intercept probability
Recently Published Documents


TOTAL DOCUMENTS

56
(FIVE YEARS 33)

H-INDEX

4
(FIVE YEARS 3)

Author(s):  
Bui Vu Minh ◽  
Van-Duc Phan

<p>Performance analysis of power beacon-assisted D2D communication networks in the presence of eavesdropper and co-channel interference is presented is investigated. The outage probability and the intercept probability of the proposed system are analyzed and derived. The impact of the main system parameters on the system performance is investigated. The Monte Carlo simulation is used for verifying the correctness of the analytical section.</p>


2021 ◽  
Vol 13 (8) ◽  
pp. 205
Author(s):  
Deemah Tashman ◽  
Walaa Hamouda

In this paper, the physical-layer security for a three-node wiretap system model is studied. Under the threat of multiple eavesdroppers, it is presumed that a transmitter is communicating with a legitimate receiver. The channels are assumed to be following cascaded κ-μ fading distributions. In addition, two scenarios for eavesdroppers’ interception and information-processing capabilities are investigated: colluding and non-colluding eavesdroppers. The positions of these eavesdroppers are assumed to be random in the non-colluding eavesdropping scenario, based on a homogeneous Poisson point process (HPPP). The security is examined in terms of the secrecy outage probability, the probability of non-zero secrecy capacity, and the intercept probability. The exact and asymptotic expressions for the secrecy outage probability and the probability of non-zero secrecy capacity are derived. The results demonstrate the effect of the cascade level on security. Additionally, the results indicate that as the number of eavesdroppers rises, the privacy of signals exchanged between legitimate ends deteriorates. Furthermore, in this paper, regarding the capabilities of tapping and processing the information, we provide a comparison between colluding and non-colluding eavesdropping.


2021 ◽  
Vol 2021 ◽  
pp. 1-9
Author(s):  
Phu Tran Tin ◽  
Van-Duc Phan ◽  
Dong Si Thien Chau ◽  
Tan N. Nguyen ◽  
Phu X. Nguyen

This paper investigates the decode-and-forward (DF) full-duplex (FD) relaying system under the presence of an eavesdropper. Moreover, the relay node is able to harvest energy from a transmitter, and then it uses the harvested energy for conveying information to the receiver. Besides, both two-hop and direct relaying links are taking into consideration. In the mathematical analysis, we derived the exact expressions for intercept probability and outage probability (OP) by applying maximal ratio combining (MRC) and selection combining (SC) techniques at the receiver. Next, the Monte Carlo simulation is performed to validate the mathematical analysis. The results show that the simulation curves match the mathematic expressions, which confirms the analysis section.


Electronics ◽  
2021 ◽  
Vol 10 (12) ◽  
pp. 1368
Author(s):  
Srđan Maričić ◽  
Nenad Milošević ◽  
Dejan Drajić ◽  
Dejan Milić ◽  
Jelena Anastasov

In this paper, we analyze the physical layer security (PLS) of an arbitrarily dimensioned wireless sensor network (WSN) in the presence of an unauthorized attacker. Various scheduling schemes have been exploited in order to enhance the secure transmission of reliable links impaired by Fisher–Snedecor F fading. The path loss among active nodes is also considered. The exact intercept probability expressions are derived recalling an optimal scheduling scheme (OS), a scheduling policy based on a specific cumulative distribution function (CS), and round-robin scheduling as a baseline. The asymptotic behavior of the intercept metric is also presented in a simpler form with acceptable accuracy. The secrecy diversity orders are defined and the security–reliability tradeoff of WSN is specified. Numerical results are provided to demonstrate the interplay of various main/wiretap channel conditions, the distances among nodes, the number of active sensors, and the average main-to-eavesdropper’s signal ratio in order to upgrade the quality of the WSN secrecy performance. Additionally, the impact of the outage probability on the intercept probability is defined for a variety of scenarios under which either the CS or OS scheme could be selected as suitable for PLS enhancement. The obtained results are verified by independent Monte Carlo simulations.


2021 ◽  
Vol 0 (0) ◽  
Author(s):  
Anshul Vats ◽  
Mona Aggarwal ◽  
Swaran Ahuja

Abstract In this paper, we investigate the secrecy performance of a dual-hop hybrid radio frequency–visible light communication (RF–VLC) system in which we consider a single source antenna (S) transmitting data signals via RF channel through decode and forward (DF) relay (R) toward an authorized receiving antenna (D) at the destination via VLC channel. In this system, we assume that the eavesdropper (E) attempts to eavesdrop the RF channel (S,R) during transmission of the signal. The relay decodes the incoming RF signal into corresponding optical signal and retransmits toward destination via VLC channel (R,D). The RF and VLC channels of the hybrid system are modelled using generalized-K fading distribution and generalized Lambertian radiant intensity distribution respectively. Also the receiver is assumed to be mobile and its mobility is defined by random waypoint (RWP) model. The channels statistics are used to derive the exact analytical expressions for average secrecy capacity and intercept probability in terms of Meijer’s G-function. The derived closed form analytical expressions are the efficient tool to illustrate the impact of variation in different channel parameters on the secrecy performance, namely, shadowing parameters of RF channel, field of view (FOV), semiangle, and the order of Lambertian emission of the VLC channel. Further, numerical analysis is carried out to support the mathematical analysis of the RF–VLC hybrid system.


2021 ◽  
Vol 2021 ◽  
pp. 1-16
Author(s):  
Xiao Jiang ◽  
Peng Li ◽  
Bin Li ◽  
Yulong Zou ◽  
Ruchuan Wang

In this paper, we investigate the physical-layer security in an energy-harvesting (EH) multiuser network with the help of a friendly jammer (J), where multiple eavesdroppers are considered to tap the information transmission from users (Us) to base station (BS). In this system, a power beacon (PB) transmits radio frequency (RF) signals to Us for charging. In order to enhance the security of wireless transmission, we propose non-energy-aware multiuser scheduling (NEAMUS) scheme and energy-aware multiuser scheduling (EAMUS) scheme. For the purpose of comparison, we introduce conventional round robin multiuser scheduling (CRRMUS) scheme. The closed-form outage probability (OP) and intercept probability (IP) expressions of NEAMUS, EAMUS, and CRRMUS schemes are derived over Rayleigh fading channels. Additionally, we analyze the security-reliability tradeoff (SRT) of NEAMUS, EAMUS, and CRRMUS schemes in terms of OP and IP. Numerical results show that the proposed EAMUS scheme is superior to the CRRMUS scheme and NEAMUS scheme in terms of SRT, demonstrating the advantage of the proposed EAMUS scheme in improving the physical-layer security and reliability. Moreover, SRT performance of NEAMUS and EAMUS schemes can also be improved by increasing the number of users.


2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Khuong Ho-Van ◽  
Thiem Do-Dac

In an UAV- (unmanned aerial vehicle-) aided relaying system, the transmitted signal is exposed to free space in two transmission hops which may be overheard by eavesdroppers. Accordingly, physical layer security should be exploited to improve information security. This paper analyzes both (security and reliability) performance aspects of such a system where only one UAV among multiple UAVs, all capable of harvesting energy from radio frequency signals, is adopted. Towards this end, the tight approximated and exact closed-form expressions of the outage probability at the legitimate destination and the intercept probability at the eavesdropper are first derived. Then, Monte-Carlo simulations are conducted to verify the derived expressions. Based on these expressions, the protected zone of the selected UAV is also proposed through an exhaustive search. Finally, various results are provided to illustrate the impact of key operation parameters on the system performance and the efficacy of the UAV selection.


Sign in / Sign up

Export Citation Format

Share Document