2021
DOI: 10.3390/electronics10121368
|View full text |Cite
|
Sign up to set email alerts
|

Physical Layer Intercept Probability in Wireless Sensor Networks over Fisher–Snedecor \({\mathcal{F}}\) Fading Channels

Abstract: In this paper, we analyze the physical layer security (PLS) of an arbitrarily dimensioned wireless sensor network (WSN) in the presence of an unauthorized attacker. Various scheduling schemes have been exploited in order to enhance the secure transmission of reliable links impaired by Fisher–Snedecor F fading. The path loss among active nodes is also considered. The exact intercept probability expressions are derived recalling an optimal scheduling scheme (OS), a scheduling policy based on a specific cumulativ… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 27 publications
(66 reference statements)
0
2
0
Order By: Relevance
“…The security of the physical layer is also very important in e-commerce because data is most often transmitted via wireless networks. As data is transmitted through the medium, it is exposed to various effects that can affect its quality, reliability and security [13]. The influence of fading, shadow effect, scattering, signal blocking, atmospheric conditions degrade the transmitted information and thus enable attackers and eavesdroppers to intercept it.…”
Section: Availabilitymentioning
confidence: 99%
“…The security of the physical layer is also very important in e-commerce because data is most often transmitted via wireless networks. As data is transmitted through the medium, it is exposed to various effects that can affect its quality, reliability and security [13]. The influence of fading, shadow effect, scattering, signal blocking, atmospheric conditions degrade the transmitted information and thus enable attackers and eavesdroppers to intercept it.…”
Section: Availabilitymentioning
confidence: 99%
“…By substituting (18) in (31) and by applying ( [41], Equation (07.34.03.0456.01)), ( [41], Equation (07.23.26.0007.01)) and ( [41], Equation (07.34.21.0013.01)) in (31), respectively, the C-F C γ was calculated and given as:…”
Section: Channel Capacity (C γ )mentioning
confidence: 99%