Next Article in Journal
Finite-Length Analysis for Spatially Coupled LDPC Codes Based on Base Matrix
Previous Article in Journal
Deriving Vocal Fold Oscillation Information from Recorded Voice Signals Using Models of Phonation
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Security- and Reliability-Guaranteed Transmission Control of Time-Sensitive Physical Layer Security Systems

1
School of Electronic and Information Engineering, Nanjing University of Information Science and Technology, Nanjing 210044, China
2
School of Electronic and Information Engineering, Anhui Jianzhu University, Hefei 230009, China
*
Author to whom correspondence should be addressed.
Entropy 2023, 25(7), 1040; https://doi.org/10.3390/e25071040
Submission received: 29 May 2023 / Revised: 29 June 2023 / Accepted: 6 July 2023 / Published: 11 July 2023
(This article belongs to the Section Information Theory, Probability and Statistics)

Abstract

:
In this paper, we consider information transmission over a three-node physical layer security system. Based on the imperfect estimations of the main channel and the eavesdropping channel, we propose reducing the outage probability and interception probability by hindering transmissions in cases where the main channel is too strong or too weak, which is referred to as an SNR-gated transmission control scheme. Specifically, Alice gives up its chance to transmit a packet if the estimated power gain of the main channel is smaller than a certain threshold so that possible outages can be avoided; Alice also becomes silent if the estimated power gain is larger than another threshold so that possible interceptions at Eve can be avoided. We also consider the timeliness of the network in terms of the violation probability of the peak age of information (PAoI). We present the outage probability, interception probability, and PAoI violation probability explicitly; we also investigate the trade-off among these probabilities, considering their weight sum. Our numerical and Monte Carlo results show that by using the SNR-gated transmission control, both the outage probability and the interception probability are reduced.

1. Introduction

In recent years, with the wide development of wireless communications, privacy and security in wireless communication networks are receiving increased attention. The main reason is that, due to the broadcasting nature of wireless transmissions, the communication between legitimate users is vulnerable to eavesdropping by malicious third parties. To enhance security, many encryption schemes have been proposed to improve the security of wireless communications. However, these encryption schemes inevitably increase the overhead of communications [1,2]. The encryption and decryption processes also require more processing resources, which impair the timeliness of the information deliveries.
In order to address security concerns, physical layer security has been proposed as a promising technology for ensuring secure wireless communications. Note that wireless channels suffer from random fading and noises. These physical characteristics can be used to encrypt the information under transmission by reducing the amount of data that can be accessed by potential eavesdropping nodes. In [3], Wyner extended Shannon’s cryptosystem in the framework of information theory in 1975. Wyner proposed the security capacity concept to evaluate the information rate that could be reliably and securely transmitted over a wireless channel. He concluded that when the eavesdropping channel quality is poorer than that of the primary channel, there exists a coding method that can provide reliable communication for the legitimate user while making it impossible for a malicious eavesdropper to decode any useful information from the captured signal. Specifically, when the instantaneous capacity of the eavesdropping channel from the source node to the eavesdropping node is smaller than the rate of the transmitted codeword, the eavesdropping node is unable to decode the source node information; thus, the legitimate transmission remains secure. However, if the instantaneous capacity of the eavesdropping channel is higher than the rate of the source codewords, the eavesdropping node would be able to successfully decode the source node’s codewords. In this case, an interception event occurs. Thus, we can reduce the interception probability and improve the security level by increasing the coding rate of the source. Nevertheless, the probability of outages (i.e., when the instantaneous capacity of the main channel is smaller than the coding rate of the source) decreases with the coding rate. In light of this contradiction, the optimal trade-off between the security and the reliability of physical layer communication has been widely investigated in [4]. Previous works, e.g., [5,6], also presented many meaningful results in the field of physical layer security. However, few works have demonstrated the ability to reduce these issues at the same time.
For communication systems, we need to consider the reliability and security of the system as well as the timeliness of communications. In previous works, the delay was widely used to measure the timeliness of communications. Recently, the emergence of AoI [7] has become a better option for precisely measuring timeliness. Specifically, the average AoI and peak AoI of systems are often used to describe the performances of real-time systems. For systems gathering information and providing status updates, however, more stringent timeliness is required. Thus, more researchers are measuring timeliness with the AoI violation probability instead of the mean AoI and peak AoI. The AoI violation probability was defined in [8] to highlight the potential damage caused by very large ages. For a single source single destination system with an FCFS serving policy, the explicit AoI violation probability has been studied in [9]. The violation probability of the peak AoI in wireless communication systems, considering practical physical layer constraints, was investigated in [10]. An approximate closed expression of the outage probability of the peak AoI exceeding a certain threshold was presented in [11]. In this paper, we investigate the timeliness of the system in terms of the violation probability of peak AoI as a measure of communication timeliness.

