Specifically, we derive the secrecy outage probability (SOP), intercept probability, probability of non-zero secrecy capacity, and ergodic secrecy capacity (ESC) expressions over Nakagami-mfading channels. We f
The authors in [60] provide the theoretical meaning as well as the analytical expressions to quantify theCS(e.g., perfect secrecy, weak secrecy, and strong secrecy) when theCSis greater than zero. In [84], the authors carried out a complete analysis of how to pose the problem of optimiz...
of ECEIndian Institute of ScienceBangalore, IndiaEmail: vinod@ece.iisc.ernet.inAbstract—We consider secrecy obtained when one transmitson a Gaussian Wiretap channel above the secrecy capacity.Instead of equivocation, we consider probability of error as thecriter... ...
Through this correspondence, we present a theoretical framework for assessing the functionality of communication systems when operating over the family of κ-μ shadowed fading impacted by additive Laplacian noise. In this context, we have addressed the κ-μ shadowed Type-I, κ-μ shadowed Type-II...
This paper investigates the secrecy outage performance of a downlink cooperative nonorthogonal multiple access- (NOMA-) assisted hybrid satellite-terrestrial network, where a satellite source communicates with two terrestrial users based on NOMA, in the presence of a terrestrial eavesdropper. We assume th...
However, under perfect secrecy constraint the eavesdropper may not be motivated to feedback any correct CSI. In this paper we consider a more feasible problem for the transmitter to have eavesdropper's CSI. That is, the fast fading multiple-antenna Gaussian broadcast channels (FMGBC-CM) with ...
of the system. By orchestrating the optimization of UAV deployment or flight trajectories alongside wireless communication resources, the channel capacity of UAV-to-ground communication can be amplified, thereby fortifying the secrecy capacity. Moreover, Gao et al. [41] delved into a UAV-to-ground...
capacity and reliability [2]. Combining mm-wave and MIMO communications has the potential to greatly increase data speeds. An RF chain connects each antenna in a MIMO system. As a result, the cost and complexity of hardware rise [3]. To meet modern data requirements, the mmW frequency band...
To exploit the performance, secrecy outage probability (SOP), SPSC and average secrecy capacity (ASC) are derived. Similarly, focusing on the RF channel condition, researchers’ investigated the PLS by considering different fading distributions such as: Rayleigh [8], Rician [9] generalized-K [10...
In Wireless Sensor Network (i.e. WSN) based resource constrained Internet of Things (i.e. IoT) environments, efficient data forwarding is achieved through cluster based mechanisms, where cluster heads facilitate communication among themselves and with the sink node. Data collected by each cluster he...