Enhancing Security in Correlated Nakagami-m Fading Cellular Network Using SC and SSC Diversity Combining

Abstract

The effect of correlated fading reduces the performance gain in multi-antenna communications. Diversity combining is a well-known technique to reduce the effect of correlation. But still, it is an open problem to quantify as the diversity scheme is more efficient in enhancing the security of cellular multicast network mitigating the effects of correlation. Motivated by this issue, this paper considers a secure wireless multicasting scenario through correlated cellular networks in the presence of multiple eavesdroppers. The selection combining (SC) and switch and stay combining (SSC) techniques are considered in dual arbitrarily correlated Nakagami-m fading channels. The closed-form analytical expressions for the probability of non-zero secrecy multicast capacity and the secure outage probability for multicasting are derived to understand the insight into the effects of correlation on the SC and SSC diversity schemes and to quantify which diversity scheme is more efficient in enhancing the security of correlated multicast networks. The results show that, although the diversity gain reduces the effect of correlation, the diversity gain provided by the SC diversity scheme is more significant in mitigating the effect of correlation compared to the SSC diversity scheme. Due to the selection mechanism of SC diversity, it is more sensitive to the change of SNR of the eavesdropper’s channel compared to the case of the SSC diversity scheme.

Share and Cite:

Ali, S. and Sarkar, M. (2022) Enhancing Security in Correlated Nakagami-m Fading Cellular Network Using SC and SSC Diversity Combining. Wireless Engineering and Technology, 13, 1-17. doi: 10.4236/wet.2022.131001.

1. Introduction

An important limitation to the capacity of wireless communication systems is a correlation, which mostly depends upon the antenna spacing of multi-antenna systems [1]. Likewise, it has recently been also proved that the effect of correlation decreases the diversity gain [2]. However, diversity combining techniques are the traditional means to combat the effects of correlation significantly. On the other hand, multicasting is an efficient wireless communication technique for group-oriented and personal communication such as video-conferencing, e-learning, etc. Due to the increase in application areas and the mobility of users with network components, security is a crucial aspect of wireless multicasting systems because the medium of wireless multicasting is susceptible to eavesdropping and fraud [3]. Therefore, the explosive growth of wireless multicasting services inevitably renders security into a challenging quality of service constraint that must be accounted for in the design of wireless multicasting networks.

Mitigating the effects of correlation, the enhancing security in multicasting through correlated fading channels is also a challenging task for the researchers in this field. Since the diversity combining techniques are the efficient means to combat the effects of correlation significantly, it is well recognized that the security in the correlated multicast networkscan be improved by employing diversity combining techniques.

A. Related Works

Recently, Shrestha et al. [4] studied a secure wireless multicasting scenario through a quasi-static Rayleigh fading channel in the presence of multiple eavesdroppers where each eavesdropper was equipped with multiple antennas. Authors showed that the physical layer security could be achieved even in the presence of multiple multi-antenna eavesdroppers. But authors did not consider the effect of correlation on the security in multicasting. In [5] [6], Giti et al. respectively used selective precoding and phase alignment precoding to enhance the security in multicasting by eliminating interference power. Sayed et al. [7] studied a secure wireless multicasting scenarios through multi-cellular multiple-input multiple-output (MIMO) networks with linear equalization and investigated the effect of interference on the distributed and co-located MIMO channels. But authors did not consider the effect of correlation and the method that can be used to reduce the effect of correlation. An iterative algorithm was used by Nguyen et al. [8] to enhance the security in cooperative cognitive radio multicast networks. The opportunistic relaying technique was also used by Nguyen et al. [9] to study the security of a half-duplex cognitive radio network. But authors did not consider the effects of correlation on the security analysis of multicasting. Kundu et al. [10] studied secure wireless multicasting through Generalized-K fading channels and derived the closed-form analytical expressions for the probability of non-zero secrecy multicast capacity and the secure outage probability for multicasting without considering the effects of correlation. Borshon et al. [11] investigated the effects of Weibull fading parameter on the security in multicasting. In [12], A. S. M. Badrudduza and M. K. Kundu investigated the effects of κ μ fading parameters on the security in a multicasting scenario. Atallah and Kaddoum [13] used partial cooperation to enhance the security in wireless networks in the presence of passive eavesdroppers. Sultana et al. [14] enhanced the security in cognitive radio multicast network using interference power. But authors did not consider the effects of correlation on the security of multicasting and did not use any technique to eliminate the effects of correlation. In [15], the opportunistic relaying technique was used by Kibria et al. to enhance the security in multicasting without considering the effects of correlation. Sun et al. [16] investigated the impact of antenna correlation on the security of single-input multiple-output (SIMO) channel in the presence of multiple eavesdroppers. But authors used a unicasting scenario to investigate that effect and did not consider the effect of correlation on the multicasting network. In [17], Badrudduza et al. used the opportunistic relaying technique to reduce the effect of correlation on the security in multicasting over Nakagami-m fading channels. The authors did not mention the method that can be used to reduce that effect of correlation and which method is more efficient.

B. Existing Research Gap

Based on the aforementioned scenario available in the literature, it is observed that the compensation of the loss of security due to correlation in multicellular interference network using 1) diversity combining and 2) opportunistic relaying is still an open problem. Moreover, the performance comparison of different diversity combining techniques is an important issue to know, which combining technique is more significant for enhancing security in multicellular interference network mitigating the effect of correlation.

