2019
DOI: 10.1016/j.phycom.2019.100731
|View full text |Cite
|
Sign up to set email alerts
|

Effective secrecy throughput analysis of relay-assisted free-space optical communications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 33 publications
0
4
0
Order By: Relevance
“…where, 𝑓 I (𝐼, 𝑘, 𝜃) = 9 >(R)S 3 𝐼 R+9 𝑒 +Q S ⁄ stands for the gamma PDF with shape parameter 𝑘 and scale parameter 𝜃. In (10) and (11),…”
Section: Statistics Analysis Of Tas Opportunisticmentioning
confidence: 99%
See 1 more Smart Citation
“…where, 𝑓 I (𝐼, 𝑘, 𝜃) = 9 >(R)S 3 𝐼 R+9 𝑒 +Q S ⁄ stands for the gamma PDF with shape parameter 𝑘 and scale parameter 𝜃. In (10) and (11),…”
Section: Statistics Analysis Of Tas Opportunisticmentioning
confidence: 99%
“…For example, in a typical wiretap model, PLS theory states that secure communication is possible if the capacity of the legitimate channel is higher than that of the eavesdropping channel. Motivated by the PLS schemes of RF systems, various PLS techniques have been proposed to secure FSO communications, such as diversity approaches [10], [11], transmit aperture selection (TAS) [12], artificial noise injection [13], and generalized chaotic modulation [14]. However, many characteristics of FSO systems differ from RF systems (e.g., the channel, and the physical characteristics of the transmitting and receiving devices).…”
mentioning
confidence: 99%
“…Under two different weather situations, the authors of [30] compare the effective secrecy throughput of legal links and multi eavesdroppers with multiple-input-multiple-output relay supported. When the transmitter instantaneous CSI of the legitimate channel is available, the effect of using multiple relays on EST performance was investigated using two mechanisms: adaptive scheme with selective relaying, and fixed rate with all-active relaying, when the instantaneous CSI is not available at the transmitter [30].A framework for the secrecy analysis of a terrestrial FSO link considering the eavesdropper's location, under misalignments and atmospheric turbulence conditions is established in [31]. From a security standpoint, the IM/DD FSO system with CV-QKD technique was investigated [31].…”
Section: Physical Layer Security Techniques In Fso Systemsmentioning
confidence: 99%
“…For example, to evaluate the efficiency and availability of FSO links under different weather conditions, a fourchannel dense wavelength division multiplexing (DWDM) scheme is proposed in [14], while return to zero (RZ) and non-return to zero (NRZ) modulation formats are used for the single FSO link in [15]. In addition, several securing approaches have been proposed for FSO systems inspired by the recent advances in PLS in the RF counterparts, including diversity methods [16], [17], transmit aperture selection (TAS) [18], artificial noise injection [19], and chaotic waveform modulation [20]. In another study [21], the PLS performance of the FSO system was analyzed considering the effects of correlated Malaga-M FSO links.…”
mentioning
confidence: 99%