Abstract

In this paper, the physical-layer security for a three-node wiretap system model is studied. Under the threat of multiple eavesdroppers, it is presumed that a transmitter is communicating with a legitimate receiver. The channels are assumed to be following cascaded κ-μ fading distributions. In addition, two scenarios for eavesdroppers’ interception and information-processing capabilities are investigated: colluding and non-colluding eavesdroppers. The positions of these eavesdroppers are assumed to be random in the non-colluding eavesdropping scenario, based on a homogeneous Poisson point process (HPPP). The security is examined in terms of the secrecy outage probability, the probability of non-zero secrecy capacity, and the intercept probability. The exact and asymptotic expressions for the secrecy outage probability and the probability of non-zero secrecy capacity are derived. The results demonstrate the effect of the cascade level on security. Additionally, the results indicate that as the number of eavesdroppers rises, the privacy of signals exchanged between legitimate ends deteriorates. Furthermore, in this paper, regarding the capabilities of tapping and processing the information, we provide a comparison between colluding and non-colluding eavesdropping.

Highlights

  • Security is one of the fundamental challenges that must be addressed in all types of networks, with the tremendous number of connections and services planned in 5G and beyond

  • The results demonstrate the influence of multiple eavesdroppers on information privacy

  • The analytical curves are plotted by truncating the infinite series summations (v and r ) to the first twenty terms

Read more

Summary

Introduction

Security is one of the fundamental challenges that must be addressed in all types of networks, with the tremendous number of connections and services planned in 5G and beyond. In this context, physical-layer security (PLS) has emerged as a critical and reliable approach to effectively addressing the security concern [2,3]. PLS does not depend on the exchange of security keys between authorized endpoints since there is no necessity for decryption and encryption operations, as in higher-layer security techniques [4,5]. PLS is more suitable for use in 5G networks and beyond

Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call