C. Contributions

Motivated by the aforementioned research gap in the literature and the importance of security in practical multicasting, in this paper, the authors studied a multicasting scenario through a cellular network and developed the mathematical model to ensure its security considering the effect of correlation. The authors use SC and SSC diversity schemes and compare their performance in enhancing security in correlated cellular networks and mitigating the effects of correlation. The major contributions of this paper can be summarized as follows.

• Based on the PDFs of dual arbitrarily correlated Nakagami-m fading channel with SC and SSC diversity schemes, at first, authors derive the expressions for the PDFs of the SNR of each multicast user and eavesdropper considering the effect of correlation.

• Secondly, using these PDFs of SNRs, the authors derive the PDFs of multicast channel and eavesdropper channel.

• Thirdly, the authors use the PDFs of multicast channel and eavesdropper channel to derive the analytical expressions for the probability of non-zero secrecy multicast capacity and the secure outage probability for multicasting.

• Finally, authors investigate the effect of correlation on the SC and SSC diversity schemes and quantify, which diversity scheme is more efficient in enhancing the security of cellular multicast network by mitigating the effects of correlation.

The remainder of this paper is organized as follows. Sections 2 and 3 describe the system model and problem formulation, respectively. The expressions for the probability of non-zero secrecy multicast capacity and the secure outage probability for multicasting are derived respectively in Sections 4 and 5. Numerical results are presented in Section 6. Finally, Section 7 draws the conclusions of this work.

2. System Model

A confidential wireless multicasting scenario shown in Figure 1 is considered in which a base station (BS) communicates with a group of M multicast users in the presence of N eavesdroppers. The BS is equipped with single antenna, and each multicast user and eavesdropper are equipped with n r and n e antennas, respectively. The antennas of multicast users and eavesdroppers are correlated with coefficient ρ . The transmitter transmits x with power P to the destination users M, and N eavesdroppers try to decode the transmitted signal. Let y d i and y e j are the received signals at the ith ( i = 1 , , M ) destination user and jth ( j = 1, , N ) eavesdropper, respectively. Then, we have

y d i = h i x + z d i , (1)

y e i = g j x + z e j , (2)

where h i n r × 1 and g j n e × 1 denote the channel coefficients from BS to ith destination user, and to jth eavesdropper, respectively. z d i N ˜ ( 0, N d ) and z d j N ˜ ( 0, N e ) denote the additive white Gaussian noise (AWGN) at the ith destination user, and jth eavesdropper with zero mean and variances N d and

Figure 1. System model.

N e , respectively. The instantaneous signal-to-noise ratio (SNR) at the ith destination user and jth eavesdropper can be expressed as γ d i = P N d h i 2 and γ e j = P N e g j 2 , respectively.

3. Problem Formulation

In this section, authors derive the expressions for the probability density functions (PDFs) of the SNRs of multicast channels and eavesdropper channels based on the PDFs of SNRs of ith destination user and jth eavesdropper with SC and SSC diversity schemes, respectively.

A. The PDF of γ d i and γ e j

Let f γ d i S C ( γ i ) and f γ e j S C ( γ j ) denotes the PDFs of γ d i and γ e j with SC, and f γ d i S S C ( γ i ) and f γ e j S S C ( γ j ) denotes the PDFs of γ d i and γ e j with SSC diversity schemes, respectively.

1) PDF with SC diversity: Since the SC scheme chooses the highest SNR’s branch using the relationship γ d i = max { γ d i , k , k = 1 , 2 , , n r } , therefore the PDF of γ d i for dual arbitrary correlated Nakagami-m fading channel with SC diversity is given by [18]

f γ d i S C ( γ i ) = 2 m m γ ¯ m m γ i m 1 e m γ i γ ¯ m Γ ( m ) { 1 Q m ( 2 α d i ρ γ i , 2 α d i γ i ) } 1 , (3)

where α d i = m γ ¯ i ( 1 ρ ) , m denotes the Nakagami-m fading parameter and Q m ( .,. ) is the first order Marcum Q-function defined as

Q m ( a , b ) = 1 exp ( a 2 2 ) k = 0 a 2 γ ( m + k , b 2 2 ) 2 k ! Γ ( m + k ) (4)

Using the identity of Equation (4), the expression of f γ d i S C ( γ i ) can be written as

f γ d i S C ( γ i ) = 2 m m Γ ( m ) γ ¯ m m k = 0 α d i ρ k ! [ γ i m + k 1 e ( m γ ¯ m + α d i ρ ) γ i l = 0 m + k l α d i l γ i m + k + l 1 l ! e ( m γ ¯ m + α d i ρ + α d i ) γ i ] (5)

Similarly, the PDF of γ e j for dual arbitrary correlated Nakagami-m fading channel with SC diversity is given by,

f γ e j S C ( γ j ) = 2 m m Γ ( m ) γ ¯ e m k = 0 α d j ρ k ! [ γ j m + k 1 e ( m γ ¯ e + α d j ρ ) γ j l = 0 m + k l α d j l γ j m + k + l 1 l ! e ( m γ ¯ e + α d j ρ + α d j ) γ j ] (6)

