On Secrecy Analysis for D2D Networks over ff α-μ Fading Channels with Randomly Distributed Eavesdroppers

被引:0
作者
Kong, Long [1 ]
Kaddoum, Georges [1 ]
Vuppala, Satyanarayana [2 ]
机构
[1] Univ Quebec, ETS, Dept Elect Engn, Montreal, PQ, Canada
[2] Univ Luxembourgh, Luxembourg, Luxembourg
来源
2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS) | 2018年
关键词
Physical layer security; alpha-mu fading; Poisson distributed eavesdropper; k-th best eavesdropper; SECURITY;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we study the behavior of legitimate device-to-device (D2D) transmission links when intercepted by randomly distributed eavesdroppers. To account for both large-scale and small-scale alpha-mu signal fading at the same time, the k-th best eavesdropper is introduced, which is modelled via a path-loss process with small-scale fading. In order to assess the mathematical representation of the interception behavior, as well as the outage event, the probability of interception P-int and the secrecy outage probability P-out are consequently targeted in the context of this paper. The probability density function (PDF) and the cumulative distribution function (CDF) of the received signal-to-noise ratio (SNR) for the k-th best eavesdropper are first computed. Benefiting from the obtained PDF and CDF, P-int and P-out are thereafter derived and fit into a closed-form expression in terms of the univariate and bivariate Fox's H-functions, respectively. Finally, Monte-Carlo simulation outcomes are provided for the purpose of verifying the precision of our analytical results. Moreover, the effects of the density of eavesdroppers, the fading parameters and the path-loss exponent on the probability of interception are also explored. Interestingly, the conceptual proposal of the k-th best eavesdropper is proved to be comprehensive, and the legitimate D2D link is largely threatened by the 1-st best eavesdropper.
引用
收藏
页数:6
相关论文
共 20 条
  • [1] [Anonymous], 2014, Table of Integrals, Series, and Products, DOI DOI 10.1016/B978-0-12-384933-5.00009-6.URL
  • [2] [Anonymous], 2000, WAFO MATL TOOLB AN R
  • [3] Wireless information-theoretic security
    Bloch, Matthieu
    Barros, Joao
    Rodrigues, Miguel R. D.
    McLaughlin, Steven W.
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) : 2515 - 2534
  • [4] Secrecy Outage Analysis for Downlink Transmissions in the Presence of Randomly Located Eavesdroppers
    Chen, Gaojie
    Coon, Justin P.
    Di Renzo, Marco
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (05) : 1195 - 1206
  • [5] Debnath L., 2014, INTEGRAL TRANSFORMS, V3
  • [6] Haenggi M., 2012, Stochastic Geometry for Wireless Networks
  • [7] Hui Lei, 2017, 2017 IEEE International Conference on Pervasive Computing and Communications (PerCom), DOI 10.1109/PERCOM.2017.7917844
  • [8] Jeong Y., 2014, IEEE Trans. Wireless Commun, V13, P1
  • [9] Performance analysis of physical layer security over α-μ fading channel
    Kong, L.
    Tran, H.
    Kaddoum, G.
    [J]. ELECTRONICS LETTERS, 2016, 52 (01) : 45 - 46
  • [10] Kong L., IEEE COMMUN LETT