Destination Scheduling for Secure Pinhole-Based Power-Line Communication

06/06/2023
by   Chinmoy Kundu, et al.
0

We propose an optimal destination scheduling scheme to improve the physical layer security (PLS) of a power-line communication (PLC) based Internet-of-Things system in the presence of an eavesdropper. We consider a pinhole (PH) architecture for a multi-node PLC network to capture the keyhole effect in PLC. The transmitter-to-PH link is shared between the destinations and an eavesdropper which correlates all end-to-end links. The individual channel gains are assumed to follow independent log-normal statistics. Furthermore, the additive impulsive noise at each node is modeled by an independent Bernoulli-Gaussian process. Exact computable expressions for the average secrecy capacity (ASC) and the probability of intercept (POI) performance over many different networks are derived. Approximate closed-form expressions for the asymptotic ASC and POI are also provided. We find that the asymptotic ASC saturates to a constant level as transmit power increases. We observe that the PH has an adverse effect on the ASC. Although the shared link affects the ASC, it has no effect on the POI. We show that by artificially controlling the impulsive to background noise power ratio and its arrival rate at the receivers, the secrecy performance can be improved.

READ FULL TEXT
research
08/02/2022

Optimal Friendly Jamming and Transmit Power Allocation in RIS-assisted Secure Communication

This paper analyzes the secrecy performance of a reconfigurable intellig...
research
12/01/2020

Secrecy Performance of Body-Centric Communications over Alternate Rician Shadowed Fading Channels

In this paper, we investigate the physical layer security over the Alter...
research
07/31/2018

On the Security Analysis of a Cooperative Incremental Relaying Protocol in the Presence of an Active Eavesdropper

Physical layer security offers an efficient means to decrease the risk o...
research
12/28/2022

Transmitter Selection for Secrecy Against Colluding Eavesdroppers with Backhaul Uncertainty

In this paper, the secrecy performance of a multi-transmitter system wit...
research
08/31/2021

Optimal Latency-Oriented Scheduling in Parallel Queuing Systems

Today, more and more interactive applications, such as augmented/virtual...
research
05/04/2020

Effect of Correlation between Information and Energy Links in Secure Wireless Powered Communications

In this paper, we investigate the impact of correlation between the ener...
research
08/30/2022

Ergodic Secrecy Rate of Optimal Source-Destination Pair Selection in Frequency-Selective Fading

Node selection is a simple technique to achieve diversity and thereby en...

Please sign up or login with your details

Forgot password? Click here to reset