2) PDF with SSC diversity: Since the SSC diversity scheme selects a particular diversity branch until its SNR drops a predetermined threshold value, therefore, the PDF of SNR with SSC diversity can be defined considering two cases such as, when 1) γ γ T and 2) γ > γ T , where γ T denotes the threshold SNR. Hence, the PDF of γ d i for dual arbitrary correlated Nakagami-m fading channel with SSC diversity is given by [18]

f γ d i S S C ( γ i ) = ( D ( γ i ) , if γ i γ T D ( γ i ) + V d ( γ i ) , if γ i > γ T , (7)

where V d ( γ i ) = m m γ i m 1 e m γ i γ ¯ m Γ ( m ) γ ¯ m m and D ( γ i ) = m m γ ¯ m m γ i m 1 e m γ i γ ¯ m Γ ( m ) { 1 Q m ( 2 α d i ρ γ i , 2 α d i ρ γ T ) } 1 . Using the identity of Equation (4), the expressions of f γ d i S S C ( γ i ) can be written as

f γ d i S S C ( γ i ) = ( V d ( γ i ) × B d ( γ i ) , if γ i γ T V d ( γ i ) [ 1 + B d ( γ i ) ] , if γ i > γ T , (8)

where B d ( γ i ) = e α d i ρ γ i k = 0 ( α d i ρ γ i ) k γ ( m + k , γ T ) k ! Γ ( m + k ) . Similarly, the expression of f γ e j S S C ( γ j ) can be expressed as

f γ e j S S C ( γ j ) = ( V e ( γ j ) × B e ( γ j ) , if γ j γ T V e ( γ j ) [ 1 + B e ( γ j ) ] , if γ j > γ T , (9)

where V e ( γ j ) = m m γ j m 1 e m γ j γ ¯ e Γ ( m ) γ ¯ e m and B e ( γ j ) = e α e j ρ γ j k = 0 ( α e j ρ γ j ) k γ ( m + k , γ T ) k ! Γ ( m + k ) .

B. The PDF of SNR for Multicast Channels

Let d min min 1 i M γ d i , then the PDF of d min can be defined as [19] [20]

f d min ( γ i ) = M f γ d i ( γ i ) [ 1 F γ d i ( γ i ) ] M 1 = M f γ d i ( γ i ) [ 1 0 γ i f γ d i ( γ i ) d γ i ] M 1 , (10)

where F γ d i ( γ i ) denotes the cumulative distribution function (CDF) of γ d i .

1) The PDF of d min with SC diversity: Let f d min S C ( γ i ) denotes the PDF of d min with SC diversity. Then, f d min S C ( γ i ) can be defined as

f d min S C ( γ i ) = M f γ d i S C ( γ i ) [ 1 0 γ i f γ d i S C ( γ i ) d γ i ] M 1 . (11)

Substituting the value of f γ d i S C ( γ i ) in Equation (11) and using the following identities of [21] stated in Equations (3.351.2) and (1.111),

0 u x n e μ x d x = n ! μ n + 1 e μ u k = 0 n n ! u k k ! μ n k + 1 , (12)

( a + x ) n = k = 0 n ( n k ) x k a n k , (13)

the expression of f d min S C ( γ i ) can be derived as

f d min S C ( γ i ) = M W d T d ( γ i ϕ 1 e φ 1 γ i R d γ i ψ 1 e ν 1 γ i ) , (14)

where the expression of W d is shown in Equation (15) at the bottom of the next page, T d = δ k = 0 α d i ρ k ! , R d = l = 0 m + k l α d i l l ! , ϕ 1 = m + k 1 + k 1 ( l 1 l 2 ) + k 2 l 2 , φ 1 = ( m γ ¯ m + α d i ρ ) ( l 1 2 l 2 1 ) + α d i l 2 , ψ 1 = m + k + m 1 + k 1 ( l 1 l 2 ) + k 2 l 2 , ν 1 = ( m γ ¯ m + α d i ρ ) ( l 1 l 2 + 1 ) + α d i ( 1 + l 2 ) , θ 1 = ( m + k 1 ) ! ( m γ ¯ m + α d i ρ ) m + k , θ 3 = ( k + l + m 1 ) ! ( m γ ¯ m + α d i ρ ) k + l + m and δ = 2 m m Γ ( m ) γ ¯ m m .

W d = l 1 = 0 M 1 ( M 1 ) ! { 1 T d ( θ 1 R d θ 3 ) } M 1 l ( M 1 l 1 ) ! l 2 = 0 l 1 l 1 ! T d l 1 2 l 2 R d l 2 θ 2 l 1 l 2 θ 4 l 2 ( 1 ) l 2 ( l 1 l 2 ) ! (15)

2) The PDF of d min with SSC diversity: Let f d min S S C ( γ i ) denotes the PDF of d min with SSC diversity. Then, f d min S S C ( γ i ) can be defined as

f d min S S C ( γ i ) = M f γ d i S S C ( γ i ) [ 1 0 γ i f γ d i S S C ( γ i ) d γ i ] M 1 = M f γ d i S S C ( γ i ) [ 1 0 γ i V d ( γ i ) B d ( γ i ) d γ i 0 γ i V d ( γ i ) d γ i ] M 1 (16)

In order to simplify, only the case of γ i > γ T is considered to derived the expression of f d min S S C ( γ i ) . Substituting the value of f γ d i S S C ( γ i ) in Equation (16) and using the identities of Equations (12) and (13), the expression of f d min S S C ( γ i ) can be written as

f d min S S C ( γ i ) = M W d T d [ γ i ϕ 1 e φ 1 γ i R d γ i ψ 1 e ν 1 γ i δ 2 { κ d e ( m γ ¯ m ) γ i k = 0 m 1 κ d γ i k ( m γ ¯ m ) k k ! } ] , (17)

where κ d = ( m 1 ) ! ( m γ ¯ m ) m .

