Outage performance of secure multicasting in the presence of multiple eavesdroppers

Jinxiao Zhu, Yin Chen, Yoshitaka Nakamura, Xiaohong Jiang, Osamu Takahashi, Norio Shiratori

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

Recently, there has been a growing interest in applying multiple antennas to achieve information-theoretic security in wireless communication networks. In this paper, we consider the transmission of common confidential data from a single-antenna transmitter to multiple multi-antenna receivers in the presence of multiple multi-antenna eavesdroppers. Both the receivers and eavesdroppers employ maximal-ratio combining (MRC) to combine the signals received at multiple antennas. For the considered system, we derive its connection outage probability and secrecy outage probability to characterize the reliability level and the security level, respectively. Numerical results are also provided to analyze the tradeoff among the reliability and security performances and the number of antennas (or nodes) of either receivers or eavesdroppers.

Original languageEnglish
Title of host publication2015 8th International Conference on Mobile Computing and Ubiquitous Networking, ICMU 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages138-142
Number of pages5
ISBN (Print)9784907626129
DOIs
Publication statusPublished - 2015 Mar 13
Event2015 8th International Conference on Mobile Computing and Ubiquitous Networking, ICMU 2015 - Hakodate, Japan
Duration: 2015 Jan 202015 Jan 22

Other

Other2015 8th International Conference on Mobile Computing and Ubiquitous Networking, ICMU 2015
CountryJapan
CityHakodate
Period15/1/2015/1/22

    Fingerprint

Keywords

  • multicast
  • multiple antennas
  • Physical layer security
  • secrecy outage probability

ASJC Scopus subject areas

  • Computer Networks and Communications

Cite this

Zhu, J., Chen, Y., Nakamura, Y., Jiang, X., Takahashi, O., & Shiratori, N. (2015). Outage performance of secure multicasting in the presence of multiple eavesdroppers. In 2015 8th International Conference on Mobile Computing and Ubiquitous Networking, ICMU 2015 (pp. 138-142). [7061056] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ICMU.2015.7061056