2016
DOI: 10.1109/lwc.2016.2600323
|View full text |Cite
|
Sign up to set email alerts
|

Physical Layer Security With Uncertainty on the Location of the Eavesdropper

Abstract: Abstract-We investigate the physical layer (PHY) security of a system with a base-station (BS), a legitimate user, and an eavesdropper, whose exact location is unknown but within a ring-shaped area around the BS. To this end, we present novel closed-form expressions for the secrecy outage probability, which take into consideration both the impact of fading, as well as the eavesdropper's location uncertainty. The derived expressions are validated through simulations, which reveal that the level of uncertainty s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
33
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 31 publications
(33 citation statements)
references
References 15 publications
0
33
0
Order By: Relevance
“…APPENDIX A: PROOF OF PROPOSITION 1 We first derive the CDF of RV |h E | 2 with location uncertainty of E for S. The CDF F |h E | 2 (x) of the RV |h E | 2 is related to the CDF F |g E | 2 (·) of RV |g E | 2 shown in (4) as follows [5]:…”
Section: Numerical Results and Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…APPENDIX A: PROOF OF PROPOSITION 1 We first derive the CDF of RV |h E | 2 with location uncertainty of E for S. The CDF F |h E | 2 (x) of the RV |h E | 2 is related to the CDF F |g E | 2 (·) of RV |g E | 2 shown in (4) as follows [5]:…”
Section: Numerical Results and Discussionmentioning
confidence: 99%
“…When d E is known to node S, the CDF F γ E (γ) of the SNR γ E will have the same form as that in (5 Lemma 2: When the node S has information on the position of node E and the transmit SNR Es N0 → ∞, the asymptotic ASC C s can be calculated as…”
Section: B Average Secrecy Capacitymentioning
confidence: 99%
See 1 more Smart Citation
“…In particular, we consider a double Rayleigh fading channel, which has been shown from the literature to aptly capture the channel characteristics of vehicular communication networks [12], [13]. The effect of the uncertainty of the eavesdropper location was taken into account, because this parameter has been shown to greatly affect the analysis [20], but has been missing from most analysis on the subject. However, unlike [20] where the secrecy outage probability over Rayleigh fading was studied, in this paper we study the secrecy capacity over a double Rayleigh channel, then in order to account for the uncertainty in the eavesdropper location, we model its distance as a random variable (RV).…”
Section: Introductionmentioning
confidence: 99%
“…The effect of the uncertainty of the eavesdropper location was taken into account, because this parameter has been shown to greatly affect the analysis [20], but has been missing from most analysis on the subject. However, unlike [20] where the secrecy outage probability over Rayleigh fading was studied, in this paper we study the secrecy capacity over a double Rayleigh channel, then in order to account for the uncertainty in the eavesdropper location, we model its distance as a random variable (RV). It is worth noting that to the best of our knowledge, in previous literature on physical layer security, only the effect of the channel fading or the interference, but not both have been considered for highly mobile vehicular communications network.…”
Section: Introductionmentioning
confidence: 99%