likewise, it has recently been also proved that the simultaneous effect of interference and correlation decreases the diversity gain [2]. The simultaneous effect of interference and correlation partially comes from correlated channel attenuation, like correlated fading and shadowing.
Because of the randomness of the mobile propagation channels and limited radio spectrum, co-channel interference (CCI) and inter-symbol interference (ISI) are major impediments to high-capacity transmission in power and bandwidth-limited wireless communication systems. In cellular networks, CCI occurs from neighboring cells using the same radio channels. As the frequency reuse factor decreases from seven to three, then to one, CCI is unavoidable due to the channel reuse in adjacent cells. Given perfect knowledge of the channel coefficients of all co-channel signals, linear filter type receivers suppress CCI by controlling the filter coefficients in the sense of maximizing the signal-to-interference-plus-noise ratio (SINR). In typical wireless mobile communication systems, CCI and ISI often arise together. Hence, the receiver designs for mitigating these impairments in joint fashions are quite common. In multiple-input multiple-output (MIMO) systems, large spectral efficiency can be achieved if the spatially multiplexed data streams, which manifest themselves as CCI to each other, are properly separated. Accordingly, CCI mitigation techniques developed for single antenna systems have been applied in decoding of multi-channel data streams. For the receivers with multiple antennas, diversity combining techniques broaden the freedom in interference mitigation receiver designs.
However, the impairments from CCI and ISI are the major obstacles to reliable communication in long-range cellular networks and in short-range wireless local and personal area networks. At present, linear filtering, equalization, and diversity combining techniques have been traditional means to combat the impairments in separate or joint fashions. Also, the interference canceling techniques designed for decoding of multiple single-user signals have been applied in decoding of spatially multiplexed data streams in MIMO systems. The impairments from high-power CCI and ISI in time-varying channels still impose severe constraints in the design of practical interference resilient receivers.
On the other hand, multicasting is an efficient wireless communication technique for group-oriented and personal communication such as video-conferencing, e-learning etc. Due to the increase of application areas and the mobility of users with network components, the security is a crucial aspect in wireless multicasting systems because of the fact that the medium of wireless multicasting is susceptible to eavesdropping and fraud [3].
1.1. Related Works
Recently, Shrestha et al. [4] studied secure wireless multicasting scenario through quasi-static Rayleigh fading channel in the presence of multiple eavesdroppers where each eavesdropper is equipped with multiple antennas. They showed that the physical layer security can be achieved even in the presence of multiple multi-antenna eavesdroppers. But they did not consider the effect of correlation and interference on the security in multicasting. In [5] [6], Giti et al. respectively used selective precoding and phase alignment precoding to enhance the security in multicasting by elimination interference power. But they did not consider the effect of correlation and the method that can be used to reduce the simultaneous effect of correlation and interference. Sayed et al. [7] studied secure wireless multicasting scenario through multi-cellular multiple-input multiple-output (MIMO) networks with linear equalization and investigated the effect of interference on the distributed and co-located MIMO channels. But they did not consider the effect of correlation and the method that can be used to reduce the effect of correlation and interference. An iterative algorithm was used by Nguyen et al. [8] to enhance the security in cooperative cognitive radio multicast networks. Opportunistic relaying technique was also used by Nguyen et al. [9] to study the security in half-duplex cognitive radio network. But they did not consider the effects of interference and correlation on the security analysis of multicasting. Kundu et al. [10] studied secure wireless multicasting through Generalized-K fading channels and derived the closed-form analytical expressions for the probability of non-zero secrecy multicast capacity and the secure outage probability for multicasting without considering the effects of interference and correlation. Borshon et al. [11] investigated the effects of Weibull fading parameter on the security in multicasting. In [12], A. S. M. Badrudduza and M. K. Kundu investigated the effects of
fading parameters on the security in multicasting scenario. Atallah and Kaddoum [13] used partial cooperation to enhance the security in wireless networks in the presence of passive eavesdroppers. Sultana et al. [14] enhanced the security in cognitive radio multicast network using interference power. But they did not consider the simultaneous effects of interference and correlation on the security of multicasting and did not use any technique to eliminate these effects. In [15], the opportunistic relaying technique was used by Kibria et al. to enhance the security in multicasting without considering the effects of interference and correlation. Sun et al. [16] investigated the impact of antenna correlation on the security of single-input multiple-output (SIMO) channel in the presence of multiple eavesdroppers. But they used an unicasting scenario to investigate that effect and did not consider the effect of interference on the multicasting network. In [17], Badrudduza et al. used opportunistic relaying technique to reduce the effect of correlation on the security in multicasting over Nakagami-m fading channels. They did not consider the effect of interference and the method that can be used to reduce that effect. Moreover, the mathematical modeling of a system considering the simultaneous effect of correlation and interference is different than that of a system considering the effect of correlation and interference separately. Shahriyer et al. [18] used the same opportunistic relaying technique in enhancing security in multicasting over generalized fading channels. They considered the effect of shadowing but did not consider the effects of correlation and interference.
1.2. Contributions
Based on the aforementioned scenario available in the literature and motivated by the importance of security in practical multicasting, in this paper, authors studied a multicasting scenario through multi-cellular network and developed the mathematical model to ensure its security considering the simultaneous effect of correlation and interference. The major contributions of this paper can be summarized as follows.
· Based on the PDFs of SINRs of the source-to-relay, relay-to-destination and relay-to-eavesdropper links, at first, we derive the expressions for the PDFs of SINRs of the best relay for the multicast and eavesdropper channels in terms of the simultaneous effects of correlation and interference for Cell-1 and Cell-2.
· Secondly, using these PDFs of SINRs, we derive the analytical expressions for the probability of non-zero secrecy multicast capacity and the secure outage probability for multicasting to analyze the secure outage performance of the proposed model.
· Thirdly, we investigate the effect of correlation in the presence of interference and the effect of interference in the presence of correlation, and show how these effects can be reduced using opportunistic relaying technique.
· Finally, the derived analytical expressions have been justified via Monte-Carlo simulations.
The remainder of this paper is organized as follows. Sections II and III describe the system model and problem formulation, respectively. The expressions for the probability of non-zero secrecy multicast capacity and the secure outage probability for multicasting are derived respectively in Section IV and V. Numerical results are presented in Section VI. Finally, Section VII draws the conclusions of this work.
2. System Model
A secure wireless multicasting scenario shown in Figure 1 is considered through multicellular network over spatially correlated Nakagami-m fading in the presence of multiple eavesdroppers. Two adjacent cells named “Cell-1” and “Cell-2” are considered to realize the effect of interferences. In Cell-1, base station-1 (BS-1) transmits a common stream of information to M destination users via a group of K relays
(
) in the presence of N eavesdroppers. Similarly, in Cell-2, base station-2 (BS-2) transmits a common stream of information to L destination users via a group of W relays
(
) in the presence of Q eavesdroppers. All the relays, BS-1 and BS-2 and are equipped with single antenna. Each destination user and eavesdropper of Cell-1 are equipped with
and
antennas, respectively. While each multicast user and eavesdropper of Cell-2 are equipped with
and
antennas, respectively. The propagation channels are considered correlated and to be affected by the interference and Nakagami-m fading. The correlation coefficients between two antennas of destination users and between two antennas of eavesdroppers of Cell-1 are denoted by
and
, respectively. Similarly, the correlation coefficients between two antennas of destination users and between two antennas of eavesdroppers of Cell-2 are denoted by
and
, respectively. Interferences at the destination users and eavesdroppers of Cell-1 are denoted by
and
, respectively. Similarly, interferences at the destination users and eavesdroppers of Cell-2 are denoted by
and
, respectively.
