Security in Multicast Over α-μ Fading Channels with Orthogonal Frequency Division Multiplexing

Abstract

The orthogonal space-frequency block coding (OSFBC) with orthogonal frequency division multiplexing (OFDM) system reduces complexity in the receiver which improves the system performance significantly. Motivated by these advantages of OSFBC-OFDM system, this paper considers a secure wireless multicasting scenario through multiple-input multiple-output (MIMO) OFDM system employing OSFBC over frequency selective α-μ fading channels. The authors are interested to protect the desired signals from eavesdropping considering the impact of the number of multicast users and eavesdroppers, and the fading parameters α and μ. A mathematical model has been developed based on the closed-form analytical expressions of the probability of non-zero secrecy multicast capacity (PNSMC) and the secure outage probability for multi-casting (SOPM) to ensure the security in the presence of multiple eaves-droppers. The results show that the security in MIMO OSFBC OFDM system over α-μ fading is more sensitive to the magnitude of α and μ and this effect increases in the high signal-to-noise ratio (SNR) region of the main channel.

Share and Cite:

Hasan, M. and Sarkar, M. (2022) Security in Multicast Over α-μ Fading Channels with Orthogonal Frequency Division Multiplexing. Journal of Computer and Communications, 10, 72-90. doi: 10.4236/jcc.2022.1011006.

1. Introduction

The orthogonal space-frequency block coding (OSFBC) with orthogonal frequency division multiplexing (OFDM) system reduces complexity in the receiver which improves the system performance significantly [1]. On the other hand, multicasting is an efficient wireless communication technique for group-oriented and personal communication such as video-conferencing, e-learning, etc. Due to the increase of application areas and the mobility of users with network components, the security is a crucial aspect in wireless multicasting systems because of the fact that the medium of wireless multicasting is susceptible to eavesdropping and fraud [2].

1.1. Related Works

In this paper, authors concentrate on the security in multicasting employing the OSFBC technique with MIMO-OFDM system over frequency selective α-μ fading channels. Although a good number of publications are available in the literature to describe the security in α-μ fading channels, but there is no work which is closely related to the MIMO-OFDM system employing the OSFBC technique. Just to clarify the status of the existing literature, authors presented some recent papers which describe the status of proposed research domain. The research gap is also mentioned at the end of the related work section.

Recently, Mathur et al. [3] investigated the effect of correlation on the security in α-μ fading channel through asymptotic analysis. The effects of various system parameters on the secrecy diversity gain were investigated in [4]. The effects of various system parameters on the secrecy diversity and array gain were investigated in [5]. In [6], Hanif et al. investigated the effects of α-μ fading parameters on the security performance of multicasting scenario. In [7], the authors investigated the effects of α-μ fading parameters on the secrecy diversity parameters. The MIMO-OFDM system was considered in [8] to investigate the secrecy performance. In [9], the effects of α-μ fading parameters on the security in underlay cognitive radio network were investigated considering a single-input multiple-output (SIMO) network. In [10], authors analyzed the reliability and security of cascaded α-μ fading channels deriving the closed-form analytical expressions for the probability of non-zero secrecy capacity, the secure outage probability and the average secrecy capacity in terms of Foxs H-function. The asymptotic closed-form expression for the secrecy outage probability of SIMO α-μ fading channel were derived in [11] in terms of Foxs H-function.

However, in the aforementioned works, the authors did not consider the OSFBC system in the α-μ fading channel. Employing OSFBC in MIMO-OFDM system, the system performance can be significantly improved which is shown in [1]. Motivated by advantages of OSFBC in MIMO-OFDM system and the importance of security in multicasting, the authors of this paper investigated a secure wireless multicasting scenario in the α-μ fading channel employing OSFBC in MIMO-OFDM system.

1.2. Contributions

Based on the aforementioned scenario available in the literature and motivated by the importance of security in α-μ fading channel employing OSFBC in MIMO-OFDM system, in this paper, authors studied a secure wireless multicasting scenario and developed a mathematical model to ensure the security in α-μ fading channel incorporating the benefits of OSFBC in MIMO-OFDM system. The major contributions of this paper can be summarized as follows.

● At first, based on the PDF of MIMO OSFBC OFDM system over α-μ fading channels, authors derived the expressions for the probability density function (PDFs) of minimum SNR of the multicast channels denoted by d min and the maximum SNR of eavesdropper’s channels denoted by d max .

● Secondly, using the PDFs of d min and d max , authors derived the expressions for the probability of non-zero secrecy multicast capacity (PNSMC) and the secure outage probability for multicasting (SOPM).

● Finally, the effects of fading parameters α and μ, and the number of multicast users and eavesdroppers are investigated on the security in wireless multicasting through α-μ fading channels.

All the results of analysis are carried out by Mathematica and the figures are plotted by Excel.

The remainder of this paper is organized as follows. Sections II and III describe the system model and problem formulation, respectively. The expressions for the probability of non zero secrecy multicast capacity and the secure outage probability for multicasting are derived respectively in Section IV and V. Numerical results are presented in Section VI. Finally, Section VII draws the conclusions of this work.

2. System Model

A secure wireless multicasting scenario as shown in Figure 1 is considered through MIMO OSFBC OFDM system over α-μ fading channel in the presence of N eavesdroppers. A transmitter equipped with n t antennas sends a common stream of confidential information to theM receivers each with n r antennas. N eavesdroppers each with n e antennas try to decode this confidential information. Authors are interested to protect this information from eavesdropping. The channel between transmitter and receiver is known as main channel and the channel between transmitter and eavesdropper is known as eavesdropper’s channel. We consider α-μ fading channels for both main channel and eavesdropper’s channel. Both α and μ are the arbitrary fading parameters. αreflects the nonlinearity and μ reflects the clustering. α m and μ m are assumed to be the arbitrary fading parameters of the main channel while α e and μ e are assumed to be the arbitrary fading parameters of the eavesdropper’s channel.

3. Problem Formulation

3.1. PDF of Multicast Channel

Let γ M i denotes the signal-to-noise ratio (SNR) of ith multicast channel. Then, the PDF of γ M i for MIMO OSFBC OFDM system over α-μ fading channel is given by [1].

Figure 1. System model.

λ > 0 , 0 ρ < 1 (1)

where A 1 = α 1 2 Γ ( μ 1 ) { Γ ( 2 α 1 + μ 1 ) γ ¯ 1 Γ ( μ 1 ) } μ 1 α 1 2 and B 1 = { Γ ( 2 α 1 + μ 1 ) γ ¯ 1 Γ ( μ 1 ) } α 1 2 .

3.2. PDF of Eavesdrppor’s Channel

Let γ E j denotes the SNR of jth eavesdropper’s channel. Then, the PDF of γ E j for MIMO OSFBC OFDM system over α-μ fading channel is given by,

λ > 0 , 0 ρ < 1 (2)

where A 2 = α 2 2 Γ ( μ 2 ) { Γ ( 2 α 2 + μ 2 ) γ ¯ 2 Γ ( μ 2 ) } μ 2 α 2 2 and B 2 = { Γ ( 2 α 2 + μ 2 ) γ ¯ 2 Γ ( μ 2 ) } α 2 2 .

3.3. CDF of γ M i

The CDF of ith multicast channel denoted by F γ M i ( γ M i ) can be defined as

F γ M i ( γ M i ) = 0 γ M i f γ M i ( γ M i ) d γ M i (3)

Substituting the value of f γ M i ( γ M i ) in Equation (3) and performing integration we have

F γ M i ( γ M i ) = A 1 A 3 ( γ M i ) α 1 2 ( μ 1 + n ) , (4)

where A 3 = n = 0 ( 1 ) n ( B 1 ) n n ! ( μ 1 + n ) α 1 2 .

