Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

Secrecy outage analysis of double shadowed Rician channels

Secrecy outage analysis of double shadowed Rician channels

For access to this article, please select a purchase option:

Buy article PDF
$19.95
(plus tax if applicable)
Buy Knowledge Pack
10 articles for $120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
Electronics Letters — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

The double shadowed Rician model was recently proposed to describe some realistic physical signal propagation phenomena, where a Rician faded signal is impacted by cascaded shadowing processes. In this Letter, the authors study the outage performance of the double shadowed Rician model. More specifically, they investigate the impact of two different shadowing processes on the secrecy performance by deriving novel and exact expressions for secrecy outage performance metrics. The obtained results reveal the following physical implications: (i) when a Rician faded signal undergoes line-of-sight shadowing, which is further cascaded by another round of composite shadowing, the latter form of shadowing imposes larger impact on the secrecy performance; (ii) the widely investigated concept of ‘protected zone’ to improve the secrecy performance should not be limited to the legitimate transmitter but also extended to the legitimate receiver due to the adverse shadowing effect caused by objects in its vicinity; and (iii) the rate of outage performance degradation grows larger as the shadowings become severe.

References

    1. 1)
      • 9. Poularikas, A.D.: ‘Transforms and applications handbook’ (CRC Press, Boca Raton, FL, USA, 2010).
    2. 2)
    3. 3)
      • 11. Ai, Y., Marthur, A., Cheffena, M., et al: ‘Physical layer security of hybrid satellite-FSO cooperative systems’, Photon. J., 2019, 11, (1).
    4. 4)
    5. 5)
      • 8. Ai, Y., Cheffena, M., Ohtsuki, T., et al: ‘Secrecy performance analysis of wireless sensor networks’, Sensors Lett., 2019, 3, (5), p. 4.
    6. 6)
    7. 7)
    8. 8)
      • 12. Prudnikov, A., Brychov, Y., Marichev, O., et al: ‘Integrals and series volume 3: more special functions’ (Gordon and Breach Sci. Publ., New York, NY, USA, 1986).
    9. 9)
    10. 10)
      • 1. Jameel, F., Wyne, S., Kaddoum, G., et al: ‘A comprehensive survey on cooperative relaying and jamming strategies for physical layer security’, Commun. Surveys Tutor., 2019, doi: 10.1109/COMST.2018.2865607.
    11. 11)
      • 7. Gradshteyn, I.S., Ryzhik, I.M.: ‘Table of integrals, series, and products’ (Academic Press, Burlington, MA, USA, 2007, 7th edn.).
    12. 12)
http://iet.metastore.ingenta.com/content/journals/10.1049/el.2019.0707
Loading

Related content

content/journals/10.1049/el.2019.0707
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address