Abstract
In this work, we investigate the performance analysis of a device-to-device (D2D) communication network under an eavesdropper E attack. Besides, we assume that E is located in the proximal region where it can overhear the information from the source S. Specifically, S transmits information to the destination D, adopting the power beacon's energy to surmount the limited energy budget. Moreover, to reduce the quality of the eavesdropping link, the cooperative jamming technique can be used, where the multi-friendly jammers are employed to generate the artificial noises to E continuously. As considering the above presentation, we derive the quality of system analysis in terms of the outage probability (OP), intercept probability (IP), and secrecy outage probability (SOP) of the proposed system model. Finally, the Monte-Carlo simulations are performed to corroborate the exactness of the mathematical analysis.This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium provided the original work is properly cited.
Highlights
The Internet of things (IoT) has received substantial attention from academia and industry because it is a promising communications paradigm that can potentially boost the quality of life with advances in smart transportation, manufacturing, smart cities, energy, health care, agriculture, and retail [1, 2]
We investigate the performance analysis of a device-to-device (D2D) communication network under an eavesdropper E attack
As considering the above presentation, we derive the quality of system analysis in terms of the outage probability (OP), intercept probability (IP), and secrecy outage probability (SOP) of the proposed system model
Summary
The Internet of things (IoT) has received substantial attention from academia and industry because it is a promising communications paradigm that can potentially boost the quality of life with advances in smart transportation, manufacturing, smart cities, energy, health care, agriculture, and retail [1, 2]. S transmits information to the destination D, adopting the power beacon's energy to surmount the limited energy budget. As considering the above presentation, we derive the quality of system analysis in terms of the outage probability (OP), intercept probability (IP), and secrecy outage probability (SOP) of the proposed system model.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.