3.4. CDF of γ E j

The CDF of jth eavesdropper’s channel denoted by F γ E j ( γ E j ) can be defined as

F γ E j ( γ E j ) = 0 γ E j f γ E j ( γ E j ) d γ E j (5)

Substituting the value of f γ E j ( γ E j ) in Equation (5) and performing integration we have

F γ E j ( γ E j ) = A 2 q = 0 ( 1 ) q ( B 2 ) q q ! ( μ 2 + q ) α 2 2 ( γ E j ) α 2 2 ( μ 2 + q ) (6)

3.5. PDF of Minimum SNR of Multicast Channels

Let d min = min 1 i M γ M i . Then, the PDF of d min denoted by f d min ( γ M i ) can be defined as

f d min ( γ M i ) = M f γ M i ( γ M i ) { 1 F γ M i ( γ M i ) } M 1 (7)

Substituting the values of Equations (1) and (4) into Equation (7) and performing integration we have

f d min ( γ M i ) = M A 1 [ γ M i μ 1 α 1 2 1 ( M 1 ) A 1 A 3 × { γ M i v m 1 2 1 ( M 2 ) A 1 A 3 2 ! γ M i v m 2 2 1 } ] e B 1 γ M i α 1 2 (8)

where A 3 = n = 0 ( 1 ) n ( B 1 ) n n ! ( μ 1 + n ) α 1 2 , v m 1 = 2 μ 1 α 1 + n α 1 and v m 2 = 3 μ 1 α 1 + 2 n α 1 .

3.6. PDF of Maximum SNR of Eavesdropper’s Channels

Let d max = max 1 j N γ E j . Then, the PDF of d max denoted by f d max ( γ E j ) can be defined as

f d max ( γ E j ) = N f γ E j ( γ E j ) { F γ E j ( γ E j ) } N 1 (9)

Substituting the values of Equations (2) and (6) into Equation (9) and performing integration we have

f d max ( γ E j ) = N A 2 A 4 { c 0 γ E j v e 3 2 1 + c 1 γ E j v e 4 2 1 } e B 2 ( γ E j ) α 2 2 , (10)

where

A 4 = ( 2 A 2 α 2 ) N 1 , c 0 = ( 1 μ 2 ) N 1 , c 1 = ( N 1 ) ( μ 2 ) 2 N ( B 2 ) μ 2 + 1 , v e 1 = N μ 2 α 2 μ 2 α 2 , v e 2 = N μ 2 α 2 μ 2 α 2 + α 2 , v e 3 = v e 1 + μ 2 α 2 , v e 4 = v e 2 + μ 2 α 2 .

4. Probability of Non-Zero Secrecy Multicast Capacity

The probability of non-zero secrecy multicast capacity denoted by P r ( C s m c a s t > 0 ) can be defined as

P r ( C s m c a s t > 0 ) = 0 f d min ( γ M i ) { 0 γ M i f d max ( γ E j ) d γ E j } d γ M i (11)

Substituting the values of f d min ( γ M i ) and f d max ( γ E j ) in Equation (11) and performing integration, the closed-form analytical expression for the P r ( C s m c a s t > 0 ) is given in Equation (12) at the bottom of this page,

P r ( C s m c a s t > 0 ) = M A 1 α 1 2 { A 5 Γ ( v p 1 α 1 ) B 1 v p 1 α 1 + A 6 Γ ( v p 2 α 1 ) B 1 v p 2 α 1 } M ( M 1 ) A 1 2 A 3 { A 5 Γ ( v p 3 α 1 ) α 1 2 B 1 v p 3 α 1 A 6 Γ ( v p 4 α 1 ) α 1 2 B 1 v p 4 α 1 } + M ( M 1 ) ( M 2 ) A 1 3 A 3 2 2 ! { A 5 Γ ( v p 5 α 1 ) α 1 2 B 1 v p 5 α 1 + A 6 Γ ( v p 6 α 1 ) α 1 2 B 1 v p 6 α 1 } , (12)

where

A 5 = N c 0 A 2 A 4 α 2 2 n 1 = 0 ( 1 ) n 1 B 2 n 1 n 1 ! ( v e 3 α 2 + n 1 ) , v e 5 = v e 3 + n 1 α 2 , v e 6 = v e 4 + n 2 α 2 ,

A 6 = N c 1 A 2 A 4 α 2 2 n 2 = 0 ( 1 ) n 2 B 2 n 2 n 2 ! ( v e 4 α 2 + n 2 ) , v p 1 = μ 1 α 1 + v e 5 , v p 2 = μ 1 α 1 + v e 6 , v p 3 = v m 1 + v e 5 , v p 4 = v m 1 + v e 6 , v p 5 = v m 2 + v e 5 , v p 6 = v m 2 + v e 6 .

5. Secure Outage Probability for Multicasting

The secure outage probability for multicasting denoted by P o u t ( R s m c a s t ) can be defined as

P o u t ( R s m c a s t ) = 1 0 f d max ( γ E j ) { x f d min ( γ M i ) d γ M i } d γ E j , (13)

where x = e 2 R s m c a s t ( 1 + γ j ) 1 and R s m c a s t denotes the target secrecy multicast rate. Now, substituting the values of f d min ( γ M i ) in Equation (13) and performing integration the closed-form analytical expression for P o u t ( R s m c a s t ) is given in Equation (14) at the bottom of the next page,

P o u t ( R s m c a s t ) = 1 M N A 1 A 2 A 4 α 2 2 [ A 7 A 8 { c 0 Γ ( u e 1 α 2 ) ( B 3 ) u e 1 α 2 + c 1 Γ ( u e 4 α 2 ) ( B 3 ) u e 4 α 2 } A 1 A 3 A 10 A 11 { c 0 Γ ( u e 2 α 2 ) ( B 3 ) u e 2 α 2 + c 1 Γ ( u e 5 α 2 ) ( B 3 ) u e 5 α 2 } + A 1 2 A 3 2 A 12 A 13 { c 0 Γ ( u e 3 α 2 ) ( B 3 ) u e 3 α 2 + c 1 Γ ( u e 6 α 2 ) ( B 3 ) u e 6 α 2 } ] (14)

where

A 7 = 2 ( M 1 ) ! 0 ! ( M 1 ) ! α 1 B 1 μ 1 Γ ( μ 1 ) m 1 = 0 μ 1 1 B 1 m 1 m 1 ! ,

A 8 = n 3 = 0 m 1 α 1 2 ( m 1 α 1 2 ) ! n 3 ! ( m 1 α 1 2 n 3 ) ! ( e 2 R s 1 ) n 3 ( e 2 R s ) n 3 m 1 α 1 2 ,

A 9 = n 4 = 0 α 1 2 ( α 1 2 ) ! n 4 ! ( α 1 2 n 4 ) ! ( e 2 R s 1 ) n 4 ( e 2 R s ) n 4 α 1 2 ,

A 10 = 2 ( M 1 ) ! 1 ! ( M 2 ) ! α 1 B 1 v m 1 α 1 Γ ( v m 1 α 1 ) m 2 = 0 v m 1 α 1 1 B 1 m 2 m 2 ! ,

A 11 = n 5 = 0 m 2 α 1 2 m 2 α 1 2 ! n 5 ! ( m 2 α 1 2 n 5 ) ! ( e 2 R s 1 ) n 5 ( e 2 R s ) n 5 m 2 α 1 2 ,

A 12 = 2 ( M 1 ) ! 2 ! ( M 3 ) ! α 1 B 1 v m 2 α 1 Γ ( v m 2 α 1 ) m 3 = 0 v m 2 α 1 1 B 1 m 3 m 3 ! ,

A 13 = n 6 = 0 m 3 α 1 2 m 3 α 1 2 ! n 6 ! ( m 3 α 1 2 n 6 ) ! ( e 2 R s 1 ) n 6 ( e 2 R s ) n 6 m 3 α 1 2 ,

u e 1 = v e 3 + m 1 α 1 2 n 3 , u e 2 = v e 3 + m 2 α 1 2 n 5 , u e 3 = v e 3 + m 3 α 1 2 n 6 , u e 4 = v e 4 + m 1 α 1 2 n 3 , u e 5 = v e 4 + m 2 α 1 2 n 5

and

u e 6 = v e 4 + m 3 α 1 2 n 6 .