1.1. Motivations

Due to the contradiction between the outage probability and the interception probability, we are motivated to consider the following problem.
Can we design a transmission mechanism that simultaneously reduces the outage probability and the interception probability to some extent?
In this paper, we propose an SNR-gated transmission control for the source node. Specifically, the proposed method improves performance by hindering packet transmissions in slots when an outage or an interception is expected to occur. Specifically, Alice gives up its chance to transmit a packet if the estimated power gain of the main channel is smaller than a certain threshold so that possible outages can be avoided. We also consider the timeliness of transmissions in terms of the probability of peak AoI. By using a weighted sum function of the outage probability, the interception probability, and the violation probability of the peak AoI, we are able to know how these metrics vary with the transmitting power and arrival rate of the source node.

1.2. Related Works

Most of the existing studies on physical layer security assume that the legitimate receivers have perfect estimations of channel conditions. Since the channel estimations are often not error-free, this assumption is not very practical. In fact, channel estimation errors exist in both legitimate receivers and eavesdroppers [12,13,14]. In most channel estimation techniques, the channel state information (CSI) is obtained through a transmitted signal in the guided frequency band. However, it is usually difficult or impossible for the transmitter to know the state of the channel to the eavesdropper through estimations. In [12], it was shown that the errors in the channel estimation decrease the traversal secrecy rate. In [14], the authors investigated the optimal power allocation for artificial noise in the secure transmission, which considers the effect of the imperfect CSI on legitimate receivers.
In physical layer security-related research, errors in channel estimation reduce both the reliability and security of the system. Moreover, the correlation between the main and eavesdropping channels can also have a significant impact on system reliability and security. Most researchers assumed independent premises for the main and eavesdropping channels [15]. In actual radio environments, the proximity between the legitimate receiver and eavesdropper, along with similar surrounding scatterers, can cause a high correlation between the received signals of the two receivers. Some research has shown that this correlation can improve performance under certain conditions [16,17,18]. However, the results in [16] indicate that this correlation causes a loss in traversal secrecy capacity. Nonetheless, a strong channel correlation does not necessarily indicate a high probability of communication disruption. Reference [17] proposed that the correlation impact on the system security performance is not singular but is related to various factors, such as the average signal-to-noise ratio at the receiver, the channel gain ratio, and the set target rate.
In this paper, we propose an SNR-gated transmission control scheme for a three-node system accounting for channel estimation error and correlation between the main and eavesdropping channels. We use the outage probability as a measure of system reliability, and the interception probability as a measure of system security. With these metrics, we investigate the performances of systems with and without the SNR-gated transmission control, and with saturated or unsaturated traffic input, respectively. We also investigate the trade-off among these metrics through a weighted-sum function. By using some mathematical tools, the minimum weighted sum can be found efficiently.

1.3. Main Contributions

The contributions of this paper are summarized as follows.
(1)
We propose a novel SNR-gated transmission control scheme to reduce the outage probability and the interception probability at the same time. By hindering transmissions with possible outages and interceptions, the power consumption of the system is also reduced, which further enhances the timeliness of the system.
(2)
We consider the performances of systems with unsaturated traffic input, which is more realistic in practical engineering.
(3)
We present the outage probability, the interception probability, and peak AoI violation probability explicitly, which are essential for improving and optimizing the reliability, safety, and timeliness of the system.

1.4. Organization

The rest of the paper is organized as follows. We present the transmission model for wireless networks in Section 2. In Section 3, we present the proposed SNR-gated transmission control scheme and derive the outage probability, the interception probability, and the violation probability of peak AoI in closed form. The Monte Carlo simulation and numerical results are presented in Section 4. Finally, we present our conclusions in Section 5.

2. System Model

We consider a wireless network wherein Alice transmits confidential information to Bob, while a third party (Eve) attempts to eavesdrop on this confidential information, as shown in Figure 1. We denote the received signals at Bob and Eve, respectively, as y i = P h b , i x i + n b , i , z i = P h e , i x i + n e , i . We denote the average transmit power of Alice as P. We assume that the channels suffer from block Rayleigh fading and additional white Gaussian noise. Thus, the channel gain coefficients ( h b and h e ) are zero-mean Gaussian random variables, while the noises ( n b and n e ) are independent complex Gaussian random variables with zero mean and variances ( N b 2 and N e 2 ). We denote the distance between Alice and Bob as d b , the distance between Alice and Eve as d e , and the path loss factor as α . The instantaneous received signal-to-noise ratio at Bob and Eve can be expressed as γ b = | h b | 2 P t d b α N b 2 , γ e = | h e | 2 P t d e α N e 2 .
We denote the signal bandwidth as W. Thus, the instantaneous capacities of the main channel and eavesdropping channel are given, respectively by:
C b = W b log 2 ( 1 + γ b ) C e = W e log 2 ( 1 + γ e ) .

