ﻻ يوجد ملخص باللغة العربية
In this work, we propose a new physical layer security framework for optical space networks. More precisely, we consider two practical eavesdropping scenarios: free-space optical (FSO) eavesdropping in the space and FSO eavesdropping in the air. In the former, we assume that a high altitude platform station (HAPS) is trying to capture the confidential information from the low earth orbit (LEO) satellite, whereas in the latter, an unmanned aerial vehicle (UAV) eavesdropper is trying to intercept the confidential information from the HAPS node. To quantify the overall performance of both scenarios, we obtain closed-form secrecy outage probability (SOP) and probability of positive secrecy capacity (PPSC) expressions and validate with Monte Carlo simulations. Furthermore, we provide important design guidelines that can be helpful in the design of secure non-terrestrial networks.
Intelligent reflective surface (IRS) technology is emerging as a promising performance enhancement technique for next-generation wireless networks. Hence, we investigate the physical layer security of the downlink in IRS-aided non-orthogonal multiple
The integration of unmanned aerial vehicles (UAVs) into the terrestrial cellular networks is envisioned as one key technology for next-generation wireless communications. In this work, we consider the physical layer security of the communications lin
In this paper, we introduce an intelligent reflecting surface (IRS) to provide a programmable wireless environment for physical layer security. By adjusting the reflecting coefficients, the IRS can change the attenuation and scattering of the inciden
We present experimental data on message transmission in a free-space optical (FSO) link at an eye-safe wavelength, using a testbed consisting of one sender and two receiver terminals, where the latter two are a legitimate receiver and an eavesdropper
Physical layer security is investigated over mixture Gamma (MG) distributed fading channels with discrete inputs. By the Gaussian quadrature rules, closed-form expressions are derived to characterize the average secrecy rate (ASR) and secrecy outage