C. The PDF of SNR for Eavesdropper Channels

Let d max max 1 j N γ e j , then the PDF of d max can be defined as [3] [19]

f d max ( γ j ) = N f γ e j ( γ j ) [ F γ e j ( γ j ) ] N 1 = N f γ e j ( γ j ) [ 0 γ j f γ e j ( γ j ) d γ j ] N 1 , (18)

where F γ e j ( γ j ) denotes the CDF of γ e j .

1) PDF with SC diversity

Let f d max S C ( γ j ) denotes the PDF of d max with SC diversity. Then, f d max S C ( γ j ) can be defined as

f d max S C ( γ j ) = N f γ e j S C ( γ j ) [ 0 γ j f γ e j S C ( γ j ) d γ j ] N 1 . (19)

Substituting the value of f γ e j S C ( γ j ) in Equation (19) and using the identities of Equations (12) and (13), the expression of f d max S C ( γ j ) can be derived as

f d max S C ( γ j ) = N W e T e ( γ j ϕ 2 e φ 2 γ j R e γ j ψ 2 e ν 2 γ j ) , (20)

where the expression of W e is shown in Equation (21) at the bottom of the next page, T e = ξ k = 0 α e j ρ k ! , R e = l = 0 m + k l α e j l l ! , ϕ 2 = m + k 1 + k 1 ( l 1 l 2 ) + k 2 l 2 , φ 2 = ( m γ ¯ e + α e j ρ ) ( l 1 2 l 2 1 ) + α e j l 2 , ψ 2 = m + k + m 1 + k 1 ( l 1 l 2 ) + k 2 l 2 , ν 2 = ( m γ ¯ e + α e j ρ ) ( l 1 l 2 + 1 ) + α e j ( 1 + l 2 ) , θ 2 = ( m + k 1 ) ! ( m γ ¯ e + α e j ρ ) m + k , θ 4 = ( k + l + m 1 ) ! ( m γ ¯ e + α e j ρ ) k + l + m and ξ = 2 m m Γ ( m ) γ ¯ e m .

W e = l 1 = 0 N 1 ( N 1 ) ! { 1 T d ( θ 2 R e θ 4 ) } N 1 l ( N 1 l 1 ) ! l 2 = 0 l 1 l 1 ! T e l 1 2 l 2 R e l 2 θ 2 l 1 l 2 θ 4 l 2 ( 1 ) l 2 ( l 1 l 2 ) ! (21)

2) PDF with SSC diversity: Let f d max S S C ( γ j ) denotes the PDF of d max with SSC diversity. Then, f d max S S C ( γ j ) can be defined as

f d max S S C ( γ j ) = N f γ e j S S C ( γ j ) [ 0 γ j f γ e j S S C ( γ j ) d γ j ] N 1 = N f γ e j S S C ( γ j ) [ 0 γ j V e ( γ j ) B e ( γ j ) d γ j 0 γ j V e ( γ j ) d γ j ] N 1 (22)

Substituting the value of f γ e j S S C ( γ j ) in Equation (22) and using the identities of Equations (12) and (13), the expression of f d max S S C ( γ j ) is given by,

f d max S S C ( γ j ) = N W e T e [ γ j ϕ 2 e φ 2 γ j R e γ j ψ 2 e ν 2 γ j ξ 2 { κ e e ( m γ ¯ e ) γ j k = 0 m 1 κ e γ j k ( m γ ¯ e ) k k ! } ] , (23)

where κ e = ( m 1 ) ! ( m γ ¯ e ) m .

4. Probability of Non-Zero Secrecy Multicast Capacity

The probability of non-zero secrecy multicast capacity can be defined as

P r ( C s m c a s t > 0 ) = 0 f d min ( γ i ) × 0 γ i f d max ( γ j ) d γ j d γ i (24)

A. P r ( C s m c a s t > 0 ) with SC diversity

Let P r ( C s m c a s t > 0 ) S C denotes the probability of non-zero secrecy multicast capacity with SC diversity, then P r ( C s m c a s t > 0 ) S C is defined as

P r ( C s m c a s t > 0 ) S C = 0 f d min S C ( γ i ) 0 γ i f d max S C ( γ j ) d γ j d γ i (25)

Substituting the values of f d min S C ( γ i ) and f d max S C ( γ j ) in Equation (25) and performing integration, the closed-form analytical expression for P r ( C s m c a s t > 0 ) S C is given in Equation (26) at the bottom of this page, where K 1 = t 1 = 0 N 1 ( N 1 ) ! ( T e ϑ 1 R e ϑ 3 ) N 1 t 1 ( N 1 t 1 ) ! , D 1 = ϕ 2 ! φ 2 ϕ 2 + 1 R e ψ 2 ! ν 2 ψ 2 + 1 , D 2 = u 1 = 0 ϕ 2 ϕ 2 ! u 1 ! φ 2 ϕ 2 u 1 + 1 , D 3 = R e u 2 = 0 ψ 2 ψ 2 ! u 2 ! ν 2 ψ 2 u 2 + 1 , ϑ 1 = ( m + k 1 ) ! φ 2 m + k , ϑ 3 = ( m + k + l 1 ) ! ( φ 2 + a e j ) m + k + l ,

