135 research outputs found
PHYSICAL LAYER SECURITY OF WIRELESS SENSOR NETWORK BASED ON OPPORTUNISTIC SCHEDULING
In this paper, a physical layer security analysis of wireless sensor network in the presence of an attacker, employing opportunistic scheduling approach, is presented. The intended as well as unintended transmission paths experience the Weibull fading. A novel analytical expression for the intercept probability is derived. In order to emphasize the advantages of the opportunistic scheduling approach, a comparative analysis with round-robin and optimal scheduling schemes is also given. The impact of a number of active sensors and the impact of fading channel conditions over main and wiretap channels on the intercept probabilities is obtained. The accuracy of theoretical results is confirmed by independent Monte Carlo simulation results
Secrecy Performance Analysis of Mixed α - μ and Exponentiated Weibull RF-FSO Cooperative Relaying System
Funding Information: This work was supported in part by the National Research Foundation of Korea—Grant funded by the Korean Government under Grant Ministry of Science and ICT-NRF-2020R1A2B5B02002478, and in part by Sejong University through its Faculty Research Program under Grant 20212023.Peer reviewedPublisher PD
Vehicle Communication using Secrecy Capacity
We address secure vehicle communication using secrecy capacity. In
particular, we research the relationship between secrecy capacity and various
types of parameters that determine secrecy capacity in the vehicular wireless
network. For example, we examine the relationship between vehicle speed and
secrecy capacity, the relationship between the response time and secrecy
capacity of an autonomous vehicle, and the relationship between transmission
power and secrecy capacity. In particular, the autonomous vehicle has set the
system modeling on the assumption that the speed of the vehicle is related to
the safety distance. We propose new vehicle communication to maintain a certain
level of secrecy capacity according to various parameters. As a result, we can
expect safer communication security of autonomous vehicles in 5G
communications.Comment: 17 Pages, 12 Figure
On secrecy performance of mixed generalized Gamma and Málaga RF-FSO variable gain relaying channel
The emergence of an array of new wireless networks has led researchers to evaluate the prospect of utilizing the physical properties of the wireless medium in order to design secure systems. In this paper, the physical layer secrecy performance of a mixed radio frequency-free space optical (RF-FSO) system with variable gain relaying scheme is investigated in the presence of an eavesdropper. We assume that the eavesdropper can wiretap the transmitted confidential data from the RF link only. It is further assumed that the main and eavesdropper RF links are modeled as generalized Gamma (GG) fading channel, and the free space optical (FSO) link experiences Málaga turbulence with pointing error impairment. Our primary concern is to protect this confidential information from being wiretapped. Besides pointing error, the atmospheric turbulence and two types of detection techniques (i.e. heterodyne detection and intensity modulation with direct detection) are also taken into consideration. Utilizing amplify-and-forward (AF) scheme, the novel mathematical closed-form expressions for average secrecy capacity, lower bound of secrecy outage probability, and strictly positive secrecy capacity are derived. As both the links (RF and FSO) undergo generalized fading channels, the derived expressions are also general. We present a unification of some existing works utilizing the proposed model to better clarify the novelty of this work. Finally, all the derived expressions are justified via Monte-Carlo simulations
- …