2019
DOI: 10.1007/s11235-019-00638-9
|View full text |Cite
|
Sign up to set email alerts
|

On physical layer security in WSN over GK fading channels during intercept events

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
5
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 19 publications
0
5
0
Order By: Relevance
“…An eavesdropper attempts to intercept the signal over the i-th wiretap channel, whose capacity is C ei . The secrecy capacity that characterizes transmission from the i-th specified sensor to the sink is the difference between the channel capacity of that i-th main link and the i-th wiretap link, as in [20,23]…”
Section: Intercept Probability Based On Sensor Schedulingmentioning
confidence: 99%
See 4 more Smart Citations
“…An eavesdropper attempts to intercept the signal over the i-th wiretap channel, whose capacity is C ei . The secrecy capacity that characterizes transmission from the i-th specified sensor to the sink is the difference between the channel capacity of that i-th main link and the i-th wiretap link, as in [20,23]…”
Section: Intercept Probability Based On Sensor Schedulingmentioning
confidence: 99%
“…To overcame this issue, scheduling based on the channel cumulative distribution function (CDF) assumption, which was suggested earlier in [21,22] for multiuser downlink wiretap transmission, can be exploited. Hence, scheduling schemes have been utilized in [23] to improve the security of WSN i.e., to decrease the intercept probability of an attacker over generalized K fading links.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations