Skip to main content

On Secrecy Performance of Multibeam Satellite System with Multiple Eavesdropped Users

  • Conference paper
  • First Online:
Mobile Ad-hoc and Sensor Networks (MSN 2017)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 747))

Included in the following conference series:

Abstract

Satellite communication system is expected to play an important role in wireless networks because of its appealing contributions to ubiquitous coverage, content multicast and caching, reducing user expenditure, and so on. However, due to the inherent broadcasting nature and serious channel conditions, satellite communication system is highly vulnerable to eavesdropping attacks. As an initial step towards this end, this paper focuses on the physical layer security technique and explores the secrecy performance of a multibeam satellite system, where multiple legitimate users are served and each user is exposed to an eavesdropper located in the same beam. With perfect channel state information at the satellite and adopting the complete zero-forcing approach for signal processing, we first derive the optimal beamforming vectors to maximize the achievable secrecy rate. Based on this, we further calculate the secrecy outage probabilities of an individual user and the whole system, respectively. Finally, simulation and numerical results are provided to show the secrecy performance of the multibeam satellite system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Arapoglou, P.D., Liolis, K., Bertinelli, M., Panagopoulos, A., Cottis, P., De Gaudenzi, R.: MIMO over satellite: a review. IEEE Commun. Surv. Tutor. 13(1), 27–51 (2011)

    Article  Google Scholar 

  2. Zheng, G., Arapoglou, P.D., Ottersten, B.: Physical layer security in multibeam satellite systems. IEEE Trans. Wirel. Commun. 11(2), 852–863 (2012)

    Article  Google Scholar 

  3. Hong, Y.W.P., Lan, P.C., Kuo, C.C.J.: Enhancing physical-layer secrecy in multiantenna wireless systems: an overview of signal processing approaches. IEEE Signal Process. Mag. 30(5), 29–40 (2013)

    Article  Google Scholar 

  4. Schneier, B.: Cryptographic design vulnerabilities. Computer 31(9), 29–33 (1998)

    Article  Google Scholar 

  5. Shannon, C.E.: Communication theory of secrecy systems. Bell Labs Tech. J. 28(4), 656–715 (1949)

    Article  MathSciNet  MATH  Google Scholar 

  6. Wyner, A.D.: The wiretap channel. Bell Labs Tech. J. 54(8), 1355–1387 (1975)

    Article  MATH  Google Scholar 

  7. Csiszár, I., Korner, J.: Broadcast channels with confidential messages. IEEE Trans. Inf. Theor. 24(3), 339–348 (1978)

    Article  MathSciNet  MATH  Google Scholar 

  8. Zou, Y., Zhu, J., Wang, X., Leung, V.C.: Improving physical-layer security in wireless communications using diversity techniques. IEEE Netw. 29(1), 42–48 (2015)

    Article  Google Scholar 

  9. Foschini, G.J., Gans, M.J.: On limits of wireless communications in a fading environment when using multiple antennas. Wirel. Pers. Commun. 6(3), 311–335 (1998)

    Article  Google Scholar 

  10. Barros, J., Rodrigues, M.R.: Secrecy capacity of wireless channels. In: 2006 IEEE International Symposium on Information Theory, pp. 356–360. IEEE (2006)

    Google Scholar 

  11. Koyluoglu, O.O., Koksal, C.E., El Gamal, H.: On secrecy capacity scaling in wireless networks. IEEE Trans. Inf. Theor. 58(5), 3000–3015 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  12. Romero-Zurita, N., Ghogho, M., McLernon, D.: Outage probability based power distribution between data and artificial noise for physical layer security. IEEE Signal Process. Lett. 19(2), 71–74 (2012)

    Article  Google Scholar 

  13. Zou, Y., Zhu, J., Wang, G., Shao, H.: Secrecy outage probability analysis of multi-user multi-eavesdropper wireless systems. In: IEEE/CIC International Conference on Communications in China (ICCC), pp. 309–313. IEEE (2014)

