On the Physical Layer Security of a Dual-Hop UAV-based Network in the Presence of per-hop Eavesdropping and Imperfect CSI

05/15/2022
by   Elmehdi Illi, et al.
0

In this paper, the physical layer security of a dual-hop unmanned aerial vehicle-based wireless network, subject to imperfect channel state information (CSI) and mobility effects, is analyzed. Specifically, a source node (S) communicates with a destination node (D) through a decode-and-forward relay (R), in the presence of two wiretappers (E_1,E_2) independently trying to compromise the two hops. Furthermore, the transmit nodes (S,R) have a single transmit antenna, while the receivers (R,D,E_1,E_2) are equipped with multiple receive antennas. Based on the per-hop signal-to-noise ratios (SNRs) and correlated secrecy capacities' statistics, a closed-form expression for the secrecy intercept probability (IP) metric is derived, in terms of key system parameters. Additionally, asymptotic expressions are revealed for two scenarios, namely (i) mobile nodes with imperfect CSI and (ii) static nodes with perfect CSI. The results show that a zero secrecy diversity order is manifested for the first scenario, due to the presence of a ceiling value of the average SNR, while the IP drops linearly at high average SNR in the second one, where the achievable diversity order depends on the fading parameters and number of antennas of the legitimate links/nodes. Furthermore, for static nodes, the system can be castigated by a 15 dB secrecy loss at IP=3×10^-3, when the CSI imperfection power raises from 0 to 10^-3. Lastly, the higher the legitimate nodes' speed, carrier frequency, delay, and/or relay's decoding threshold SNR, the worse is the system's secrecy. Monte Carlo simulations endorse the derived analytical results.

READ FULL TEXT

page 3

page 4

page 5

page 9

page 10

page 13

page 16

page 17

research
09/05/2018

On Secure Mixed RF-FSO Systems With TAS and Imperfect CSI

In this work, we analyze the secrecy outage performance of a dual-hop re...
research
08/02/2022

Can Artificial Noise Boost Further the Secrecy of Dual-hop RIS-aided Networks?

In this paper, we quantify the physical layer security of a dual-hop reg...
research
11/28/2019

A PHY Layer Security Analysis of Uplink Cooperative Jamming-Based Underlay CRNs with Multi-Eavesdroppers

In this paper, the physical layer security of a dual-hop underlay uplink...
research
03/01/2018

Effects of CSI Knowledge on Secrecy of Threshold-Selection Decode-and-Forward Relaying

This paper considers secrecy of a three node cooperative wireless system...
research
10/13/2019

On the Secrecy Performance of Random VLC Networks with Imperfect CSI and Protected Zone

This paper investigates the physical-layer security for a random indoor ...
research
09/29/2020

A PHY Layer Security of a Jamming-Based Underlay Cognitive Hybrid Satellite-Terrestrial Network

In this work, we investigate the physical layer security of a jamming-ba...
research
02/09/2020

Performance Analysis of SWIPT Relaying Systems in the Presence of Impulsive Noise

We develop an analytical framework to characterize the effect of impulsi...

Please sign up or login with your details

Forgot password? Click here to reset