It is assumed that there are no direct paths from base stations to destinations and eavesdroppers in Cell-1 and Cell-2, and communication occurs only through the relays. In the case of Cell-1, BS-1 transmits
symbol to K relays in the first-hop. Therefore, received signal at the kth relay denoted by
is given by,
(1)
where
denotes the channel coefficient between BS-1 and kth relay and
denotes the additive white Gaussian noise at the kth relay with zero and variance
. In the second hop, at first, the selection of the best relay (i.e. the relay with the highest SNR) is performed using order statistics, so that only the best relay,
forwards message to the M destination users. During the transmission of information from BS-1 to destination user via relays, N eavesdroppers try to decode the transmitted information.
Let
and
denote the received signals at the ith destination and jth eavesdropper, respectively. The channel gains from the best relay of Cell-1 to ith (
) destination user and best relay of Cell-1 to jth (
) eavesdropper are denoted by
and
, respectively. Without considering interference from Cell-2, we have
(2)
(3)
where
is the scaling factor at the kth relay.
is the
average power per symbol.
and
are the channel coefficients from the best relay of Cell-1 to ith destination and jth eavesdropper, respectively.
and
, where
and
denote the complex additive white Gaussian noises with zero mean and variances
and
imposed on the receiver at the ith destination and jth eavesdropper, respectively.
In the case of Cell-2, BS-2 transmits
symbol to W relays in the first-hop. Therefore, received signal at the wth relay denoted by
is given by,
(4)
where
denotes the channel coefficient between BS-2 and wth relay and
denotes the additive white Gaussian noise at the wth relay with zero and variance
. In the second hop, at first, the selection of the best relay is performed using order statistics, so that only the best relay,
forwards message to the L destination users. During the transmission of information from BS-2 to destination user via relays, Q eavesdroppers try to decode the transmitted information.
Let
and
denote the received signals at the lth destination and qth eavesdropper, respectively. The channel gains from the best relay of Cell-2 to lth (
) destination user and best relay of Cell-2 to qth (
) eavesdropper are denoted by
and
, respectively. Without considering interference from Cell-1, we have
(5)
(6)
where
is the scaling factor at the wth relay.
and
are the channel coefficients from the best relay of Cell-2 to lth destination and qth eavesdropper, respectively.
and
, where
and
denote the complex additive white Gaussian noises with zero mean and variances
and
imposed on the receiver at the lth destination and qth eavesdropper, respectively.
Let,
and
channel gain from the best relay of Cell-2 to ith user and to jth eavesdropper of Cell-1.
and
channel gain from the best relay of Cell-1 to lth user and to qth eavesdropper of Cell-2. Then, considering interference from Cell-2, received signal at the ith user and the jth eavesdropper of Cell-1 are given by,
(7)
(8)
where
denotes the interference plus noise vector at the ith user of Cell-1 with zero mean and variance
. Similarly,
denotes the interference plus noise vector at the jth eavesdropper of Cell-1 with zero mean and variance
. Similarly, considering interference from Cell-1, received signal at the lth user and the qth eavesdropper of Cell-2 are given by,
(9)
(10)
where
denotes the interference plus noise vector at the lth user of Cell-2 with zero mean and variance
. Similarly,
denotes the interference plus noise vector at the qth eavesdropper of Cell-2 with zero mean and variance
.
In the case of Cell-1, the instantaneous SINRs at the kth relay, the ith destination and jth eavesdropper can be expressed as
where
denotes the average SNR of the first hop for Cell-1. Similarly, in the case of Cell-2, the instantaneous SINRs at the wth relay, the lth destination and qth eavesdropper can be expressed as
where
denotes the average SNR of the first hop for Cell-2.
