http://10.10.120.238:8080/xmlui/handle/123456789/925
DC Field | Value | Language |
---|---|---|
dc.rights.license | All Open Access, Gold, Green | - |
dc.contributor.author | Wafai B. | en_US |
dc.contributor.author | Dubey A. | en_US |
dc.contributor.author | Kundu C. | en_US |
dc.date.accessioned | 2023-11-30T08:56:02Z | - |
dc.date.available | 2023-11-30T08:56:02Z | - |
dc.date.issued | 2023 | - |
dc.identifier.issn | 1751-8628 | - |
dc.identifier.other | EID(2-s2.0-85162856003) | - |
dc.identifier.uri | https://dx.doi.org/10.1049/cmu2.12650 | - |
dc.identifier.uri | http://localhost:8080/xmlui/handle/123456789/925 | - |
dc.description.abstract | Due to the exponential growth of interconnected devices and reduced cell coverage, beyond fifth-generation networks will be dense. Thus, instead of wired backhaul, wireless backhaul will be cost-effective and flexible. For security in multi-transmitter systems, sub-optimal and optimal transmitter selection schemes exist. However, including backhaul activity knowledge available (BKA) and backhaul activity knowledge unavailable (BKU) cases and transmitter selection schemes, there is no generalized secrecy analysis method. Moreover, evaluation of the ergodic secrecy rate (ESR) of the optimal selection schemes is impossible using existing solution approaches. To address these, two sub-optimal and optimal transmitter selection schemes are proposed for a small-cell multi-transmitter system in BKU or BKA cases in the presence of multiple colluding eavesdroppers. The distribution of the ratio of the destination channel SNR and eavesdropping channel SNR is derived, thereby providing different secrecy performance metrics uniformly irrespective of selection schemes and BKU or BKA cases. Simplified asymptotic expressions are provided to elucidate the influence of the system parameters and of the backhaul reliability. It is observed that the secrecy performance improves when the knowledge of backhaul link activity is utilized, and the improvement is most noticeable when the backhaul is highly unreliable. It is also observed that while the secrecy performance degrades with an increasing number of eavesdroppers, neither the asymptotic saturation value of the secrecy outage probability nor the rate of improvement of the ESR with signal-to-noise-ratio depends on the number of eavesdroppers. © 2023 The Authors. IET Communications published by John Wiley & Sons Ltd on behalf of The Institution of Engineering and Technology. | en_US |
dc.language.iso | en | en_US |
dc.publisher | John Wiley and Sons Inc | en_US |
dc.source | IET Communications | en_US |
dc.subject | 5G mobile communication | en_US |
dc.subject | 6G | en_US |
dc.subject | data privacy | en_US |
dc.subject | fading channels | en_US |
dc.subject | Internet of Things | en_US |
dc.subject | wireless channels | en_US |
dc.title | Transmitter selection for secrecy against colluding eavesdroppers with backhaul uncertainty | en_US |
dc.type | Journal Article | en_US |
Appears in Collections: | Journal Article |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.