Skip navigation

Please use this identifier to cite or link to this item: http://10.10.120.238:8080/xmlui/handle/123456789/925
Full metadata record
DC FieldValueLanguage
dc.rights.licenseAll Open Access, Gold, Green-
dc.contributor.authorWafai B.en_US
dc.contributor.authorDubey A.en_US
dc.contributor.authorKundu C.en_US
dc.date.accessioned2023-11-30T08:56:02Z-
dc.date.available2023-11-30T08:56:02Z-
dc.date.issued2023-
dc.identifier.issn1751-8628-
dc.identifier.otherEID(2-s2.0-85162856003)-
dc.identifier.urihttps://dx.doi.org/10.1049/cmu2.12650-
dc.identifier.urihttp://localhost:8080/xmlui/handle/123456789/925-
dc.description.abstractDue to the exponential growth of interconnected devices and reduced cell coverage, beyond fifth-generation networks will be dense. Thus, instead of wired backhaul, wireless backhaul will be cost-effective and flexible. For security in multi-transmitter systems, sub-optimal and optimal transmitter selection schemes exist. However, including backhaul activity knowledge available (BKA) and backhaul activity knowledge unavailable (BKU) cases and transmitter selection schemes, there is no generalized secrecy analysis method. Moreover, evaluation of the ergodic secrecy rate (ESR) of the optimal selection schemes is impossible using existing solution approaches. To address these, two sub-optimal and optimal transmitter selection schemes are proposed for a small-cell multi-transmitter system in BKU or BKA cases in the presence of multiple colluding eavesdroppers. The distribution of the ratio of the destination channel SNR and eavesdropping channel SNR is derived, thereby providing different secrecy performance metrics uniformly irrespective of selection schemes and BKU or BKA cases. Simplified asymptotic expressions are provided to elucidate the influence of the system parameters and of the backhaul reliability. It is observed that the secrecy performance improves when the knowledge of backhaul link activity is utilized, and the improvement is most noticeable when the backhaul is highly unreliable. It is also observed that while the secrecy performance degrades with an increasing number of eavesdroppers, neither the asymptotic saturation value of the secrecy outage probability nor the rate of improvement of the ESR with signal-to-noise-ratio depends on the number of eavesdroppers. © 2023 The Authors. IET Communications published by John Wiley & Sons Ltd on behalf of The Institution of Engineering and Technology.en_US
dc.language.isoenen_US
dc.publisherJohn Wiley and Sons Incen_US
dc.sourceIET Communicationsen_US
dc.subject5G mobile communicationen_US
dc.subject6Gen_US
dc.subjectdata privacyen_US
dc.subjectfading channelsen_US
dc.subjectInternet of Thingsen_US
dc.subjectwireless channelsen_US
dc.titleTransmitter selection for secrecy against colluding eavesdroppers with backhaul uncertaintyen_US
dc.typeJournal Articleen_US
Appears in Collections:Journal Article

Files in This Item:
There are no files associated with this item.
Show simple item record


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.