P r ( C s m c a s t > 0 ) S C = M N W d W e T d T e K 1 [ D 3 { ( u 2 + ϕ 1 ) ! ( φ 1 + ν 2 ) u 2 + ϕ 1 + 1 R d ( u 2 + ψ 1 ) ! ( ν 1 + ν 2 ) u 2 + ψ 1 + 1 } + D 1 { ϕ 1 ! φ 1 ϕ 1 + 1 R d ψ 1 ! ν 1 ψ 1 + 1 } D 2 { ( u 1 + ϕ 1 ) ! ( φ 1 + φ 2 ) u 1 + ϕ 1 + 1 R d ( u 1 + ψ 1 ) ! ( ν 1 + φ 2 ) u 1 + ψ 1 + 1 } ] (26)

B. P r ( C s m c a s t > 0 ) with SSC Diversity

Let P r ( C s m c a s t > 0 ) S S C denotes the probability of non-zero secrecy multicast capacity with SSC diversity, then P r ( C s m c a s t > 0 ) S S C is defined as

P r ( C s m c a s t > 0 ) S S C = 0 f d min S S C ( γ i ) 0 γ i f d max S S C ( γ j ) d γ j d γ i (27)

Substituting the values of f d min S S C ( γ i ) and f d max S S C ( γ j ) in Equation (27) and performing integration using the following identity of [21] stated in Equations (3.351.3), the closed-form analytical expression for P r ( C s m c a s t > 0 ) S S C is given in Equation (28) at the bottom of the nest page,

0 x n e μ x d x = n ! μ ( n + 1 ) ,

where D 4 = δ k d 2 k = 0 m 1 k d μ d k δ 2 k ! , D 5 = δ k e 2 k = 0 m 1 k e μ e k ξ 2 k ! , D 6 = k ! μ e k + 1 d 3 = 0 k k ! d 3 ! μ e k d 3 + 1 , μ d = m γ ¯ m and μ e = m γ ¯ e .

P r ( C s m c a s t > 0 ) S S C = M N W d W e T d T e K 1 [ D 3 { ( u 2 + ϕ 1 ) ! ( φ 1 + ν 2 ) u 2 + ϕ 1 + 1 R d ( u 2 + ψ 1 ) ! ( ν 1 + ν 2 ) u 2 + ψ 1 + 1 } + D 1 { ϕ 1 ! φ 1 ϕ 1 + 1 R d ψ 1 ! ν 1 ψ 1 + 1 } D 2 { ( u 1 + ϕ 1 ) ! ( φ 1 + φ 2 ) u 1 + ϕ 1 + 1 R d ( u 1 + ψ 1 ) ! ( ν 1 + φ 2 ) u 1 + ψ 1 + 1 } D 4 D 5 D 6 ( k + d 3 ) ! ( μ d + μ e ) ( k + d 3 + 1 ) ] (28)

5. Secure Outage Probability for Multicasting

The secure outage probability for multicasting can be defined as

P o u t ( R s m c a s t ) = 1 0 f d max ( γ j ) { λ f d min ( γ i ) d γ i } d γ j , (29)

where λ = e 2 R s m c a s t ( 1 + γ j ) 1 and R s m c a s t denotes the target secrecy multicast rate.

A. P o u t ( R s m c a s t ) with SC diversity

Let P o u t ( R s m c a s t ) S C denotes the secure outage probability for multicasting with SC diversity, then P o u t ( R s m c a s t ) S C is defined as

P o u t ( R s m c a s t ) S C = 1 0 f d max S C ( γ j ) { λ f d min S C ( γ i ) d γ i } d γ j . (30)

Substituting the values of f d min S C ( γ i ) and f d max S C ( γ j ) in Equation (30) and performing integration, the closed-form analytical expression for P o u t ( R s m c a s t ) S C is given in Equation (31) at the bottom of the next page, where

L 1 = a 1 = 0 ϕ 1 ϕ 1 ! a 1 ! φ 1 ϕ 1 a 1 + 1 d 1 = 0 a 1 a 1 ! ( 1 + e 2 R s m c a s t ) a 1 d 1 ( a 1 d 1 ) ! exp ( φ 1 φ 1 e 2 R s m c a s t + 2 R s m c a s t a 1 )

L 2 = a 2 = 0 ψ 1 ψ 1 ! a 2 ! ν 1 ψ 1 a 2 + 1 d 2 = 0 a 2 a 2 ! ( 1 + e 2 R s m c a s t ) a 2 d 2 ( a 2 d 2 ) ! exp ( ν 1 ν 1 e 2 R s m c a s t + 2 R s m c a s t a 2 )

P o u t ( R s m c a s t ) S C = M N W d W e T d T e K 1 [ L 1 ( ϕ 2 + a 1 ) ! ( φ 2 + φ 1 e 2 R s ) ϕ 2 + a 1 + 1 R d L 2 ( ϕ 2 + a 2 ) ! ( φ 2 + ν 1 e 2 R s ) ϕ 2 + a 2 + 1 R e L 1 ( ψ 2 + a 1 ) ! ( ν 2 + φ 1 e 2 R s ) ψ 2 + a 1 + 1 + R d R e L 2 ( ψ 2 + a 2 ) ! ( ν 2 + ν 1 e 2 R s ) ψ 2 + a 2 + 1 ] (31)

B. P o u t ( R s m c a s t ) with SSC diversity

Let P o u t ( R s m c a s t ) S S C denotes the secure outage probability for multicasting with SSC diversity, then P o u t ( R s m c a s t ) S S C is defined as

P o u t ( R s m c a s t ) S S C = 1 0 f d max S S C ( γ j ) { λ f d min S S C ( γ i ) d γ i } d γ j . (32)

