Security in Emerging Wireless Communication and Networking Systems. First International ICST Workshop, SEWCN 2009, Athens, Greece, September 14, 2009, Revised Selected Papers

Research Article

A Closed-Form Expression for Outage Secrecy Capacity in Wireless Information-Theoretic Security

Download
353 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-11526-4_1,
        author={Theofilos Chrysikos and Tasos Dagiuklas and Stavros Kotsopoulos},
        title={A Closed-Form Expression for Outage Secrecy Capacity in Wireless Information-Theoretic Security},
        proceedings={Security in Emerging Wireless Communication and Networking Systems. First International ICST Workshop, SEWCN 2009, Athens, Greece, September 14, 2009, Revised Selected Papers},
        proceedings_a={SEWCN},
        year={2012},
        month={5},
        keywords={Wireless Information-Theoretic Security quasi-static Rayleigh fading Outage Secrecy Capacity Taylor approximation path loss exponent},
        doi={10.1007/978-3-642-11526-4_1}
    }
    
  • Theofilos Chrysikos
    Tasos Dagiuklas
    Stavros Kotsopoulos
    Year: 2012
    A Closed-Form Expression for Outage Secrecy Capacity in Wireless Information-Theoretic Security
    SEWCN
    Springer
    DOI: 10.1007/978-3-642-11526-4_1
Theofilos Chrysikos1,*, Tasos Dagiuklas1,*, Stavros Kotsopoulos1,*
  • 1: University of Patras
*Contact email: txrysiko@ece.upatras.gr, ntan@ece.upatras.gr, kotsop@ece.upatras.gr

Abstract

This paper provides a closed-form expression for Outage Secrecy Capacity in Wireless Information-Theoretic Security. This is accomplished on the basis of an approximation of the exponential function via a first-order Taylor series. The error of this method is calculated for two different channel cases, and the resulting precision confirms the correctness of this approach. Thus, the Outage Secrecy Capacity can be calculated for a given Outage Probability and for a given propagation environment (path loss exponent, average main channel SNR), allowing us to estimate with increased precision the boundaries of secure communications.