2023
DOI: 10.1109/tccn.2023.3270425
|View full text |Cite
|
Sign up to set email alerts
|

Physical Layer Security for Wireless-Powered Ambient Backscatter Cooperative Communication Networks

Abstract: Low power consumption and high spectrum efficiency as the great challenges for multi-device access to Internet-of-Things (IoT) have put forward stringent requirements on the future intelligent network. Ambient backscatter communication (ABcom) is regarded as a promising technology to cope with the two challenges, where backscatter device (BD) can reflect ambient radio frequency (RF) signals without additional bandwidth. However, minimalist structural design of BD makes ABcom security vulnerable in wireless pro… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 47 publications
(56 reference statements)
0
5
0
Order By: Relevance
“…The simulation tool is MATLAB. In the simulations, as shown in Figure 2, a two dimensional network topology is assumed where base station (s), the relays, the backscatter device (b), and the destination (d) are located at the coordinates (−1, 0), (0, 0), (0.5, B y ), and (1, 0), respectively [18,29,30]. The fading variances are assigned by adopting a path loss model of the form λ ij = d −β ij where d ij is the distance between the transmitter node i (s, r 1 , • • • , r K , b) and receiver node j (r 1 , • • • , r K , b, d), and β denotes the path loss factor.…”
Section: Simulation Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…The simulation tool is MATLAB. In the simulations, as shown in Figure 2, a two dimensional network topology is assumed where base station (s), the relays, the backscatter device (b), and the destination (d) are located at the coordinates (−1, 0), (0, 0), (0.5, B y ), and (1, 0), respectively [18,29,30]. The fading variances are assigned by adopting a path loss model of the form λ ij = d −β ij where d ij is the distance between the transmitter node i (s, r 1 , • • • , r K , b) and receiver node j (r 1 , • • • , r K , b, d), and β denotes the path loss factor.…”
Section: Simulation Resultsmentioning
confidence: 99%
“…", and "Asy." denote the simulated results, the analytical results and the asymptotic results, respectively, and "React, BL", "Proact, BL", "React, CL", and "Proact, CL" denote the OP of backscatter link for the reactive RSS (21), the OP of backscatter link for the proactive RSS (29), the OP of cellular link for the reactive RSS (25), and the OP of cellular link for the proactive RSS (32), respectively. Additionally, the labels "Con React" and "Con Proact" in these figures stand for the OP of backscatter link for the conventional proactive RSS, i.e., r k * = arg max r k ∈R min{γ sr k , γ r k d }, and conventional reactive RSS, i.e., r k * = arg max…”
Section: Simulation Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…Sun et al in [6] investigated the security on κ-µ shadowed distribution as far as security outage probability (SOP) and strictly positive security capacity (SPSC). Through deriving the accurate formulas of SOP and secrecy energy efficiency, the authors in [7] analyzed the security problems of backscatter collaborative communication systems threatened by eavesdroppers. The security of multi-relay models were explored from two aspects of outage probability (OP) and intercept probability (IP) [8].…”
Section: Introductionmentioning
confidence: 99%