2018
DOI: 10.1109/access.2018.2853700
|View full text |Cite
|
Sign up to set email alerts
|

On Physical Layer Security Over the Fisher-Snedecor ${\mathcal{F}}$ Wiretap Fading Channels

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
69
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
6
2
1

Relationship

2
7

Authors

Journals

citations
Cited by 73 publications
(70 citation statements)
references
References 16 publications
1
69
0
Order By: Relevance
“…Accommodating the closed-form expressions for secrecy performance metrics in the corresponding entries in Table I, directly yields the results, as displayed in Table II. After some simple algebraic manipulations, one can observe the obtained results herein are consistent with the existing works [18], [20], [22], [36].…”
Section: Special Casessupporting
confidence: 89%
See 1 more Smart Citation
“…Accommodating the closed-form expressions for secrecy performance metrics in the corresponding entries in Table I, directly yields the results, as displayed in Table II. After some simple algebraic manipulations, one can observe the obtained results herein are consistent with the existing works [18], [20], [22], [36].…”
Section: Special Casessupporting
confidence: 89%
“…Theorem 6. The SOP over Fox's H-function wiretap fading channels in the presence of L-colluding eavesdroppers with SC scheme is lower bounded by (36), shown on the top of this page.…”
Section: B Secrecy Characterization Of Sop Theorem 5 the Sop Over Fmentioning
confidence: 99%
“…Information-theoretic security, i.e., physical layer security (PLS), has attracted plenty of attentions [1], since the seminal work was established by Shannon and Wyner. On the basis of the classic Wyner's wiretap channel model, many work related to the secrecy performance analysis over various fading channels, including the Gaussian fading channels [2], Rayleigh [3], Rician [4], [5], Nakagami-m [6], Weibull [7], genralized-K [8], α − µ [9]- [13], κ − µ [14], α-η-κ-µ [15], Fisher-Snedor F [16], and Fox's H-function fading channel [17], etc., were done. Apart from the aforementioned fading model, other models, including the composite fading model and cascaded fading model, are also widely used to characterize some wireless communication scenarios.…”
Section: Introductionmentioning
confidence: 99%
“…and F γ (γ) = m m−1 γ m B (m, m s ) (m s − 1) mγ m 2 F 1 m, m + m s , m + 1; − mγ (m s − 1)γ (2) where B(·, ·) denotes the beta function [19, eq. (8.38)]; 2 F 1 (·) denotes the Gauss hypergeometric function [19, eq.…”
Section: A Statistics Of Fisher-snedecor F Random Variablesmentioning
confidence: 99%