3. Problem Formulation
Since the communication is performed via best relay, therefore its selection is an important issue to develop the mathematical model which ensures the security of proposed model. The selection of the best relay is performed in two steps by order statistics. In the first step, for each relay node, the weaker links between the first hop and the second hop are searched for applying order statistics. In the second step, the relay having largest equivalent end-to-end SINRs are selected as the candidate relay to perform detection, amplification and forward the message. Therefore, in the case of Cell-1, based on the links strength, the equivalent end-to-end SINRs at the kth relay for the destination links,
and for the eavesdropper links,
are ordered as follows [19] [20]:
(11)
(12)
The instantaneous SINRs at the output of the relay selection combiner for ith destination and jth eavesdropper can be expressed, respectively as
(13)
(14)
The probability density function (PDF) of SINRs,
,
and
for correlated Nakagami-m fading channel are respectively given by [21].
where m denotes the Nakagami-m fading parameter.
,
,
,
and
.
,
,
,
and
.
,
,
,
and
.
In the case of Cell-2, based on the links strength, the equivalent end-to-end SINRs at the wth relay for the destination links,
and for the eavesdropper links,
are ordered as follows [19] [20]:
(15)
(16)
The instantaneous SINRs at the output of the relay selection combiner for lth destination and qth eavesdropper can be expressed, respectively as
(17)
(18)
The PDFs of SINRs,
,
and
for correlated Nakagami-m fading channel are respectively given by [21].
where
,
,
,
and
.
,
,
,
and
.
,
,
,
and
.
Best Relay Selection for Secure Multicasting
In order to derive the analytical expressions for the probability of non-zero secrecy multicast capacity and the secure outage probability for multicasting, we need the PDF of the SINRs for the best relay, multicast as well as eavesdropper channels, the formulation of which are illustrated as follows [22]:
1) The PDF of SINR for the Best Relay: In the case of Cell-1, let
denotes the cumulative distribution function of
, then we have
(19)
Now,
can be defined as
(20)
Using the following identity of [23] stated in equation (3.351.2),
(21)
we have
(22)
where
. Similarly,
(23)
where
. Substituting the values of
and
in Equation (19), we have
(24)
where
and
. Differentiating Equation (24), the PDF of
can be obtained as follows;
(25)
Therefore, the PDF of
is defined as
(26)
Substituting Equations (24) and (25) into (26), and using the following identity of [23] stated in equation (1.111),
(27)
the PDF of
is given by
(28)
where
,
and
.
Following the similar procedure of
, the PDF of
denoted by
can be derived as
(29)
where
,
,
,
,
and
.
In the case of Cell-2, let
and
respectively denote the PDFs of
and
. Following the similar procedure of
, the expressions of
and
can be derived as
(30)
where
,
,
,
and
.
(31)
where
,
,
,
,
and
.
2) The PDF of SINR for Multicast Channels: In the case of Cell-1, let
, then the PDF of
can be defined as [24] [25]
(32)
Substituting the values of
in Equation (32) and using the identity of Equation (27), we have
(33)
where
and
.
Similarly, defining
for Cell-2, the PDF of
can be defined as
(34)
Substituting the values of
in Equation (34) and using the identity of Equation (27), we have
(35)
where
and
.
3) The PDF of SINR for Eavesdropper Channels: In the case of Cell-1, let
, then the PDF of
can be defined as [3] [24]
(36)
Substituting the values of
in Equation (36) and using the identity of Equation (27), we have
(37)
where
and
.
Similarly, defining
for Cell-2, the PDF of
can be defined as
(38)
Substituting the values of
in Equation (38) and using the identity of Equation (27), we have
(39)
where
and
.
4. Probability of Non-Zero Secrecy Multicast Capacity
The probability of non-zero secrecy multicast capacity for Cell-1 can be defined as
(40)
Substituting the values of
and
in Equation (40) and performing integration, the closed-form analytical expression for the probability of non-zero secrecy multicast capacity is given by
(41)
where
,
,
,
,
,
,
,
,
,
,
,
,
,
and
.
Similarly, the probability of non-zero secrecy multicast capacity for Cell-2 can be defined as
(42)
Substituting the values of
and
in Equation (42) and performing integration, the closed-form analytical expression for the probability of non-zero secrecy multicast capacity is given by
(43)
where
,
,
,
,
,
,
,
,
,
,
,
,
and
.
