2021
DOI: 10.1109/jsyst.2020.3007434
|View full text |Cite
|
Sign up to set email alerts
|

Secrecy Outage Analysis of Multiuser Downlink Wiretap Networks With Potential Eavesdroppers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 8 publications
0
4
0
Order By: Relevance
“…The eavesdropping attack scenario in which a malicious device attempts to overhear a private message between legitimate devices is constantly being considered as an important security issue in the literature [ 14 ]. Eavesdropping scenarios with the PLS can be classified into three scenarios: passive, active, and potential eavesdropping scenarios [ 15 , 16 , 17 , 18 , 19 , 20 , 21 , 22 , 23 ]. A passive eavesdropper (EVE) always attempts to overhear the private message and does not take any other proactive actions [ 15 , 16 , 17 , 18 , 19 ].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…The eavesdropping attack scenario in which a malicious device attempts to overhear a private message between legitimate devices is constantly being considered as an important security issue in the literature [ 14 ]. Eavesdropping scenarios with the PLS can be classified into three scenarios: passive, active, and potential eavesdropping scenarios [ 15 , 16 , 17 , 18 , 19 , 20 , 21 , 22 , 23 ]. A passive eavesdropper (EVE) always attempts to overhear the private message and does not take any other proactive actions [ 15 , 16 , 17 , 18 , 19 ].…”
Section: Introductionmentioning
confidence: 99%
“…By contrast, an active EVE not only attempts to overhear the private message, but also induces some malfunction, such as artificial noise, a jamming attack, pilot contamination, or fake information feedback [ 16 , 17 ]. The concept of the potential EVE was introduced in [ 20 , 21 , 22 , 23 ]. The term potential is used in the sense that the EVEs may operate as legitimate devices in some instances.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Recently, physical-layer security has also been extended to multi-user MIMO channels [22,27,28]. But most existing works only consider noise to evaluate secrecy capacity of multi-user networks and there is still a lack of fine-grained investigation of interference impact on network secrecy [19,22,29].…”
Section: Introductionmentioning
confidence: 99%