2022
DOI: 10.1109/tcomm.2022.3198111
|View full text |Cite
|
Sign up to set email alerts
|

Performance Analysis of Short Packet Communications With Multiple Eavesdroppers

Abstract: This paper studies the performance of short packet communications in the presence of multiple eavesdroppers. We start our investigation by examining the fading wiretap channel, where the communication is overheard by multiple non-colluding single antenna eavesdroppers. A closed-form expression for the average secrecy throughput is derived, when the transmitter has a single antenna. The Monte-Carlo simulations show a close match of the analytical expression with the numerical results. Moreover, the optimal bloc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 14 publications
(1 citation statement)
references
References 32 publications
0
0
0
Order By: Relevance
“…Based on this achievable secrecy rate, Reference [20] derived the secrecy throughput of an IoT network in the presence of a multi-antenna eavesdropper. Later, the work in [20] was extended to a wiretap channel with multiple eavesdroppers [21], multiuser multiple-input-multiple-output (MIMO) networks [22], and cognitive IoT networks with a multi-antenna relay [23]. Additionally, Reference [24] considered the relationship between secrecy throughput and secrecy coding under finite blocklength, and provided the optimal code rates and blocklength in terms of maximizing the secrecy throughput.…”
Section: Introductionmentioning
confidence: 99%
“…Based on this achievable secrecy rate, Reference [20] derived the secrecy throughput of an IoT network in the presence of a multi-antenna eavesdropper. Later, the work in [20] was extended to a wiretap channel with multiple eavesdroppers [21], multiuser multiple-input-multiple-output (MIMO) networks [22], and cognitive IoT networks with a multi-antenna relay [23]. Additionally, Reference [24] considered the relationship between secrecy throughput and secrecy coding under finite blocklength, and provided the optimal code rates and blocklength in terms of maximizing the secrecy throughput.…”
Section: Introductionmentioning
confidence: 99%