ﻻ يوجد ملخص باللغة العربية
Physical layer security is investigated over mixture Gamma (MG) distributed fading channels with discrete inputs. By the Gaussian quadrature rules, closed-form expressions are derived to characterize the average secrecy rate (ASR) and secrecy outage probability (SOP), whose accuracy is validated by numerical simulations. To show more properties of the finite-alphabet signaling, we perform an asymptotic analysis on the secrecy metrics in the large limit of the average signal-to-noise ratio (SNR) of the main channel. Leveraging the Mellin transform, we find that the ASR and SOP converge to some constants as the average SNR increases and we derive novel expressions to characterize the rates of convergence. This work establishes a unified and general analytical framework for the secrecy performance achieved by discrete inputs.
In this work, we propose a new physical layer security framework for optical space networks. More precisely, we consider two practical eavesdropping scenarios: free-space optical (FSO) eavesdropping in the space and FSO eavesdropping in the air. In t
We study the problem of securely communicating a sequence of information bits with a client in the presence of multiple adversaries at unknown locations in the environment. We assume that the client and the adversaries are located in the far-field re
The present paper is devoted to the evaluation of energy detection based spectrum sensing over different multipath fading and shadowing conditions. This is realized by means of a unified and versatile approach that is based on the particularly flexib
The integration of unmanned aerial vehicles (UAVs) into the terrestrial cellular networks is envisioned as one key technology for next-generation wireless communications. In this work, we consider the physical layer security of the communications lin
We suggest secure Vehicle-to-Vehicle communications in a secure cluster. Here, the security cluster refers to a group of vehicles having a certain level or more of secrecy capacity. Usually, there are many difficulties in defining secrecy capacity, b