Substituting the values of f d min S S C ( γ i ) and f d max S S C ( γ j ) in Equation (32) and performing integration, the closed-form analytical expression for P o u t ( R s m c a s t ) S S C is given in Equation (33) at the bottom of the next page,

P o u t ( R s m c a s t ) S S C = M N W d W e T d T e K 1 [ 1 + L 1 ( ϕ 2 + a 1 ) ! ( φ 2 + φ 1 e 2 R s ) ϕ 2 + a 1 + 1 R d L 2 ( ϕ 2 + a 2 ) ! ( φ 2 + ν 1 e 2 R s ) ϕ 2 + a 2 + 1 R e L 1 ( ψ 2 + a 1 ) ! ( ν 2 + φ 1 e 2 R s ) ψ 2 + a 1 + 1 + R d R e L 2 ( ψ 2 + a 2 ) ! ( ν 2 + ν 1 e 2 R s ) ψ 2 + a 2 + 1 L 3 2 μ m R s m c a s t ( k + 1 ) ! ( 2 d 3 R s m c a s t ) ( k + 2 ) ] (33)

where L 3 = d 3 = 0 k ( 1 ) k d 3 ( k ! ) 2 d 3 ! ( k d 3 ) ! and μ m = e 2 d 3 R s m c a s t ( 2 R s m c a s t e μ d ) .

6. Numerical Results

Figure 2 shows the probability of non-zero secrecy multicast capacity, P r ( C s m c a s t > 0 ) , with SC and SSC diversity schemes, as a function of the average SNR of the multicast channel, γ ¯ m , with ρ = 0.5 . This figure shows the comparison between SC and SSC diversity schemes in terms of the effect of channel correlation, ρ , on the P r ( C s m c a s t > 0 ) for selected values of system parameters. It is observed that the effect of correlation on the SSC diversity is higher than the SC diversity scheme. Hence, it can be concluded that SC outperforms than SSC diversity in enhancing security of correlated cellular networks.

The P r ( C s m c a s t > 0 ) is shown in Figure 3 as a function of the average SNR of the multicast channel, γ ¯ m , for different values of ρ . This figure describes the effect of channel correlation, ρ , on the P r ( C s m c a s t > 0 ) for SC diversity scheme for selected values of system parameters. It is seen that the P r ( C s m c a s t > 0 )

Figure 2. Comparison between SC and SSC diversity schemes in terms of the effect of channel correlation, ρ , on the P r ( C s m c a s t > 0 ) with M = 4 , N = 2 , n r = 4 , n e = 4 , m = 2 and γ ¯ e = 10 dB .

Figure 3. Effect of channel correlation, ρ , on the P r ( C s m c a s t > 0 ) for SC diversity scheme with M = 4 , N = 2 , n r = 4 , n e = 4 , m = 2 and γ ¯ e = 10 dB .

decreases if the values of ρ increases from 0.5 (indicated by the solid line) to 0.9 (indicated by the dash-dot line). This is because, the increase in correlation coefficient decreases the antenna diversity gain of multicast users which in turn causes the reduction in secrecy multicast capacity.

Figure 4 describes the effect of channel correlation, ρ , on the P r ( C s m c a s t > 0 ) for SSC diversity scheme for selected values of system parameters. Similar to the case of SC diversity, P r ( C s m c a s t > 0 ) decreases if the values of ρ increases from 0.5 (indicated by the solid line) to 0.9 (indicated by the dash-dot line). But the effect of ρ on the P r ( C s m c a s t > 0 ) is higher compared to the case of SC diversity scheme.

The P r ( C s m c a s t > 0 ) is shown in Figure 5 as a function of the average SNR of the multicast channel, γ ¯ m , for different values of M. This figure illustrates the effects of the number of multicast users, M, on the P r ( C s m c a s t > 0 ) for SC and SSC diversity schemes for selected values of system parameters. It is observed that, in the case of SC diversity, the P r ( C s m c a s t > 0 ) decreases, if the value of M increases from 10 (indicated by the dash-dot-dot line) to 20 (indicated by the solid line) keeping the value of N = 2 . Similarly, in the case of SSC diversity, the P r ( C s m c a s t > 0 ) decreases, if the values of M increases from 10 (indicated by the dash-dot line) to 20 (indicated by the solid line with square) keeping the value of N = 2 . It is seen that although P r ( C s m c a s t > 0 ) decreases with M, but the effect of M is higher in the case of SSC diversity compared to the case of SC diversity. This is because, the increasing in M, the bandwidth of each user decreases and the SSC diversity scheme enhances this effect compared to the SC diversity.

Figure 6 shows P r ( C s m c a s t > 0 ) as a function of the average SNR of the multicast channel, γ ¯ m , for different values of m and γ ¯ e . This figure compares the effects of m and γ ¯ e on the P r ( C s m c a s t > 0 ) for SC and SSC diversity schemes. The effects of fading parameter m and γ ¯ e on the SC diversity is higher than the SSC diversity scheme. This is because, the SC scheme chooses the highest

Figure 4. Effect of channel correlation, ρ , on the P r ( C s m c a s t > 0 ) for SSC diversity scheme with M = 4 , N = 2 , n r = 4 , n e = 4 , m = 2 and γ ¯ e = 10 dB .

Figure 5. Effect of the number of multicast users, M, on the P r ( C s m c a s t > 0 ) for SC and SSC diversity schemes with n r = 4 , n e = 4 , m = 2 , ρ = 0.5 and γ ¯ e = 10 dB .

