Citation Export
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Son, Woong | - |
| dc.contributor.author | Oh, Minkyu | - |
| dc.contributor.author | Yu, Heejung | - |
| dc.contributor.author | Jung, Bang Chul | - |
| dc.date.issued | 2025-04-01 | - |
| dc.identifier.issn | 2352-8648 | - |
| dc.identifier.uri | https://aurora.ajou.ac.kr/handle/2018.oak/38212 | - |
| dc.identifier.uri | https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=105001501421&origin=inward | - |
| dc.description.abstract | Recently, wireless security has been highlighted as one of the most important techniques for 6G mobile communication systems. Many researchers have tried to improve the Physical-Layer Security (PLS) performance such as Secrecy Outage Probability (SOP) and Secrecy Energy-Efficiency (SEE). The SOP indicates the outage probability that the data transmission between legitimate devices does not guarantee a certain reliability level, and the SEE is defined as the ratio between the achievable secrecy-rate and the consumed transmit power. In this paper, we consider a Multi-User Multi-Input Single-Output (MU-MISO) downlink cellular network where a legitimate Base Station (BS) equipped with multiple transmit antennas sends secure information to multiple legitimate Mobile Stations (MSs), and multiple potential eavesdroppers (EVEs) equipped with a single receive antenna try to eavesdrop on this information. Each potential EVE tries to intercept the secure information, i.e., the private message, from the legitimate BS to legitimate MSs with a certain eavesdropping probability. To securely receive the private information, each legitimate MS feeds back its effective channel gain to the legitimate BS only when the effective channel gain is higher than a certain threshold, i.e., the legitimate MSs adopt an Opportunistic Feedback (OF) strategy. In such eavesdropping channels, both SOP and SEE are analyzed as performance measures of PLS and their closed-form expressions are derived mathematically. Based on the analytical results, it is shown that the SOP of the OF strategy approaches that of a Full Feedback (FF) strategy as the number of legitimate MSs or the number of antennas at the BS increases. Furthermore, the trade-off between SOP and SEE as a function of the channel feedback threshold in the OF strategy is investigated. The analytical results and related observations are verified by numerical simulations. | - |
| dc.description.sponsorship | This work is supported in part by the National Research Foundation of Korea (NRF) funded by the Korea government (MSIT) under Grant NRF-2022R1I1A3073740, in part by the Institute for Information and Communications Technology Promotion (IITP) Grant funded by the Korea Government (MSIP, Development of Cube Satellites Based on Core Technologies in Low Earth Orbit Satellite Communications) under Grant RS-2024-00396992, and in part by Institute of Information & communications Technology Planning & Evaluation (IITP) grant funded by the Korea government (MSIT) (2022-0-00704, Development of 3D-NET Core Technology for High-Mobility Vehicular Service). | - |
| dc.language.iso | eng | - |
| dc.publisher | KeAi Communications Co. | - |
| dc.subject.mesh | Energy | - |
| dc.subject.mesh | Feedback strategies | - |
| dc.subject.mesh | Mobile station | - |
| dc.subject.mesh | Multi input single outputs | - |
| dc.subject.mesh | Multiusers | - |
| dc.subject.mesh | Opportunistic feedback | - |
| dc.subject.mesh | Physical layer security | - |
| dc.subject.mesh | Potential eavesdropper | - |
| dc.subject.mesh | Secrecy energy-efficiency | - |
| dc.subject.mesh | Secrecy outage probabilities | - |
| dc.title | Physical-layer security in MU-MISO downlink networks against potential eavesdroppers | - |
| dc.type | Article | - |
| dc.citation.endPage | 431 | - |
| dc.citation.number | 2 | - |
| dc.citation.startPage | 424 | - |
| dc.citation.title | Digital Communications and Networks | - |
| dc.citation.volume | 11 | - |
| dc.identifier.bibliographicCitation | Digital Communications and Networks, Vol.11 No.2, pp.424-431 | - |
| dc.identifier.doi | 10.1016/j.dcan.2024.02.004 | - |
| dc.identifier.scopusid | 2-s2.0-105001501421 | - |
| dc.identifier.url | https://www.sciencedirect.com/science/journal/23528648 | - |
| dc.subject.keyword | Opportunistic feedback | - |
| dc.subject.keyword | Physical-layer security | - |
| dc.subject.keyword | Potential eavesdroppers | - |
| dc.subject.keyword | Secrecy energy-efficiency | - |
| dc.subject.keyword | Secrecy outage probability | - |
| dc.type.other | Article | - |
| dc.identifier.pissn | 24685925 | - |
| dc.description.isoa | true | - |
| dc.subject.subarea | Hardware and Architecture | - |
| dc.subject.subarea | Computer Networks and Communications | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.