
You have already added 0 works in your ORCID record related to the merged Research product.
You have already added 0 works in your ORCID record related to the merged Research product.
<script type="text/javascript">
<!--
document.write('<div id="oa_widget"></div>');
document.write('<script type="text/javascript" src="https://beta.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=undefined&type=result"></script>');
-->
</script>
Physical layer security in wireless sensors networks: secrecy outage probability analysis

ABSTRACTThe secrecy performance of wireless networks powered up by a dedicated power beacon (PB) is addressed in this work. Particularly, the closed-form expression of the secrecy outage probability (SOP) under the presence of multiple eavesdroppers is given. The considered networks are asymmetric since there are multiple eavesdroppers but only a single legitimate receiver. As a consequence, two wiretap schemes are employed, namely, non-colluding and colluding schemes, to take advantage of multiple eavesdroppers. To draw insights from the derived framework, the asymptotic framework of the SOP under the high transmit power regime is also provided. Next, Monte Carlo simulations are provided to validate the theoretical foundations of the proposed approach. Our findings show that by increasing the transmit power from −10 dB to 30 dB, the SOP ameliorates almost a thousand times. Additionally, the SOP is a monotonic decreasing function with a time-switching ratio. We also make comparisons with work in the literature in which the full-duplex relay is employed to help the legitimate link. Numerical results illustrate that the proposed network outperforms those described in the literature. Particularly, through reliance on the setup, the SOP under the proposed system is better than those of the literature by about twofold.
- Ton Duc Thang University Viet Nam
- An Giang University Viet Nam
- Trường ĐH Nguyễn Tất Thành Viet Nam
- Trường ĐH Nguyễn Tất Thành Viet Nam
energy harvesting, non-colluding eavesdroppers, TK5101-6720, Information technology, Colluding eavesdroppers, T58.5-58.64, Telecommunication, secrecy outage probability
energy harvesting, non-colluding eavesdroppers, TK5101-6720, Information technology, Colluding eavesdroppers, T58.5-58.64, Telecommunication, secrecy outage probability
citations This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).2 popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.Average influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).Average impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.Average
