Papers
Topics
Authors
Recent
Search
2000 character limit reached

On the Information Leakage Performance of Secure Finite Blocklength Transmissions over Rayleigh Fading Channels

Published 20 Jan 2024 in cs.IT and math.IT | (2401.11219v1)

Abstract: This paper presents a secrecy performance study of a wiretap communication system with finite blocklength (FBL) transmissions over Rayleigh fading channels, based on the definition of an average information leakage (AIL) metric. We evaluate the exact and closed-form approximate AIL performance, assuming that only statistical channel state information (CSI) of the eavesdropping link is available. Then, we reveal an inherent statistical relationship between the AIL metric in the FBL regime and the commonly-used secrecy outage probability in conventional infinite blocklength communications. Aiming to improve the secure communication performance of the considered system, we formulate a blocklength optimization problem and solve it via a low-complexity approach. Next, we present numerical results to verify our analytical findings and provide various important insights into the impacts of system parameters on the AIL. Specifically, our results indicate that i) compromising a small amount of AIL can lead to significant reliability improvements, and ii) the AIL experiences a secrecy floor in the high signal-to-noise ratio regime.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (18)
  1. M. Tatar Mamaghani, X. Zhou, N. Yang, A. L. Swindlehurst, and H. V. Poor, “Performance analysis of finite blocklength transmissions over wiretap fading channels: An average information leakage perspective,” Aug. 2023. [Online]. Available: https://arxiv.org/abs/2308.13184
  2. Y. Wu, A. Khisti, C. Xiao, G. Caire, K.-K. Wong, and X. Gao, “A survey of physical layer security techniques for 5G wireless networks and challenges ahead,” IEEE J. Sel. Areas Commun., vol. 36, no. 4, pp. 679–695, Apr. 2018.
  3. H. V. Poor and R. F. Schaefer, “Wireless physical layer security,” Proc. Natl. Acad. Sci. USA, vol. 114, no. 1, pp. 19–26, 2017.
  4. A. D. Wyner, “The wire‐tap channel,” Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355–1387, Oct. 1975.
  5. I. F. Akyildiz, A. Kak, and S. Nie, “6G and beyond: The future of wireless communications systems,” IEEE Access, vol. 8, pp. 133 995–134 030, 2020.
  6. C. Bockelmann et al., “Massive machine-type communications in 5G: Physical and MAC-layer solutions,” IEEE Commun. Mag., vol. 54, no. 9, pp. 59–65, Sept. 2016.
  7. Y. Polyanskiy, H. V. Poor, and S. Verdú, “Channel coding rate in the finite blocklength regime,” IEEE Trans. Inf. Theory, vol. 56, no. 5, pp. 2307–2359, May 2010.
  8. P. Mary, J.-M. Gorce, A. Unsal, and H. V. Poor, “Finite blocklength information theory: What is the practical impact on wireless communications?” in Proc. IEEE Global Commun. Conf., Washington, DC, USA, 12 2016, pp. 1–6.
  9. H. M. Wang, Q. Yang, Z. Ding, and H. V. Poor, “Secure short-packet communications for mission-critical IoT applications,” IEEE Trans. Wirel. Commun., vol. 18, no. 5, pp. 2565–2578, May 2019.
  10. Y. Chen, Z. Xiang, X. Qiao, T. Zhang, and J. Zhang, “Secure short-packet communications in cognitive Internet of Things,” in Proc. IEEE 3rd Int. Conf. Electron. Commun. Eng., Xi’An, China, 2020, pp. 31–36.
  11. M. Tatar Mamaghani, X. Zhou, N. Yang, and A. L. Swindlehurst, “Secure short-packet communications via UAV-enabled mobile relaying: Joint resource optimization and 3D trajectory design,” IEEE Trans. Wirel. Commun. (early access), Dec. 2023.
  12. C. Feng, H. M. Wang, and H. V. Poor, “Reliable and secure short-packet communications,” IEEE Trans. Wirel. Commun., vol. 21, no. 3, pp. 1913–1926, Mar. 2022.
  13. T.-X. Zheng, H.-M. Wang, D. W. K. Ng, and J. Yuan, “Physical-layer security in the finite blocklength regime over fading channels,” IEEE Trans. Wirel. Commun., vol. 19, no. 5, pp. 3405–3420, May 2020.
  14. M. Oh, J. Park, and J. Choi, “Joint optimization for secure and reliable communications in finite blocklength regime,” IEEE Trans. Wirel. Commun., vol. 22, no. 12, pp. 9457–9472, Dec. 2023.
  15. W. Yang, R. F. Schaefer, and H. V. Poor, “Wiretap channels: Nonasymptotic fundamental limits,” IEEE Trans. Inf. Theory, vol. 65, no. 7, pp. 4069–4093, July 2019.
  16. A. Azevedo-Filho and R. D. Shachter, “Laplace’s method approximations for probabilistic inference in belief networks with continuous variables,” in Proc. Tenth Conf. Uncertainty Artif. Intell., San Francisco, CA, USA, 1994, pp. 28–36.
  17. X. Zhou, M. R. McKay, B. Maham, and A. Hjørungnes, “Rethinking the secrecy outage formulation: A secure transmission design perspective,” IEEE Commun. Lett., vol. 15, no. 3, pp. 302–304, Mar. 2011.
  18. The MathWorks Inc., “Optimization toolbox version: 9.4 (r2022b),” Natick, Massachusetts, USA, 2022.
Citations (1)

Summary

Paper to Video (Beta)

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Collections

Sign up for free to add this paper to one or more collections.

Tweets

Sign up for free to view the 1 tweet with 0 likes about this paper.