Physical Layer Security in the Presence of Interference

03/24/2018
by   Dimitrios S. Karas, et al.
0

We evaluate and quantify the joint effect of fading and multiple interferers on the physical-layer (PHY) security of a system consisted of a base-station (BS), a legitimate user, and an eavesdropper. To this end, we present a novel closed-form expression for the secrecy outage probability, which takes into account the fading characteristics of the wireless environment, the location and the number of interferers, as well as the transmission power of the BS and the interference. The results reveal that the impact of interference should be seriously taken into account in the design and deployment of a wireless system with PHY security.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/27/2018

On the Secrecy Performance of Generalized User Selection for Interference-Limited Multiuser Wireless Networks

We investigate the secrecy performance of a multiuser diversity scheme f...
research
07/16/2020

A Product Channel Attack to Wireless Physical Layer Security

We propose a novel attack that compromises the physical layer security o...
research
07/19/2019

Performance evaluation of THz wireless systems under the joint impact of misalignment fading and phase noise

In this paper, we investigate the joint impact of misalignment fading an...
research
02/01/2018

Tradeoff between Delay and Physical Layer Security in Wireless Networks

Exchange of crucial and confidential information leads to the unpreceden...
research
06/16/2021

Opportunistic Relaying in Multicasting over Generalized Shadowed Fading Channels: A PHY Security Analysis

The secrecy of wireless multicast networks is greatly hampered due to th...
research
05/31/2023

Confidential Signal Cancellation Phenomenon in Interference Alignment Networks: Cause and Cure

This paper investigates physical layer security (PLS) in wireless interf...
research
01/31/2020

QoS-aware Stochastic Spatial PLS Model for Analysing Secrecy Performance under Eavesdropping and Jamming

Securing wireless communication, being inherently vulnerable to eavesdro...

Please sign up or login with your details

Forgot password? Click here to reset