2019
DOI: 10.1109/twc.2018.2889768
|View full text |Cite
|
Sign up to set email alerts
|

Secrecy Performance Analysis for Hybrid Wiretapping Systems Using Random Matrix Theory

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(10 citation statements)
references
References 43 publications
0
10
0
Order By: Relevance
“…Here, A is a malicious, but smart IoT node possessing the dual capability of eavesdropping and jamming, though having a limited energy budget P m . A works in a half-duplex mode [2] and while eavesdropping, it turns on its receiver, and attempts to tap the legitimate transmissions of S. Alternatively, when A acts as a jammer, it sends a jamming signal at power P J to impair the legitimate receptions at U. The corresponding channel gains over S-U, S-A and A-U links are respectively denoted by g SU , g SA and g AU .…”
Section: A Network Topology and Channel Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…Here, A is a malicious, but smart IoT node possessing the dual capability of eavesdropping and jamming, though having a limited energy budget P m . A works in a half-duplex mode [2] and while eavesdropping, it turns on its receiver, and attempts to tap the legitimate transmissions of S. Alternatively, when A acts as a jammer, it sends a jamming signal at power P J to impair the legitimate receptions at U. The corresponding channel gains over S-U, S-A and A-U links are respectively denoted by g SU , g SA and g AU .…”
Section: A Network Topology and Channel Modelmentioning
confidence: 99%
“…Physical layer security (PLS) is a promising approach for investigating the security threats in resource-constrained setups like internet of things (IoT) [1], especially with an intelligent hybrid attacker capable of carrying both eavesdropping and jamming [2]. Along with the security, energy efficiency (EE) has also become important from both user and attacker's perspective [3].…”
Section: Introductionmentioning
confidence: 99%
“…The authors have investigated the full duplex attacker in [22], [23] where passive eavesdropping and active jamming are performed simultaneously. In [24] secrecy performance of a wireless network with randomly deployed hybrid attackers is analysed using stochastic geometry tools and random matrix theory. Recently, much attention is being paid to the utilisation of distance distributions as a complement to PPP models for performance analysis in wireless networks [17], [18] without considering secrecy requirements.…”
Section: A Related Artmentioning
confidence: 99%
“…As noted in the literature survey, PLS in spatial stochastic networks is mainly studied under the assumption of homogeneous PPP based deployment of nodes [12]- [15], [24] which are non-viable in several practical scenarios [17], [18]. Moreover, most studies of stochastic networks consider a passive attacker that can only eavesdrop.…”
Section: B Research Gap and Motivationmentioning
confidence: 99%
“…In the presence of a full-duplex eavesdropper having both eavesdropping and jamming capabilities, the authors in [29] proposed a novel secure transmission strategy against eavesdropping by the sophisticated adversary. The authors in [30] studied the secrecy outage probability and mean SR of the system to evaluate the security performance of the system. In this paper, our focus is on how to suppress the malicious jamming and improve the secure performance by designing receive beamforming (RBF) at Bob in the presence of the malicious jamming.…”
Section: Introductionmentioning
confidence: 99%