2019
DOI: 10.1109/tvt.2019.2915017
|View full text |Cite
|
Sign up to set email alerts
|

On Physical Layer Security Over Fox's $H$-Function Wiretap Fading Channels

Abstract: Most of the well-known fading distributions, if not all of them, could be encompassed by the Fox's H-function fading. Consequently, we investigate the physical layer security (PLS) over Fox's H-function fading wiretap channels, in the presence of non-colluding and colluding eavesdroppers. In particular, for the non-colluding scenario, closed-form expressions are derived for the secrecy outage probability (SOP), the probability of nonzero secrecy capacity (PNZ), and the average secrecy capacity (ASC). These exp… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
39
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 41 publications
(40 citation statements)
references
References 44 publications
1
39
0
Order By: Relevance
“…To write the confluent Lauricella hypergeometric function Φ 2 (.) in (22) in terms of the FHF, we use the following identity [28, 1.ii, pp. 259]…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…To write the confluent Lauricella hypergeometric function Φ 2 (.) in (22) in terms of the FHF, we use the following identity [28, 1.ii, pp. 259]…”
Section: Discussionmentioning
confidence: 99%
“…is the bivariate FHF. After inserting (23), (24), (25) and (31) in (22) and utilising the definition of the FHF, we obtain (32) that is shown at the bottom of this page in terms of the multiple closed contours R i in the complex r i -plane for i ∈ {1, 2, 3, 4}.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…The absence of secret keys makes it outperform the conventional cryptography technique from the information-theoretic viewpoint. In recent decades, plenty of works have studied the PLS over various fading channels, e.g., Rayleigh [1], Rician (Nakagami-n) [2], Hoyt (Nakagami-q) [3], α − µ [4]- [6], cascaded α − µ [7], κ − µ [8], Lognormal [9], Fisher-Snedecor F [10], generalized-K [11], extended generalized-K (EGK) [12], α − η − κ − µ [13], Málaga [14], etc.…”
Section: Introductionmentioning
confidence: 99%
“…L. Kong, S. Chatzinotas, and B. Ottersten are with the Interdisciplinary Centre for Security Reliability and Trust (SnT), University of Luxembourg, L-1855 Luxembourg (email: {long.kong, symeon.chatzinotas, bjorn.ottersten}@uni.lu) utilizing the Fox's H-function distribution was explored in [12], which provides a unified secrecy analysis framework, and the analytical results therein indicates that simple transformation of the fading channel characteristics in the manner of Fox's H-function distribution can largely encompass the existing works [1], [5]- [7], [10].…”
Section: Introductionmentioning
confidence: 99%