On the Secrecy Capacity of F Composite Fading Channels with Multiple Eavesdroppers

Seongki Yoo, Simon L. Cotton, Lei Zhang, Jae Seung Song, Imran S. Ansari, Paschalis C. Sofotasios

Research output: Chapter in Book/Report/Conference proceedingConference proceedingpeer-review

55 Downloads (Pure)

Abstract

This contribution quantifies the achievable physical layer security of wireless transmission over realistic composite fading conditions in the presence of multiple eavesdroppers (Eves). To this end, exact closed-form analytic expressions are derived for the achievable secure outage probability (SOP) and the probability of strictly positive secrecy capacity (SPSC) for the case of F composite fading channels. The derived expressions are tractable and their validity is justified through comparisons with respective computer simulation results. In addition, they allow for the development of useful theoretical and practical insights on the effect of the presence of numerous eavesdroppers under different multipath fading and shadowing conditions, as these are encountered in realistic wireless communication scenarios.
Original languageEnglish
Title of host publicationICC 2023 - IEEE International Conference on Communications
PublisherIEEE
Pages4508-4514
Number of pages7
ISBN (Electronic)978-1-5386-7462-8
ISBN (Print)978-1-5386-7463-5
DOIs
Publication statusPublished - 23 Oct 2023
EventIEEE International Conference on Communications - Rome, Italy
Duration: 28 May 20231 Jun 2023

Publication series

NameIEEE International Conference on Communications
PublisherIEEE
ISSN (Electronic)1938-1883

Conference

ConferenceIEEE International Conference on Communications
Abbreviated titleICC 2023
Country/TerritoryItaly
CityRome
Period28/05/231/06/23

Bibliographical note

© 2023 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.

Copyright © and Moral Rights are retained by the author(s) and/ or other copyright owners. A copy can be downloaded for personal non-commercial research or study, without prior permission or charge. This item cannot be reproduced or quoted extensively from without first obtaining permission in writing from the copyright holder(s). The content must not be changed in any way or sold commercially in any format or medium without the formal permission of the copyright holders.

This document is the author’s post-print version, incorporating any revisions agreed during the peer-review process. Some differences between the published version and this version may remain and you are advised to consult the published version if you wish to cite from it.

Funding Agency: 10.13039/501100004070-Khalifa University (Grant Number: KU/RC1-C2PS-8474000137/T2,KU/RC1-C2PS-8474000137/T5)

Keywords

  • Fading channels
  • Wireless communication
  • Closed-form solutions
  • Computer simulation
  • Physical layer security
  • Probability
  • Power system reliability

Fingerprint

Dive into the research topics of 'On the Secrecy Capacity of F Composite Fading Channels with Multiple Eavesdroppers'. Together they form a unique fingerprint.

Cite this