Secrecy capacity over correlated log-normal fading channel

Md Zahurul I Sarkar*, Tharmalingam Ratnarajah

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

This paper is concerned with the study of secrecy capacity for the log-normal fading channel in which the main channel is correlated with the eavesdropper channel. Perfect secrecy is achieved when the transmitter and legitimate receiver can communicate at some positive rate, while insuring that the eavesdropper gets zero bits of information. We consider the full channel state information (CSI) case, where the transmitter has access to both the main channel and eavesdropper channel gains. Under this assumption, we define the secrecy capacity of single-input single-output (SISO) log-normal fading channel and find the optimal power allocation at the transmitter that achieves the secrecy capacity. By analyzing the resulting secrecy capacity, we quantify the loss of secrecy capacity due to the correlation. We also find the closed-form analytical expression for the upper bound of secrecy capacity in terms of correlation coefficient which includes the independent case as a special one. The analysis of upper bound tells how the correlation coefficient and the ratio of main and eavesdropper channel gains affect the secrecy capacity.

Original languageEnglish
Title of host publicationIEEE International Conference on Communications
Pages883-887
Number of pages5
DOIs
Publication statusPublished - 1 Dec 2012
Event2012 IEEE International Conference on Communications, ICC 2012 - Ottawa, ON, United Kingdom
Duration: 10 Jun 201215 Jun 2012

Conference

Conference2012 IEEE International Conference on Communications, ICC 2012
CountryUnited Kingdom
CityOttawa, ON
Period10/06/1215/06/12

Keywords

  • correlated log-normal fading channel
  • Correlation co-efficient
  • secrecy capacity

Fingerprint Dive into the research topics of 'Secrecy capacity over correlated log-normal fading channel'. Together they form a unique fingerprint.

Cite this