    Google Scholar 

  14. An, K., Lin, M., Liang, T., Ouyang, J., Chen, H.: Average secrecy capacity of land mobile satellite wiretap channels. In: 8th International Conference on Wireless Communications & Signal Processing (WCSP), pp. 1–5. IEEE (2016)

    Google Scholar 

  15. An, K., Lin, M., Liang, T., Ouyang, J., Yuan, C., Lu, W.: Secrecy performance analysis of land mobile satellite communication systems over Shadowed-Rician fading channels. In: 25th Wireless and Optical Communication Conference (WOCC), pp. 1–4. IEEE (2016)

    Google Scholar 

  16. Yan, Y., Zhang, B., Guo, D., Li, S., Niu, H., Wang, X.: Joint beamforming and jamming design for secure cooperative hybrid satellite-terrestrial relay network. In: 25th Wireless and Optical Communication Conference (WOCC), pp. 1–5. IEEE (2016)

    Google Scholar 

  17. An, K., Lin, M., Liang, T., Ouyang, J., Yuan, C., Li, Y.: Secure transmission in multi-antenna hybrid satellite-terrestrial relay networks in the presence of eavesdropper. In: International Conference on Wireless Communications & Signal Processing (WCSP), pp. 1–5. IEEE (2015)

    Google Scholar 

  18. Lei, J., Han, Z., Vazquez-Castro, M.Á., Hjorungnes, A.: Secure satellite communication systems design with individual secrecy rate constraints. IEEE Trans. Inf. Forensics Secur. 6(3), 661–671 (2011)

    Article  Google Scholar 

  19. Yuan, C., Lin, M., Ouyang, J., Bu, Y.: Joint security beamforming in cognitive hybrid satellite-terrestrial networks. In: IEEE 83rd Vehicular Technology Conference (VTC Spring), pp. 1–5. IEEE (2016)

    Google Scholar 

  20. Friedlander, B., Porat, B.: Performance analysis of a null-steering algorithm based on direction-of-arrival estimation. IEEE Trans. Acoust. Speech Signal Process. 37(4), 461–466 (1989)

    Article  Google Scholar 

  21. Series, P.: Propagation data and prediction methods required for the design of earth-space telecommunication systems. Recommendation ITU-R, 618-12 (2015)

    Google Scholar 

  22. Zheng, G., Chatzinotas, S., Ottersten, B.: Generic optimization of linear precoding in multibeam satellite systems. IEEE Trans. Wirel. Commun. 11(6), 2308–2320 (2012)

    Article  Google Scholar 

  23. Díaz, M.A., Courville, N., Mosquera, C., Liva, G., Corazza, G.E.: Non-linear interference mitigation for broadband multimedia satellite systems. In: International Workshop on Satellite and Space Communications ( IWSSC 2007), pp. 61–65. IEEE (2007)

    Google Scholar 

  24. Liang, Y., Kramer, G., Poor, H.V., Shamai, S.: Compound wiretap channels. EURASIP J. Wirel. Commun. Netw. 2009, 5 (2009)

    Article  Google Scholar 

  25. Dong, L., Han, Z., Petropulu, A.P., Poor, H.V.: Improving wireless physical layer security via cooperating relays. IEEE Trans. Signal Process. 58(3), 1875–1888 (2010)

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgments

This work was supported in part by the Natural Science Foundation of China (NSFC) under Grant U1536202, Grant 61373173, and Grant 61571352; in part by the Project of Cyber Security Establishment with Inter-University Cooperation; and in part by the Secom Science and Technology Foundation.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yulong Shen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Xiao, Y., Liu, J., Quan, J., Shen, Y., Jiang, X. (2018). On Secrecy Performance of Multibeam Satellite System with Multiple Eavesdropped Users. In: Zhu, L., Zhong, S. (eds) Mobile Ad-hoc and Sensor Networks. MSN 2017. Communications in Computer and Information Science, vol 747. Springer, Singapore. https://doi.org/10.1007/978-981-10-8890-2_30

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-8890-2_30

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-8889-6

  • Online ISBN: 978-981-10-8890-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics