Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Exploiting Impact of Eavesdropping Attacks on Secrecy Performance in WPT-based Secure Multi-hop Transmission

Full metadata record
DC Field Value Language
dc.contributor.authorShim, Kyusung-
dc.contributor.authorAn, Beongku-
dc.date.accessioned2023-09-14T05:40:18Z-
dc.date.available2023-09-14T05:40:18Z-
dc.date.created2023-09-14-
dc.date.issued2023-
dc.identifier.issn2165-8528-
dc.identifier.urihttps://scholarworks.bwise.kr/hongik/handle/2020.sw.hongik/31675-
dc.description.abstractIn this paper, we study the impact of various eaves-dropping attacks on the secrecy performance in wireless power transfer (WPT)-based secure multi-hop transmission. Since each node has a limited power supply, each node harvests energy from the power beacon before data transmission. After then, each node fully consumes the harvested energy for data transmission. Meanwhile, according to the nature of the wireless medium, eavesdroppers can overhear the confidential message at each hop. In order to exploit the relationship between network parameters and secrecy performance, we derive the closed-form expression for secrecy outage probability (SOP) with different eavesdropping attacks, respectively. From the numerical results, we show that the Monte-Carlo simulation and analysis results are tightly matched. Additionally, we evaluate and discuss the impact of the power beacon's transmit power, the number of eavesdroppers, and time switching ratio on the secrecy performance. © 2023 IEEE.-
dc.language영어-
dc.language.isoen-
dc.publisherIEEE Computer Society-
dc.titleExploiting Impact of Eavesdropping Attacks on Secrecy Performance in WPT-based Secure Multi-hop Transmission-
dc.typeArticle-
dc.contributor.affiliatedAuthorAn, Beongku-
dc.identifier.doi10.1109/ICUFN57995.2023.10200146-
dc.identifier.scopusid2-s2.0-85169295814-
dc.identifier.bibliographicCitationInternational Conference on Ubiquitous and Future Networks, ICUFN, v.2023-July, pp.392 - 397-
dc.relation.isPartOfInternational Conference on Ubiquitous and Future Networks, ICUFN-
dc.citation.titleInternational Conference on Ubiquitous and Future Networks, ICUFN-
dc.citation.volume2023-July-
dc.citation.startPage392-
dc.citation.endPage397-
dc.type.rimsART-
dc.type.docTypeConference paper-
dc.description.journalClass1-
dc.description.journalRegisteredClassscopus-
dc.subject.keywordAuthorEavesdropping attack-
dc.subject.keywordAuthormulti-hop transmission-
dc.subject.keywordAuthorphysical layer security-
dc.subject.keywordAuthorwireless power transfer-
Files in This Item
There are no files associated with this item.
Appears in
Collections
Graduate School > Software and Communications Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher An, Beongku photo

An, Beongku
Graduate School (Software and Communications Engineering)
Read more

Altmetrics

Total Views & Downloads

BROWSE