Exploiting Impact of Eavesdropping Attacks on Secrecy Performance in WPT-based Secure Multi-hop Transmission
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Shim, Kyusung | - |
dc.contributor.author | An, Beongku | - |
dc.date.accessioned | 2023-09-14T05:40:18Z | - |
dc.date.available | 2023-09-14T05:40:18Z | - |
dc.date.created | 2023-09-14 | - |
dc.date.issued | 2023 | - |
dc.identifier.issn | 2165-8528 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/hongik/handle/2020.sw.hongik/31675 | - |
dc.description.abstract | In this paper, we study the impact of various eaves-dropping attacks on the secrecy performance in wireless power transfer (WPT)-based secure multi-hop transmission. Since each node has a limited power supply, each node harvests energy from the power beacon before data transmission. After then, each node fully consumes the harvested energy for data transmission. Meanwhile, according to the nature of the wireless medium, eavesdroppers can overhear the confidential message at each hop. In order to exploit the relationship between network parameters and secrecy performance, we derive the closed-form expression for secrecy outage probability (SOP) with different eavesdropping attacks, respectively. From the numerical results, we show that the Monte-Carlo simulation and analysis results are tightly matched. Additionally, we evaluate and discuss the impact of the power beacon's transmit power, the number of eavesdroppers, and time switching ratio on the secrecy performance. © 2023 IEEE. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | IEEE Computer Society | - |
dc.title | Exploiting Impact of Eavesdropping Attacks on Secrecy Performance in WPT-based Secure Multi-hop Transmission | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | An, Beongku | - |
dc.identifier.doi | 10.1109/ICUFN57995.2023.10200146 | - |
dc.identifier.scopusid | 2-s2.0-85169295814 | - |
dc.identifier.bibliographicCitation | International Conference on Ubiquitous and Future Networks, ICUFN, v.2023-July, pp.392 - 397 | - |
dc.relation.isPartOf | International Conference on Ubiquitous and Future Networks, ICUFN | - |
dc.citation.title | International Conference on Ubiquitous and Future Networks, ICUFN | - |
dc.citation.volume | 2023-July | - |
dc.citation.startPage | 392 | - |
dc.citation.endPage | 397 | - |
dc.type.rims | ART | - |
dc.type.docType | Conference paper | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scopus | - |
dc.subject.keywordAuthor | Eavesdropping attack | - |
dc.subject.keywordAuthor | multi-hop transmission | - |
dc.subject.keywordAuthor | physical layer security | - |
dc.subject.keywordAuthor | wireless power transfer | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
94, Wausan-ro, Mapo-gu, Seoul, 04066, Korea02-320-1314
COPYRIGHT 2020 HONGIK UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.