scholarly journals Impact of Mobility on Physical Layer Security Over Wireless Fading Channels

2018 ◽  
Vol 17 (12) ◽  
pp. 7849-7864 ◽  
Author(s):  
Jie Tang ◽  
Monireh Dabaghchian ◽  
Kai Zeng ◽  
Hong Wen
2016 ◽  
Vol 65 (3) ◽  
pp. 1326-1339 ◽  
Author(s):  
Gaofeng Pan ◽  
Chaoqing Tang ◽  
Xv Zhang ◽  
Tingting Li ◽  
Ying Weng ◽  
...  

2016 ◽  
Vol 20 (2) ◽  
pp. 408-411 ◽  
Author(s):  
Hongjiang Lei ◽  
Huan Zhang ◽  
Imran Shafique Ansari ◽  
Chao Gao ◽  
Yongcai Guo ◽  
...  

Entropy ◽  
2019 ◽  
Vol 21 (10) ◽  
pp. 998 ◽  
Author(s):  
Sheng-Hong Lin ◽  
Rong-Rong Lu ◽  
Xian-Tao Fu ◽  
An-Ling Tong ◽  
Jin-Yuan Wang

In this paper, the physical layer security over the M-distributed fading channel is investigated. Initially, an exact expression of secrecy outage probability (SOP) is derived, which has an integral term. To get a closed-form expression, a lower bound of SOP is obtained. After that, the exact expression for the probability of strictly positive secrecy capacity (SPSC) is derived, which is in closed-form. Finally, an exact expression of ergodic secrecy capacity (ESC) is derived, which has two integral terms. To reduce its computational complexity, a closed-from expression for the lower bound of ESC is obtained. As special cases of M-distributed fading channels, the secure performance of the K, exponential, and Gamma-Gamma fading channels are also derived, respectively. Numerical results show that all theoretical results match well with Monte-Carlo simulation results. Specifically, when the average signal-to-noise ratio of main channel is larger than 40 dB, the relative errors for the lower bound of SOP, the probability of SPSC, and the lower bound of ESC are less than 1.936%, 6.753%, and 1.845%, respectively. This indicates that the derived theoretical expressions can be directly used to evaluate system performance without time-consuming simulations. Moreover, the derived results regarding parameters that influence the secrecy performance will enable system designers to quickly determine the optimal available parameter choices when facing different security risks.


Sign in / Sign up

Export Citation Format

Share Document