Secrecy Analysis of Distributed CDD-Based Cooperative Systems With Deliberate Interference

Kyeong Jin Kim, Hongwu Liu, Marco Di Renzo, Philip V. Orlik, H. Vincent Poor

Research output: Contribution to journalArticlepeer-review

9 Scopus citations


In this paper, a cooperative cyclic-prefixed single carrier (CP-SC) system is studied and a scheme to improve its physical layer security is proposed. In particular, a distributed cyclic delay diversity (dCDD) scheme is employed and a deliberate interfering method is introduced, which degrades the signal-to-interference-plus-noise ratio (SINR) over the channels from a group of remote radio heads (RRHs) to an eavesdropper, while minimizing the signal-to-noise ratio loss over the channels from the RRHs to an intended user. This is obtained by selecting one RRH that acts as an interfering RRH and transmits an interfering artificial noise sequence to the eavesdropper. Through the use of the dCDD scheme, a channel that minimizes the receive SINR at the eavesdropper is selected for the interfering RRH. This choice enhances the secrecy rate of the CP-SC system. The system performance is evaluated by considering the secrecy outage probability and the probability of non-zero achievable secrecy rate, which are formulated in closed-form analytical expressions for the case of identically and non-identically distributed frequency selective fading channels. Based on the proposed analytical framework, the diversity order of the system is studied. Monte Carlo simulations are employed to verify the analytical derivations for numerous system scenarios.

Original languageEnglish (US)
Article number8472925
Pages (from-to)7865-7878
Number of pages14
JournalIEEE Transactions on Wireless Communications
Issue number12
StatePublished - Dec 2018
Externally publishedYes

All Science Journal Classification (ASJC) codes

  • Computer Science Applications
  • Electrical and Electronic Engineering
  • Applied Mathematics


  • Distributed single carrier systems
  • distributed cyclic delay diversity
  • physical layer security
  • probability of non-zero achievable secrecy rate
  • secrecy outage probability


Dive into the research topics of 'Secrecy Analysis of Distributed CDD-Based Cooperative Systems With Deliberate Interference'. Together they form a unique fingerprint.

Cite this