5. Secure Outage Probability for Multicasting
In the case of Cell-1, the secure outage probability for multicasting can be defined as
(44)
where
and
denotes the target secrecy multicast rate. Substituting the values of
and
in Equation (44) and performing the integration the closed-form analytical expression for
is given by
(45)
where
,
and
,
,
,
,
and
.
Similarly, in the case of Cell-2, the secure outage probability for multicasting can be defined as
(46)
Substituting the values of
and
in Equation (46) and performing integration, the closed-form analytical expression for the secure outage probability for multicasting is given by
(47)
where
,
and
,
,
,
and
.
6. Numerical Results
In the case of Cell-1, Figure 2 shows the probability of non-zero secrecy multicast capacity,
, as a function of the average SINR of the multicast channel for selected values of M and N. This figure describes the effects
![]()
Figure 2. Effect of the number of multicast user, M, and eavesdropper, N, for Cell-1 on the
for
and
, respectively, with
,
,
,
,
watt,
watt and
.
of M and N on the
for selected values of system parameters. We see that the
decreases, if the values of M increases from 4 (indicated by the solid line) to 5 (indicated by the dash line) keeping the value of N equal to 2. Similarly, the
also decreases, if the values of N increases from 3 (indicated by the long dash dot-dot line) to 6 (indicated by the long dash dot line) keeping the value of M equal to 6. Hence, it can be concluded that the
decreases with M and N. This is because, the increasing in M, the bandwidth of each user decreases which causes decreasing in the secrecy multicast capacity. Moreover, the increasing in N, the probability of eavesdropping increases which causes the decreasing in
. Finally, matching between the simulation and analytical results justifies the validity of derived expression.
The
is shown in Figure 3 as a function of the average SINR of the multicast channel for selected values of m and K. This figure describes the effects of m and K on the
for selected values of system parameters. We see that the
decreases if the values of m increases from 1.8 (indicated by the dash line) to 2.5 (indicated by the solid line) keeping the value of K equal to 2.
increases if the values of K increases from 4 (indicated by the long dash dot line) to 6 (indicated by the long dash dot-dot line) keeping the value of m equal to 1.8. Hence, it can be concluded that the
increases with K and but decreases with m. This is because, the increasing in K provides additional diversity which enhances the secrecy multicast capacity and the increasing in m reduces the SINR which degrades the secrecy multicast capacity.
Figure 4 shows
as a function of the average SINR of the multicast channel for selected values of
,
and
. This figure describes the effects of
,
and
on the
for selected values of
![]()
Figure 3. Effect of the fading parameter, m, and the number of relays, K, for Cell-1 on the
for
and
, respectively, with
,
,
,
,
watt,
watt and
.
![]()
Figure 4. Effect of the correlation coefficient,
, and the number of receiving antennas at the multicast users,
, and the eavesdropper,
, for Cell-1 on the
for
and
, respectively, with
,
,
,
,
watt,
watt and
.
system parameters. It is observed that the
decreases if the values of
increases from 0.55 (indicated by the solid with asterisk line) to 0.65 (indicated by the solid line) with
. The
increases if the values of
increases from 12 (indicated by the long dash dot line) to 14 (indicated by the long dash dot-dot line) with
. The
decreases if the values of
increases from 2 (indicated by the dash line) to 3 (indicated by the dash-dot line) with
and
. In conclusion,
increases with
and decreases with
and
as one expects.
The
is shown in Figure 5 as a function of the average SINR of the multicast channel for selected values of
,
, and
. This figure illustrates the effects of
,
, and
on the
for selected values of system parameters. It is observed that the
increases, if the values of
increases from 2 watt (indicated by the long dash dot line) to 3 watt (indicated by the long dash dot-dot line) keeping the value of
and
equal to 1 watt and −5 dB, respectively. Similarly, the
also decreases, if the values of
increases from 4 watt (indicated by the dash dot line) to 6 watt (indicated by the dash line) keeping the value of
and
equal to −5 dB and 1 watt, respectively. Moreover, the
decreases, if the values of
increases from −10 dB (indicated by the solid line) to −7 dB (indicated by the solid line with asterisk) keeping the value of
and
equal to 1 watt and 3 watt, respectively. Hence, it can be concluded that the
![]()
Figure 5. Effect of the SINR of evesdropper channel,
, and the effect of interference at the multicast users,
, and the effect of interference at the eavesdropper,
, created from Cell-2 on the
for
watt and
watt,
and
watt, and
and
watt, respectively, with
,
,
,
,
and
.
increases with
and decreases with
and
. This is because, the interference at the eavesdropper channel and the degradation of SINR in the eavesdropper channel degrades the capacity of eavesdropper channel which causes the improvement in the secrecy capacity for multicasting and interference at the multicast channel also degrades the capacity of multicast channels which degrades the secrecy capacity for multicasting.
Figure 6 shows the secure outage probability for multicasting,
, as a function of the average SINR of the multicast channel for selected values of M and N. This figure describes the effects of M and N on the
for selected values of system parameters. We see that the
increases, if the values of M increases from 4 (indicated by the solid line) to 8 (indicated by the dash line) keeping the value of N equal to 2. Similarly, the
also increases, if the values of N increases from 3 (indicated by the long dash dot-dot line) to 4 (indicated by the long dash dot line) keeping the value of M equal to 6. Hence, it can be concluded that the
increases with M and N. This is because, the increasing in M, the bandwidth of each user decreases and the increasing in N, the probability of eavesdropping increases which increases the probability of outage.
The
is shown in Figure 7 as a function of the average SINR of the multicast channel for selected values of m and K. This figure describes the effects of m and K on the
for selected values of system parameters. We see that the
increases if the values of m increases from 1.8 (indicated by the solid line) to 2.5 (indicated by the dash line) keeping the value of K equal to 2.
decreases if the values of K increases from 4 (indicated by the long dash dot-dot line) to 6 (indicated by the long dash dot line) keeping the value of m equal to 1.8. Hence, it can be concluded that the
![]()
Figure 6. Effect of the number of multicast user, M, and eavesdropper, N, for Cell-1 on the
for
and
, respectively, with
,
,
,
,
watt,
watt and
.
![]()
Figure 7. Effect of the fading parameter, m, and the number of relays, K, for Cell-1 on the
for
and
, respectively, with
,
,
,
,
watt,
watt and
.
decreases with K and increases with m as one expects.
Figure 8 shows
as a function of the average SINR of the multicast channel for selected values of
,
and
. This figure describes the effects of
,
and
on the
for selected values of system parameters. It is observed that the
increases if the values of
increases from 0.50 (indicated by the solid with square line) to 0.60 (indicated by the solid line) with
. The
decreases if the values of
increases from 2 (indicated by the long dash dot line) to 3 (indicated by the long dash dot-dot line) with
. The
increases if the values of
increases from 2 (indicated by the dash line) to 3 (indicated by the dash-dot line) with
and
. In conclusion,
decreases with
and increases with
and
.
The
is shown in Figure 9 as a function of the average SINR of the multicast channel for selected values of
, and
. This figure illustrates the effects of
, and
on the
. It is observed that the
decreases, if the values of
increases from 3 watt (indicated by the long dash dot line) to 6 watt (indicated by the long dash dot-dot line) keeping the value of
watt and
, respectively. Similarly, the
also increases, if the values of
increases from 4 watt (indicated by the dash line) to 6 watt (indicated by the dash dot line) keeping the value of
and
equal to −5 dB and 1 watt, respectively. Moreover, the
increases, if the values of
increases from −10 dB (indicated by the solid line) to −7 dB (indicated by the solid line with asterisk) keeping the value of
and
equal to 2 watt and 1 watt, respectively. Hence, it can be
![]()
Figure 8. Effect of the correlation coefficient,
, and the number of receiving antennas at the multicast users,
, and the eavesdropper,
, for Cell-1 on the
for
and
, respectively, with
,
,
,
,
watt,
watt and
.
