Exploiting Impact of Eavesdropping Attacks on Secrecy Performance in WPT-based Secure Multi-hop Transmission
- Authors
- Shim, Kyusung; An, Beongku
- Issue Date
- 2023
- Publisher
- IEEE Computer Society
- Keywords
- Eavesdropping attack; multi-hop transmission; physical layer security; wireless power transfer
- Citation
- International Conference on Ubiquitous and Future Networks, ICUFN, v.2023-July, pp.392 - 397
- Journal Title
- International Conference on Ubiquitous and Future Networks, ICUFN
- Volume
- 2023-July
- Start Page
- 392
- End Page
- 397
- URI
- https://scholarworks.bwise.kr/hongik/handle/2020.sw.hongik/31675
- DOI
- 10.1109/ICUFN57995.2023.10200146
- ISSN
- 2165-8528
- Abstract
- In this paper, we study the impact of various eaves-dropping attacks on the secrecy performance in wireless power transfer (WPT)-based secure multi-hop transmission. Since each node has a limited power supply, each node harvests energy from the power beacon before data transmission. After then, each node fully consumes the harvested energy for data transmission. Meanwhile, according to the nature of the wireless medium, eavesdroppers can overhear the confidential message at each hop. In order to exploit the relationship between network parameters and secrecy performance, we derive the closed-form expression for secrecy outage probability (SOP) with different eavesdropping attacks, respectively. From the numerical results, we show that the Monte-Carlo simulation and analysis results are tightly matched. Additionally, we evaluate and discuss the impact of the power beacon's transmit power, the number of eavesdroppers, and time switching ratio on the secrecy performance. © 2023 IEEE.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - Graduate School > Software and Communications Engineering > 1. Journal Articles
![qrcode](https://api.qrserver.com/v1/create-qr-code/?size=55x55&data=https://scholarworks.bwise.kr/hongik/handle/2020.sw.hongik/31675)
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.