Radio waves are attenuated by atmospheric phenomena such as snow, rain, dust, clouds, and ice, which absorb radio signals. Signal attenuation becomes more severe at extremely high frequencies, usually above 10 GHz. In typical equatorial and tropical locations, rain attenuation is more prevalent. Some established research works have attempted to provide state-of-the-art reviews on modeling and analysis of rain attenuation in the context of extremely high frequencies. However, the existing review works conducted over three decades (1990 to 2022), have not adequately provided comprehensive taxonomies for each method of rain attenuation modeling to expose the trends and possible future research directions. Also, taxonomies of the methods of model validation and regional developmental efforts on rain attenuation modeling have not been explicitly highlighted in the literature. To address these gaps, this paper conducted an extensive literature survey on rain attenuation modeling, methods of analyses, and model validation techniques, leveraging the ITU-R regional categorizations. Specifically, taxonomies in different rain attenuation modeling and analysis areas are extensively discussed. Key findings from the detailed survey have shown that many open research questions, challenges, and applications could open up new research frontiers, leading to novel findings in rain attenuation. Finally, this study is expected to be reference material for the design and analysis of rain attenuation.
The broadcast nature of radio propagation in wireless communication has been suspected as the loopholes of passive or active attacks by unauthorized users (eavesdroppers). The physical layer security techniques operate at the lowest stack of OSI layer against conventional cryptographic approaches, operating at the upper layer. However, techniques such as channel coding, power (directional antenna and artificial noise), and spread spectrum have been (and continuously) deployed to safeguard against sophisticated attacks. Most of these deployments are theoretical, and a few are enhanced for efficient security against an intruder.In this article, a boundary technique approach is proposed and applied to the physical layer to improve its secrecy-capacity and subdue adversary effects at the legitimate receiver. Hybrid performance metrics were adopted, and a Monte Carlo simulation was performed. The result obtained using secrecy outage probability, secrecy-capacity, and intercept-probability show that our proposed techniques enhance the secret transmission between the main transmitter and legitimate receiver. The simulation results were compared with the analytical methods. It was found that the channel between the transmitter and the main receiver has a better signal-to-noise ratio than the corresponding eavesdropper's channel. Conclusively, performance of the proposed technique is validated for applications in emerging wireless communication systems.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.