2018
DOI: 10.1109/lcomm.2018.2860020
|View full text |Cite
|
Sign up to set email alerts
|

On Physical Layer Security of $\alpha$ -$\eta$ -$\kappa$ -$\mu$ Fading Channels

Abstract: Abstract-In this letter, we study the secrecy performance of the classic Wyner's wiretap model, where the main and eavesdropper channels are modeled by a general and versatile α-η-κ-µ fading model. Novel and exact expressions of the average secrecy capacity and secrecy outage probability have been derived. Previous results on physical layer security can be obtained through our newly derived expressions by specializing the model parameters. More importantly, the derived results are also applicable for the secre… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
42
0
5

Year Published

2019
2019
2023
2023

Publication Types

Select...
8
1
1

Relationship

2
8

Authors

Journals

citations
Cited by 59 publications
(49 citation statements)
references
References 17 publications
(14 reference statements)
0
42
0
5
Order By: Relevance
“…Information-theoretic security, i.e., physical layer security (PLS), has attracted plenty of attentions [1], since the seminal work was established by Shannon and Wyner. On the basis of the classic Wyner's wiretap channel model, many work related to the secrecy performance analysis over various fading channels, including the Gaussian fading channels [2], Rayleigh [3], Rician [4], [5], Nakagami-m [6], Weibull [7], genralized-K [8], α − µ [9]- [13], κ − µ [14], α-η-κ-µ [15], Fisher-Snedor F [16], and Fox's H-function fading channel [17], etc., were done. Apart from the aforementioned fading model, other models, including the composite fading model and cascaded fading model, are also widely used to characterize some wireless communication scenarios.…”
Section: Introductionmentioning
confidence: 99%
“…Information-theoretic security, i.e., physical layer security (PLS), has attracted plenty of attentions [1], since the seminal work was established by Shannon and Wyner. On the basis of the classic Wyner's wiretap channel model, many work related to the secrecy performance analysis over various fading channels, including the Gaussian fading channels [2], Rayleigh [3], Rician [4], [5], Nakagami-m [6], Weibull [7], genralized-K [8], α − µ [9]- [13], κ − µ [14], α-η-κ-µ [15], Fisher-Snedor F [16], and Fox's H-function fading channel [17], etc., were done. Apart from the aforementioned fading model, other models, including the composite fading model and cascaded fading model, are also widely used to characterize some wireless communication scenarios.…”
Section: Introductionmentioning
confidence: 99%
“…The secrecy outage probability is a useful secrecy performance metric for the scenario of passive eavesdropping, where node S does not have CSI on the eavesdropper's channel [6]. The secrecy outage probability is defined as the probability that the instantaneous secrecy capacity is below a predefined threshold rate R s [33], i.e.,…”
Section: Secrecy Outage Probability Analysismentioning
confidence: 99%
“…The absence of secret keys makes it outperform the conventional cryptography technique from the information-theoretic viewpoint. In recent decades, plenty of works have studied the PLS over various fading channels, e.g., Rayleigh [1], Rician (Nakagami-n) [2], Hoyt (Nakagami-q) [3], α − µ [4]- [6], cascaded α − µ [7], κ − µ [8], Lognormal [9], Fisher-Snedecor F [10], generalized-K [11], extended generalized-K (EGK) [12], α − η − κ − µ [13], Málaga [14], etc.…”
Section: Introductionmentioning
confidence: 99%