2018
DOI: 10.1109/lwc.2018.2852765
|View full text |Cite
|
Sign up to set email alerts
|

On Physical Layer Security of Double Rayleigh Fading Channels for Vehicular Communications

Abstract: Abstract-In this letter, we study the physical layer secrecy performance of the classic Wyner's wiretap model over double Rayleigh fading channels for vehicular communications links. We derive novel and closed-form expressions for the average secrecy capacity (ASC) taking into account the effects of fading, path loss and eavesdropper location uncertainty. The asymptotic analysis for ASC is also conducted. The derived expressions can be used for secrecy capacity analysis of a number of scenarios including vehic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
81
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
3
2
2
2

Relationship

1
8

Authors

Journals

citations
Cited by 105 publications
(81 citation statements)
references
References 14 publications
0
81
0
Order By: Relevance
“…Then, the third term of (75) can be expressed as (78), where the last line is found after applying Lemmas 4, 7, 8, and 12. Finally, after plugging (76), (77), and (78) back into (75) and several simplifications, we find (12). The proof is concluded by replacing Equations (11) and (12) into the definitions of κ and θ, given by (71) and (69), respectively.…”
Section: Lemmamentioning
confidence: 77%
See 1 more Smart Citation
“…Then, the third term of (75) can be expressed as (78), where the last line is found after applying Lemmas 4, 7, 8, and 12. Finally, after plugging (76), (77), and (78) back into (75) and several simplifications, we find (12). The proof is concluded by replacing Equations (11) and (12) into the definitions of κ and θ, given by (71) and (69), respectively.…”
Section: Lemmamentioning
confidence: 77%
“…The results (13) and (14) are found after expanding (11) and (12), using Lemma 14 and the fact that lim x→∞ cos(1/x) = 1.…”
Section: A Derivation Of Remarkmentioning
confidence: 99%
“…Apart from the aforementioned fading model, other models, including the composite fading model and cascaded fading model, are also widely used to characterize some wireless communication scenarios. In particular, the cascaded fading model demonstrates feasibility and applicability in modeling the multi-hop cooperative communications [11], [18], mobile-to-mobile (M2M) communication [19], [20], and radio-frequency identification (RFID) pinhole channels [21], etc.…”
Section: Introductionmentioning
confidence: 99%
“…E} is the channel coefficient from S to the receiving vehicles D and E, where r i is the V2V link distance, β is the path-loss exponent and g i is the channel gain following double Rayleigh fading [10]. As far as the intereferers are concerned, K denotes the number of interference nodes, while…”
Section: System Modelmentioning
confidence: 99%