2022
DOI: 10.1109/lcomm.2021.3123893
|View full text |Cite
|
Sign up to set email alerts
|

Physical Layer Security Analysis in Ambient Backscatter Communication With Node Mobility and Imperfect Channel Estimation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(7 citation statements)
references
References 14 publications
0
7
0
Order By: Relevance
“…The function G(j) can be written as G (j) =∆ j,2 e ∆ j −∆ j,1 Ei (−∆ j ) H ( j) + ∆ j,3 ∆ j e ∆ j −∆ j,1 Ei (−∆ j ) H ( j) + ∆ j,2 e −∆ j,1 H ( j) , (25) where j ∈ {4, 5}. If j = 4, j = 5, and vice versa.…”
Section: A Secrecy Outage Performance Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…The function G(j) can be written as G (j) =∆ j,2 e ∆ j −∆ j,1 Ei (−∆ j ) H ( j) + ∆ j,3 ∆ j e ∆ j −∆ j,1 Ei (−∆ j ) H ( j) + ∆ j,2 e −∆ j,1 H ( j) , (25) where j ∈ {4, 5}. If j = 4, j = 5, and vice versa.…”
Section: A Secrecy Outage Performance Analysismentioning
confidence: 99%
“…To address this problem, the physical layer security (PLS) was proposed as an effective approach to ensure the information transmission security at the physical layer, which is defined the capacity difference between the legitimate channels and the eavesdropping channels [23], [24]. The research works on PLS performance of ABcom systems are as follows [25]- [28]. The authors of [25] considered a practical ABcom scenario where both the reader and eavesdropper are in motion, and the secrecy performance was studied with imperfect channel estimation.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The authors of [25] investigated the physical layer authentication by combining AmBC and NOMA technology. The authors in [26] analyzed the security of AmBC systems, which include multiple tags, readers, and eavesdroppers. The identical feature of these studies is that the transceiver is configured with perfect modules.…”
Section: Introductionmentioning
confidence: 99%
“…Song et al [13], studied PLS with artificial noise (AN) utilized to decrease the signal-to-noise interference noise (SINR) of the eavesdropper. PLS was investigated for ambient BSC systems with multiple tags, the authors derived exact detection rates for the eavesdropper and the reader [14], [15]. Motivated by these recent ideas in securing BSC systems, we add the following contributions to the growing field of BSC security: we derive exact strictly positive secrecy capacity (SPSC) expressions as well as ergodic secrecy capacity expressions (ESC) for the backscatter communication reader with channel gain following Rayleigh distribution and we also present performance curves demonstrating the improvement of secrecy capacity at the reader.…”
Section: Introductionmentioning
confidence: 99%