![]()
Figure 9. Effect of the SINR of evesdropper channel,
, and the effect of interference at the multicast users,
, and the effect of interference at the eavesdropper,
, created from Cell-2 on the
for
watt and
watt,
and
watt, and
and
watt, respectively, with
,
,
,
,
and
.
concluded that the
decreases with
and increases with
and
as one expects.
The
for Cell-2 is shown in Figure 10 as a function of the average SINR of the multicast channel for selected values of
,
, and
. This figure illustrates the effects of
,
, and
on the
for selected values of system parameters. It is observed that the
decreases, if the values of
increases from 3 watt (indicated by the long dash dot line) to 10 watt (indicated by the long dash dot-dot line) keeping the value of
watt and
, respectively. The
increases, if the values of
increases from 2 watt (indicated by the dash line) to 10 watt (indicated by the solid line) keeping the value of
equal to 1 watt. This is because, interference at the eavesdropper of Cell-2 increases the secrecy multicast capacity and interference at the multicast users decreases the secrecy multicast capacity, and the increase in secrecy multicast capacity causes a reduction in the secure outage probability and decrease in secrecy multicast capacity causes an improvement in the secure outage probability. Hence, it can be concluded that the
decreases with
and increases
.
The
for Cell-2 is shown in Figure 11 as a function of the average SINR of the multicast channel for selected values of W,
and L. This figure shows that
increases with the number of multicast users, L, and interference at the multicast users,
, which means, the secrecy multicast capacity decreases with L and
. But this reduction in secrecy multicast capacity can be minimized by increasing the number of relays which provides additional diversity to the multicast users.
![]()
Figure 10. Effect of the interference powers of multicast users of Cell-2,
, and the interference powers of eavesdropper of Cell-2,
, generated from Cell-1 on the
with
watt,
,
,
,
,
and
.
![]()
Figure 11. Effect of the number of relays of Cell-2, W, on the
for selected values of
and L with
watt,
,
,
,
and
.
Therefore, based on the closed-form analytical expressions for the probability of non-zero secrecy multicast capacity and the secure outage probability for multicasting, and from the observations of numerical results, the main findings of this paper can be summarized as follows: the security in multicasting degrades with the intensity of fading, the number of multicast users, eavesdroppers and their antennas, and due to the antenna correlation and interferences at the multicast users. This problem can be solved by using opportunistic relaying technique in which K relays compete to transmit their received signals with high signal-to-noise ratio (SNR) but only the best relay with the highest SNR is allowed to transmit its received signal to the receivers. Although, the zero-forcing precoding technique is used in the existing literature to mitigate the effect of interference by canceling out the interference power, but the mathematical modeling of this technique is more complex in the case of multi-user multiple-input multiple-out (MIMO) channel and there is no chance to use the interference power to enhance the security in multicasting. The opportunistic relaying is more advantageous than the zero-forcing precoding technique in the sense that, the mathematical modeling of opportunistic relaying is less complex than zero-forcing precoding technique and it reduces the effects of interferences providing additional cooperative diversity gain without canceling out the interference power. Hence, there is a chance to use this interference power to enhance the security in multicasting applying selective and phase-alignment precoding techniques in the best relay.
7. Conclusion
This paper focuses on the development of an analytical mathematical model to ensure the security in wireless multicasting through multicellular network considering the simultaneous effect of interference and correlation. Based on the mathematical model and the observations of numerical results, it can be concluded that the degradation of security in multicasting occurs due to the severity of fading, the effects of correlation and interference and increasing in the number of multicast users, eavesdroppers and their antennas. This problem of ensuring perfect secrecy in multicasting can be successfully mitigated by using opportunistic relaying technique which is mathematically less complex than other methods used for interference mitigation and easy to understand. Moreover, it paves the way of using interference power to improve the security in multicasting by applying selective and phase-alignment precoding techniques in the best relay.