6. Numerical Results

Figure 2 shows the probability of non-zero secrecy multicast capacity, P r ( C s m c a s t > 0 ) , as a function of the average SNR of the multicast channel, γ ¯ M , for selected values of M and N. This figure describes the effects of M and N on the P r ( C s m c a s t > 0 ) for selected values of system parameters. We see that the P r ( C s m c a s t > 0 ) decreases, if the number of eavesdropper, N, increases from 1 to 2. P r ( C s m c a s t > 0 ) decreases, if the number of multicast user, M, increases from 1 (indicated by the long-dash line and solid line) to 2 (indicated by the short-dash line and dotted line) with the system parameters α m = 0.6 , α e = 1 , μ m = 1.5 , μ e = 1 and γ e = 2 0 dB . This is because, in the multicast channel, increasing in the number of multicast user reduces the bandwidth of each user which causes a reduction in the capacity of each multicast user. In the eavesdropper channel, increasing in the number of eavesdropper increases the probability of eavesdropping and causes a reduction in the secrecy capacity.

Figure 3 shows the P r ( C s m c a s t > 0 ) , as a function of γ ¯ M , for selected values of the average SNR of eavesdropper channel, γ ¯ e . This figure describes the effects of γ ¯ e on the P r ( C s m c a s t > 0 ) for selected values of system parameters. We see that P r ( C s m c a s t > 0 ) decreases with γ e increases. Because, the capacity of eavesdropper’s channel increases with γ e which causes a reduction in the secrecy capacity.

Figure 4 shows the P r ( C s m c a s t > 0 ) , as a function of γ ¯ M for selected values of the arbitrary constant, α m and M. This figure describes the effects of α m on the P r ( C s m c a s t > 0 ) for the selected values of system parameters. We see that the P r ( C s m c a s t > 0 ) increases with α m for different values of M. This is because, the capacity of multicast channel increases with α m which causes an improvement in the secrecy capacity.

Figure 2. The effects of the number of multicast user, M, and eavesdropper, N, on the P r ( C s m c a s t > 0 ) with α m = 0.6 , α e = 1 , μ m = 1.5 , μ e = 1 and γ e = 2 0 dB .

Figure 3. The effect of average SNR of eavesdropper’s channel, γ e , on the P r ( C s m c a s t > 0 ) for M = 2 , N = 2 , α m = 3 , α e = 0.5 , μ m = 0.5 and μ e = 0.5 .

Figure 4. The effect of arbitrary constant, α m , on the P r ( C s m c a s t > 0 ) for selected values of M with N = 2 , α e = 0.5 , μ m = 0.5 , μ e = 0.5 and γ e = 2 5 dB .

Figure 5 shows the P r ( C s m c a s t > 0 ) , as a function of γ ¯ M for selected values of the arbitrary constant μ m and M. This figure describes the effect of μ m on the P r ( C s m c a s t > 0 ) for selected values of system parameters. We see that the P r ( C s m c a s t > 0 ) increases with μ m for different values of M. This is because, the capacity of multicast channel increases with μ m which causes an improvement in the secrecy capacity.

Figure 6 shows the P r ( C s m c a s t > 0 ) , as a function of the γ ¯ M for selected values of the arbitrary constant α e and M. This figure describes the effects of α e on the P r ( C s m c a s t > 0 ) for selected values of system parameters. We see that the P r ( C s m c a s t > 0 ) decreases with α e for different values of M. This is because, the capacity of eavesdropper’s channel increases with α e which causes a reduction in the secrecy capacity.

Figure 7 shows the P r ( C s m c a s t > 0 ) , as a function of γ ¯ M for selected values of the arbitrary constant μ e and M. This figure describes the effects of μ e on the P r ( C s m c a s t > 0 ) for selected values of system parameters. We see that the P r ( C s m c a s t > 0 ) decreases with μ e for different values of M. This is because, the capacity of eavesdropper’s channel increases with μ e which causes a reduction in the secrecy capacity.