Figure 6. Effect of fading parameter, m, and the average SNR of eavesdropper channel, γ ¯ e on the P r ( C s m c a s t > 0 ) for SC and SSC diversity schemes with M = 4 , N = 2 , n r = 4 , n e = 4 and ρ = 0.5 .

SNR’s branch and the SSC diversity scheme selects a particular diversity branch until its SNR drops a predetermined threshold value. In the case of SC diversity, when the value of γ ¯ e increases the capacity of eavesdropper’s channel increases which causes an reduction in the secrecy capacity. On the other hand, the selection of a particular diversity branch cannot ensures the selection of highest SNR branch of eavesdropper channel. The effect of fading causes an reduction in the SNRs of multicast channel and eavesdropper channel. Therefore, the choice of highest SNR branch of eavesdropper channel incorporate lower effect of fading parameter. Moreover, fading is not the enemy of secrecy capacity. Hence, the effects of m and γ ¯ e on the SC diversity decrease the security significantly compared to the effects of m and γ ¯ e on the SSC diversity.

The P o u t ( R s m c a s t ) is shown in Figure 7 as a function of the average SNR of the multicast channel, γ ¯ m , for different values of M and N. This figure describes the effects of M on the SSC diversity and the effects of N on the SC diversity in terms of P o u t ( R s m c a s t ) for selected values of system parameters. It is observed that the P o u t ( R s m c a s t ) increases if the values of M increases from 4 (indicated by the solid line with square) to 8 (indicated by the dash line) keeping the value of N = 4 . P o u t ( R s m c a s t ) also increases if the values of N increases from 4 (indicated by the solid line) to 8 (indicated by the long dash-dot line) keeping the value of M = 4 . Hence, it can be concluded that the security for any kind of diversity scheme decreases due to the effects of both M and N.

The P o u t ( R s m c a s t ) is shown in Figure 8 as a function of the average SNR of the multicast channel, γ ¯ m , for different values of ρ . This figure describes the effects of ρ on the SC and SSC diversity schemes in terms of P o u t ( R s m c a s t ) for selected values of system parameters. It is seen that in both the cases of SC and SSC diversity schemes, the P o u t ( R s m c a s t ) increases if the values of ρ increases from 0.5 (indicated by the dash-dot line for SC and dash dot-dot line for SSC) to 0.9 (indicated by the long dash-dot line for SC and solid line for SSC), which causes an reduction in the security of multicast network.

Figure 7. Effect of the number of multicast users, M, and eavesdroppers, N, on the P o u t ( R s m c a s t ) for SSC and SC diversity schemes, respectively, with n r = 4 , n e = 8 , m = 1 , ρ = 0.5 and γ ¯ e = 10 dB .

Figure 8. Effect of channel correlation, ρ , on the P o u t ( R s m c a s t ) for SC and SSC diversity schemes with M = 2 , N = 2 , n r = 4 , n e = 4 , m = 2 and γ ¯ e = 10 dB .

Therefore, based on the closed-form analytical expressions for the probability of non-zero secrecy multicast capacity and the secure outage probability for multicasting, and from the observations of numerical results, the main findings of this paper can be summarized as follows: the security in multicasting degrades with the number of multicast users and eavesdroppers, and due to the antenna correlation. The effect of antenna correlation is more significant in the case of SSC diversity compared to the case of SC diversity. Due to the selection mechanism of SC diversity, it is more sensitive to the change of SNR of eavesdropper’s channel compared to the case of SSC diversity scheme.

7. Conclusion

This paper focuses on the comparison of SC and SSC diversity schemes in enhancing the security of correlated cellular network and mitigating the effects of antenna correlation. To achieve this goal, an analytical model has been developed consisting of the closed-form analytical expressions for the probability of non-zero secrecy multicast capacity and the secure outage probability for multicasting considering the effects of antenna correlation. The developed analytical model is verified via Monte-Carlo simulation. The matching between the analytical and simulation results justifies the validity of the developed analytical model. Based on the analytical model and the observation of the numerical results, it can be concluded that the antenna correlation degrades the security of the cellular network in both the cases of SC and SSC diversity schemes, but the effect of this correlation is more significant in the case of SSC diversity compared with the case of SC diversity. In general, diversity schemes reduce the effect of correlation, but this result paves the way for selecting an efficient diversity scheme to mitigate the effect of correlation efficiently.

Conflicts of Interest

The authors declare no conflicts of interest regarding the publication of this paper.

References

[1] Chuah, C., Tse, D., Kahn, J. and Valenzuela, R. (2002) Capacity Scaling in MIMO Wireless Systems under Correlated Fading. IEEE Transactions on Information Theory, 48, 637-650.
https://doi.org/10.1109/18.985982
[2] Haenggi, M. (2002) Diversity Loss Due to Interference Correlation. IEEE Transactions on Information Theory, 48, 637-650.
[3] Sarker, D.K., Sarkar, M.Z.I. and Anower, M.S. (2017) Secure Wireless Multicasting with Linear Equalization. Physical Communication, 25, 201-213.
https://doi.org/10.1016/j.phycom.2017.07.007
[4] Shrestha, A.P., Jung, J. and Kwak, K.S. (2013) Secure wireless Multicasting in Presence of Multiple Eavesdroppers. International Symposium on Communications and Information Technologies, Surat Thani, 4-6 September 2013, 814-817.
https://doi.org/10.1109/ISCIT.2013.6645929
[5] Giti, J.E., Chowdhury, S.A.H. and Ali, M.M. (2015) Enhancing Security in Wireless Multicasting with Selective Precoding. International Journal of Systems, Control and Communications, 6, 277-291.
https://doi.org/10.1504/IJSCC.2015.072515
[6] Giti, J.E., Chowdhury, S.A.H., Rashid, M.M. and Ali, M.M. (2015) Enhancing Secure Wireless Multicasting Using Phase Alignment Relay Precoding. IEEE International Conference on Electrical and Electronics Engineering, Rajshahi, 4-6 November 2015, 189-192.
https://doi.org/10.1109/CEEE.2015.7428252
[7] Sayed, R., Sarkar, M.Z.I., Ali, S.M.R. and Sarker, D.K. (2016) Secure Wireless Multicasting through Multi-Cellular MIMO Networks with Linear Equalization. International Conference on Electrical Engineering and Information Communication Technology, Dhaka, 22-24 September 2016, 1-6.
https://doi.org/10.1109/CEEICT.2016.7873159
[8] Nguyen, V.-D., Duong, T.Q., Shin, O.-S., Nallanathan, A. and Karagiannidis, G.K. (2017) Enhancing PHY Security of Cooperative Cognitive Radio Multicast Communications. IEEE Transaction on Cognitive Communications and Networking, 3, 599-613.
https://doi.org/10.1109/TCCN.2017.2748132
[9] Nguyen, M.-N., Nguyen, N.-P., Costa, D.B.D., Nguyen, H.-K. and Sousa, R.T.D. (2017) Secure Cooperative Half-Duplex Cognitive Radio Networks with k-th Best Relay Selection. IEEE Access, 5, 6678-6687.
https://doi.org/10.1109/ACCESS.2017.2686984
[10] Kundu, M.K., Badrudduza, A.S.M., Sarkar, M.Z.I. and Sarker, D.K. (2019) Secure Wireless Multicasting with Mixture Gamma Distribution for Generalized-K Fading Channels. IEEE International Conference on Computer, Communication, Chemical, Materials and Electronic Engineering, Rajshahi, 11-12 July 2019, 1-4.
https://doi.org/10.1109/IC4ME247184.2019.9036571
[11] Borshon, Z.I., Nafis, A.S.M., Badruduzza, A.S.M., Kundu, M. and Sarkar, M. (2019) Enhancing Wireless Security over Weibull Fading Multicast Channel. IEEE International Conference on Computer, Communication, Chemical, Materials and Electronic Engineering, Rajshahi, 11-12 July 2019, 1-4.
https://doi.org/10.1109/IC4ME247184.2019.9036690
[12] Badrudduza, A.S.M. and Kundu, M.K. (2019) Enhancing Security in Wireless Multicasting over k-μ Fading Channel. IEEE International Conference on Computer and Information Technology, Dhaka, 18-20 December 2019, 1-5.
https://doi.org/10.1109/ICCIT48885.2019.9085488
[13] Atallah, M. and Kaddoum, G. (2019) Secrecy Analysis in Wireless Network with Passive Eavesdroppers by Using Partial Cooperation. IEEE Transactions on Vehicular Technology, 68, 7225-7230.
https://doi.org/10.1109/TVT.2019.2913934
[14] Sultana, R., Sarkar, M.Z.I. and Hossain, M.S. (2019) Enhancing Security in Cognitive Radio Multicast Networks Using Interference Power. Journal of Computer and Communication, 7, 66-78.
https://doi.org/10.4236/jcc.2019.712007
[15] Kibria, M., Sarkar, M. and Sarker, D. (2019) Enhancing Security in Multicasting with Opportunistic Relaying over Nakagami-m Fading Channels. Journal of Applied Engineering and Science, 3, 80-90.
[16] Sun, G., Liu, M., Han, Z. and Zhao, C. (2020) Multiple Eavesdropper-Based Physical Layer Security in SIMO System With Antenna Correlation. KSII Transactions on Internet and Information Systems, 14, 422-436.
https://doi.org/10.3837/tiis.2020.01.023
[17] Badrudduza, A., Sarkar, M. and Kundu, M. (2020) Enhancing Security in Multicasting through Correlated Nakagami-m Fading Channels with Opportunistic Relaying. Physical Communication, 43, Article ID: 101177.
https://doi.org/10.1016/j.phycom.2020.101177
[18] Juboori, S.A., Deng, Y. and Nallanathan, A. (2019) Impact of Interbranch Correlation on Multichannel Spectrum Sensing with SC and SSC Diversity Combining Schemes. IEEE Transactions on Vehicular Technology, 68, 456-470.
https://doi.org/10.1109/TVT.2018.2880802
[19] Khisti, A. and Zhang, D. (2013) Artificial-Noise Alignment for Secure Multicast Using Multiple Antennas. IEEE Communications Letters, 17, 1568-1571.
https://doi.org/10.1109/LCOMM.2013.060513.130802
[20] Sarkar, M.Z.I. and Ratnarajah, T. (2011) Secure Wireless Multicasting through Nakagami-m Fading MISO Channel. Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR), Pacific Grove, CA, 6-9 November 2011, 300-304.
https://doi.org/10.1109/ACSSC.2011.6190006
[21] Gradshteyn, I.S. and Ryzhik, I.M. (2007) Table of Integrals, Series, and Products. 7th Edition, Academic Press, San Diego, CA.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.