-
The Second Order Scattering Fading Model with Fluctuating Line-of-Sight
Authors:
Jesus Lopez-Fernandez,
Gonzalo J. Anaya-Lopez,
F. Javier Lopez-Martinez
Abstract:
We present a generalization of the notoriously unwieldy second-order scattering fading model, which is helpful to alleviate its mathematical complexity while providing an additional degree of freedom. This is accomplished by allowing its dominant specular component associated to line-of-sight propagation to randomly fluctuate. The statistical characterization of the newly proposed model is carried…
▽ More
We present a generalization of the notoriously unwieldy second-order scattering fading model, which is helpful to alleviate its mathematical complexity while providing an additional degree of freedom. This is accomplished by allowing its dominant specular component associated to line-of-sight propagation to randomly fluctuate. The statistical characterization of the newly proposed model is carried out, providing closed-form expressions for its probability and cumulative distribution functions, as well as for its generalized Laplace-domain statistics and raw moments. We exemplify how performance analysis can be done in this scenario, and discuss the role of the fading model parameters on system performance.
△ Less
Submitted 25 February, 2023;
originally announced February 2023.
-
Leakage Subspace Precoding and Scheduling for Physical Layer Security in Multi-User XL-MIMO Systems
Authors:
Gonzalo J. Anaya-Lopez,
Jose P. Gonzalez-Coma,
F. Javier Lopez-Martinez
Abstract:
We investigate the achievable secrecy sum-rate in a multi-user XL-MIMO system, on which user distances to the base station become comparable to the antenna array dimensions. We show that the consideration of spherical-wavefront propagation inherent to these set-ups is beneficial for physical-layer security, as it provides immunity against eavesdroppers located in similar angular directions that wo…
▽ More
We investigate the achievable secrecy sum-rate in a multi-user XL-MIMO system, on which user distances to the base station become comparable to the antenna array dimensions. We show that the consideration of spherical-wavefront propagation inherent to these set-ups is beneficial for physical-layer security, as it provides immunity against eavesdroppers located in similar angular directions that would otherwise prevent secure communication under classical planar-wavefront propagation. A leakage subspace precoding strategy is also proposed for joint secure precoding and user scheduling, which allows to improve the secrecy sum-rate compared to conventional zero-forcing based strategies, under different eavesdropper collusion strategies.
△ Less
Submitted 20 July, 2022; v1 submitted 23 May, 2022;
originally announced May 2022.
-
A New Transmit Antenna Selection Technique for Physical Layer Security with Strong Eavesdropping
Authors:
Gonzalo J. Anaya-López,
J. Carlos Ruiz-Sicilia,
F. Javier López-Martínez
Abstract:
We propose a new transmit antenna selection (TAS) technique that can be beneficial for physical layer security purposes. Specifically, we show that the conventional TAS criterion based on the legitimate channel state information (CSI) is not recommended when the average signal-to-noise ratio for the illegitimate user becomes comparable or superior to that of the legitimate user. We illustrate that…
▽ More
We propose a new transmit antenna selection (TAS) technique that can be beneficial for physical layer security purposes. Specifically, we show that the conventional TAS criterion based on the legitimate channel state information (CSI) is not recommended when the average signal-to-noise ratio for the illegitimate user becomes comparable or superior to that of the legitimate user. We illustrate that an eavesdropper's based antenna selection technique outperforms conventional TAS, without explicit knowledge of the eavesdropper's instantaneous CSI. Analytical expressions and simulation results to support this comparison are given, showing how this new TAS scheme is a better choice in scenarios with a strong eavesdropper.
△ Less
Submitted 22 November, 2021; v1 submitted 31 May, 2021;
originally announced May 2021.
-
A Product Channel Attack to Wireless Physical Layer Security
Authors:
Gonzalo J. Anaya-Lopez,
Gerardo Gomez,
F. Javier Lopez-Martinez
Abstract:
We propose a novel attack that compromises the physical layer security of downlink (DL) communications in wireless systems. This technique is based on the transmission of a slowly-varying random symbol by the eavesdropper during its uplink transmission, so that the equivalent fading channel observed at the base station (BS) has a larger variance. Then, the BS designs the secure DL transmission und…
▽ More
We propose a novel attack that compromises the physical layer security of downlink (DL) communications in wireless systems. This technique is based on the transmission of a slowly-varying random symbol by the eavesdropper during its uplink transmission, so that the equivalent fading channel observed at the base station (BS) has a larger variance. Then, the BS designs the secure DL transmission under the assumption that the eavesdropper's channel experiences a larger fading severity than in reality. We show that this approach can lead the BS to transmit to Bob at a rate larger than the secrecy capacity, thus compromising the system secure operation. Our analytical results, corroborated by simulations, show that the use of multiple antennas at the BS may partially alleviate but not immunize against these type of attacks.
△ Less
Submitted 16 July, 2020;
originally announced July 2020.