Figure 8 shows the P r ( C s m c a s t > 0 ) , as a function of the γ ¯ M for selected values of the arbitrary constant α m and N. This figure describes the effects of α m for selected values of N on the P r ( C s m c a s t > 0 ) for selected values of system parameters. We see that the P r ( C s m c a s t > 0 ) increases with α m for different values of N but decreases with N.

Figure 5. The effect of arbitrary constant, μ m , on the P r ( C s m c a s t > 0 ) for selected values of M with N = 1 , α m = 3 , α e = 0.75 , μ e = 0.5 and γ e = 2 5 dB .

Figure 6. The effect of arbitrary constant, α e , on the P r ( C s m c a s t > 0 ) for selected values of M with N = 1 , α m = 3 , μ m = 0.75 , μ e = 0.5 and γ e = 2 5 dB .

Figure 7. The effect of arbitrary constant, μ e , on the P r ( C s m c a s t > 0 ) for selected values of M with N = 1 , α m = 3 , α e = 0.65 , μ m = 0.75 and γ e = 2 5 dB .

Figure 8. The effect of arbitrary constant, α m , on the P r ( C s m c a s t > 0 ) for selected values of N with M = 1 , α e = 1 , μ m = 1 , μ e = 0.5 , γ e = 2 0 dB .

Figure 9 shows the P r ( C s m c a s t > 0 ) , as a function of γ ¯ M for selected values of the arbitrary constant, μ m , and N. This figure describes the effects of

Figure 9. The effect of arbitrary constant, μ m , on the P r ( C s m c a s t > 0 ) for selected values of N with M = 1 , α m = 3 , α e = 1 , μ e = 0.5 and γ e = 2 0 dB .

μ m on the P r ( C s m c a s t > 0 ) for selected values of system parameters. We see that the P r ( C s m c a s t > 0 ) increases with μ m for different values of N but decreases with N.

Figure 10 shows the P r ( C s m c a s t > 0 ) , as a function of γ ¯ M for selected values of the arbitrary constant, α e , and N. This figure describes the effects of α e on the P r ( C s m c a s t > 0 ) for selected values of system parameters. We see that the P r ( C s m c a s t > 0 ) decreases with α e and N.

Figure 11 shows the P r ( C s m c a s t > 0 ) , as a function of γ ¯ M for selected values of the arbitrary constant μ e and N. This figure describes the effects of μ e on the P r ( C s m c a s t > 0 ) for selected values of system parameters. We see that the P r ( C s m c a s t > 0 ) decreases with μ e .

Figure 12 shows the outage probability for multicasting, P o u t ( R s m c a s t ) , as a function of γ ¯ M for selected values of the number of eavesdropper, N. This figure describes the effects of N on the P o u t ( R s m c a s t ) for selected values of system parameters. It is observed that the P o u t ( R s m c a s t ) increases with N increases. This is because, the increases in the number of eavesdroppers increases the probability of eavesdropping and decreases the secrecy capacity which causes an improvement in the P o u t ( R s m c a s t ) .

Figure 13 shows the P o u t ( R s m c a s t ) , as a function of γ ¯ M for selected values of γ ¯ e . This figure describes the effects of γ ¯ e on the P o u t ( R s m c a s t ) for selected values of system parameters. We see that the P o u t ( R s m c a s t ) increases if the value of γ ¯ e increases. This is because, the increases in γ ¯ e increases the capacity

Figure 10. The effect of arbitrary constant, α e , on the P r ( C s m c a s t > 0 ) for selected values of N with M = 1 , α m = 3 , μ m = 0.5 , μ e = 0.5 and γ e = 2 5 dB .

Figure 11. The effect of arbitrary constant, μ e , on the P r ( C s m c a s t > 0 ) for selected values of N with M = 2 , α m = 3 , α e = 0.5 , μ m = 0.5 and γ e = 30 dB .

of eavesdropper’s channel and decreases the secrecy capacity which causes an improvement in the P o u t ( R s m c a s t ) .

Figure 12. The effect of number of eavesdropper, N, on the P o u t ( R s m c a s t ) for M = 1 , α m = 0.75 , α e = 1.2 , μ m = 1 , μ e = 0.5 , γ e = 2 5 dB and R s m c a s t = 0.5 .

Figure 13. The effect of average SNR of eavesdropper’s channel, γ e , on the P o u t ( R s m c a s t ) for M = 1 , N = 2 , α m = 0.75 , α e = 1.2 , μ m = 1 , μ e = 0.5 , R s m c a s t = 0.5 .

Figure 14 shows the P o u t ( R s m c a s t ) , as a function of γ ¯ M for selected values of the arbitrary constant α m and N. This figure describes the effects of α m

Figure 14. The effect of arbitrary constant, α m , on the P o u t ( R s m c a s t ) for selected values of N with M = 1 , α e = 1 , μ m = 1 , μ e = 0.5 , R s m c a s t = 0.5 and γ e = 2 5 dB .

on the P o u t ( R s m c a s t ) for selected values of system parameters. We see that for different selected values of N the P o u t ( R s m c a s t ) decreases if α m increases. This is because, the capacity of multicast channel increases with α m and enhances the secrecy capacity which causes a reduction in the secure outage probability.

Figure 15 shows the P o u t ( R s m c a s t ) , as a function of γ ¯ M for selected values of the arbitrary constant μ m and N. This figure describes the effects of μ m on the P o u t ( R s m c a s t ) for selected values of system parameters. We see that for different selected values of N the P o u t ( R s m c a s t ) decreases if μ m increases. This is because, the capacity of multicast channel increases with μ m and improves the secrecy capacity which causes a reduction in the secure outage probability.

Figure 16 shows the P o u t ( R s m c a s t ) , as a function of γ ¯ M for selected values of the arbitrary constant α e and N. This figure describes the effects of α e on the P o u t ( R s m c a s t ) for selected values of system parameters. We see that for different selected values of N the P o u t ( R s m c a s t ) increases with α e as one expects.

Figure 17 shows the P o u t ( R s m c a s t ) , as a function of γ ¯ M for selected values of the arbitrary constant μ e and N. This figure describes the effects of μ e on the P o u t ( R s m c a s t ) for selected values of system parameters. We see that for different selected values of N the P o u t ( R s m c a s t ) increases with μ e as one expects.

Therefore, based on the closed-form analytical expressions for the

P r ( C s m c a s t > 0 ) and the P o u t ( R s m c a s t ) , and from the observations of numerical results, the main findings of this paper can be summarized as follows: The increase in γ e , M, N, α e and μ e degrades the security of the proposed system.

Figure 15. The effect of arbitrary constant, μ m , on the P o u t ( R s m c a s t ) for selected values of N with M = 1 , α m = 1 , α e = 1 , μ e = 0.5 , R s m c a s t = 0.5 and γ e = 2 0 dB .

Figure 16. The effect of arbitrary constant, α e , on the P o u t ( R s m c a s t ) for selected values of N with M = 1 , α e = 0.75 , μ m = 1 , μ e = 0.5 , R s m c a s t = 0.5 and γ e = 2 5 dB .

Figure 17. The effect of arbitrary constant, μ e , on the P o u t ( R s m c a s t ) for selected values of N with M = 1 , α m = 0.5 , α e = 1 , μ m = 1 , R s m c a s t = 0.5 and γ e = 2 5 dB .

But the increase in α m and μ m enhances the security of the proposed system.

7. Conclusion

This paper focuses on the development of an analytical mathematical model to ensure the security in wireless multicasting through MIMO OSFBC OFDM system over α-μ fading channel. The validity of analytical expressions is verified via Monte-Carlo simulation. The developed analytical model helps to realize the insight of the effects of system parameters such as α, μ, the number of multicast users and eavesdroppers on the security in wireless multicasting over α-μ fading channel employing OSFBC OFDM system. The observations of numerical results demonstrate that the security in α-μ fading channel is significantly affected by the fading parameters α and μ, and the number of multicast users and eavesdroppers. The increase in α and μ of main channel enhances the security. But the increase in α and μ of eavesdropper channel, and the number of multicast users and eavesdroppers degrade the security. The effects of α and μ increase in the high SNR region of the main channel. Therefore, the observations of this paper pave the way for enhancing security in the α-μ fading channels compensating the effects of aforementioned parameters with opportunistic relaying technique.

Conflicts of Interest

The authors declare no conflicts of interest regarding the publication of this paper.

References

[1] Raj, U. and Bhaskar, V. (2013) Performance Analysis of Scheduling Schemes for MIMO OSFBC-OFDM System in α-μ Fading Channel Scenarios. 2013 International Conference on Communication and Signal Processing, Melmaruvathur, India, 3-5 April 2013, 144-148.
https://doi.org/10.1109/iccsp.2013.6577033
[2] Sarker, D.K., Sarkar, M.Z.I. and Anower, M.S. (2017) Secure Wireless Multicasting with Linear Equalization. Physical Communication, 25, 201-213.
https://doi.org/10.1016/j.phycom.2017.07.007
[3] Mathur, A., Ai, Y., Cheffena, M. and Kaddoum, G. (2019) Secrecy Performance of Correlated α-μ Fading Channels. IEEE Communications Letters, 23, 1323-1327.
https://doi.org/10.1109/LCOMM.2019.2920347
[4] Moualeu, J.M., da Costa, D.B., Lopez-Martinez, F.J., Hamouda, W., Ngatched, T.M. and Dias, U.S. (2019) Secrecy Analysis of a TAS/MRC Scheme in α-μ Fading Channels. 2019 IEEE Wireless Communications and Networking Conference (WCNC). Marrakesh, Morocco, 15-18 April 2019, 1-6.
https://doi.org/10.1109/WCNC.2019.8886042
[5] Moualeu, J.M., da Costa, D.B., Lopez-Martinez, F.J., Hamouda, W., Nkouatchah, T.M. and Dias, U.S. (2019) Transmit Antenna Selection in Secure MIMO Systems over α-μ Fading Channels. IEEE Transactions on Communications, 67, 6483-6498.
https://doi.org/10.1109/TCOMM.2019.2921966
[6] Hanif, A., Badrudduza, A., Hossen, M., Kundu, M. and Sarkar, M. (2019) Secure Outage Performance Analysis of Multicasting through α-μ Fading Channel. 2019 3rd International Conference on Electrical, Computer & Telecommunication Engineering (ICECTE), Rajshahi, Bangladesh, 26-28 December 2019, 65-68.
https://doi.org/10.1109/ICECTE48615.2019.9303574
[7] Yadav, S. (2020) Secrecy Performance of Cognitive Radio Sensor Networks over α-μ Fading Channels. IEEE Sensors Letters, 4, 1-4.
https://doi.org/10.1109/LSENS.2020.3014247
[8] Yuan, C., Tao, X., Ni, W., Li, N., Jamalipour, A. and Liu, R.P. (2020) Joint Power Allocation and Beamforming for Overlaid Secrecy Transmissions in MIMO-OFDM Channels. IEEE Transactions on Vehicular Technology, 69, 10019-10032.
https://doi.org/10.1109/TVT.2020.3004889
[9] Yadav, S. and Gurjar, D.S. (2021) Secrecy Performance of SIMO Underlay Cognitive Radio Networks over α-μ Fading Channels. IEEE Access, 9, 62616-62629.
https://doi.org/10.1109/ACCESS.2021.3074507
[10] Kong, L., Kaddoum, G. and da Costa, D.B. (2018) Cascaded α-μ Fading Channels: Reliability and Security Analysis. IEEE Access, 6, 41978-41992.
https://doi.org/10.1109/ACCESS.2018.2833423
[11] Kong, L., Kaddoum, G. and Rezki, Z. (2018) Highly Accurate and Asymptotic Analysis on the SOP over SIMO α-μ Fading Channels. IEEE Communications Letters, 22, 2088-2091.
https://doi.org/10.1109/LCOMM.2018.2861877

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.