2.1. Channel Estimation

We estimate the fading gain of the channel by using an MMSE estimator during the guided frequency transmission period [19]. The estimation of Bob’s channel gain and the estimation error are denoted by h ^ b and h ˜ b , respectively. Thus, we have,
h b = h ^ b + h ˜ b .
We assume that h ^ b and h ˜ b are independent zero-mean complex Gaussian random variables, and have [20]
E h b 2 = E h ˜ b 2 + E h ^ b 2 .
As we know in [21], the estimation error of the channel coefficient error variance is β b = σ h ˜ b 2 = 1 1 + P p , where P p is the pilot power. We denote the estimated SNR at Bob as γ ^ b = P t | h ^ b | 2 d b α N b 2 and γ ˜ b = P t | h ˜ b | 2 d b α N b 2 , both of which are exponentially distributed given by random variables with the pdf:
f γ ^ b ( γ ^ b ) = d b α N b 2 P t ( 1 β ) e γ ^ b d b α N b 2 P t ( 1 β ) , γ ^ b > 0 f γ ˜ b ( γ ˜ b ) = d b α N b 2 P t β e γ ˜ b d b α N b 2 P t β , γ ˜ b > 0 .
Due to the estimation errors, the actual instantaneous SNR at Bob can be expressed as a function of the estimated SNR and the SNR error [22]:
γ b = P t h ^ b 2 P t h ˜ b 2 + 1 = γ ^ b γ ˜ b + 1 .

2.2. Channel Correlation Coefficient

Since Bob and Alice are closely located, the main channel and the eavesdropping channel would be correlated. Thus, the channel gain coefficient between Alice and Eve can be expressed as in [23]:
h A E = ξ A E h b + 1 ξ A E 2 h e .
In Equation (6), h A E is the channel gain coefficient of the main channel. h b and h e are zero-mean Gaussian random variables that are independently and identically distributed. Parameter ξ A E represents the correlation coefficient between the gain of the main channel and the eavesdropping channel. Moreover, the signal received by Eve can be expressed as y i = P h A E x i + n E , i , where n E , i represents the additive white Gaussian noise at the eavesdropper’s receiver. Thus, the SNR at Eve can also be expressed as follows:
γ e = P t d e 2 N e 2 ξ A E 2 h b 2 + ( 1 ξ A E 2 ) h e 2 .

2.3. Traffic Model

In most previous studies, it was assumed that Alice always had packets to transmit (i.e., the saturated traffic model), so that the probability of the unsuccessful packet reception equals the probability that the channel gain is smaller than a certain threshold. In practical implementations, we need to consider the unsaturated traffic model instead. Specifically, the unsaturated model and the saturated model are explained as follows.
  • Saturated traffic model: The next packet arrives immediately when the transmission of the previous packet is complete so that Alice always has packets to transmit.
  • Unsaturated traffic model: The packets are generated according to a certain random process. Thus, there are slots where Alice does not have a packet to transmit. In this paper, we assume that the packets arrive with a geometric process with parameter λ . That is, Alice has a new packet with a probability λ in each slot. Thus, the average inter-arrival time would be E [ X k ] = 1 λ .

2.4. Reliability and Safety Metrics

We denote the code word transmission rate as R b and the confidential message rate as R s . If the main channel capacity is less than the data rate R b , an outage event occurs. That is, the outage probability is given by:
P out = Pr ( C b < R b ) .
Since the transmission of a packet is successful with probability μ = 1 P out (no outage occurs), the service time of a packet (i.e., the number of slots to transmit a packet to Bob successfully) follows a geometric distribution with parameter μ . That is,
Pr { S = j } = ( 1 μ ) j 1 μ .
Thus, we have E [ S ] = 1 μ .
We denote the cost of protecting message transmissions from eavesdropping as R e = R b R s . If the capacity of the eavesdropping channel satisfies C e > R e , Eve will be able to decode the message and an interception event occurs. Thus, the interception probability of the eavesdropping channel is given by:
P int = Pr ( C e > R e ) .
Note that both the above-mentioned outage probability and interception probability are probabilities conditioned on the fact that there are always enough messages for transmission. That is:
P out = Pr ( C b < R b | Saturation ) P int = Pr ( C e > R e | Saturation ) .

2.5. Violation Probability of Peak AoI

The AoI of the system is defined as the length of the period between the current time and the time at which the latest received update is generated. Thus, a smaller AoI indicates fresher information. At the moment t, AoI is expressed as [7]:
Δ ( t ) = t r ( t ) ,
wherein r(t) is the timestamp of the latest update received at the receiver at time t. The peak AoI is defined as the age of a packet at the time it is received [24], i.e.,
Δ p ( t ) = Y k + T k 1 ,
wherein Y k is the inter-departure time and T k 1 is the system time of the packet.

3. SNR-Gated Transmission

In order to reduce the outage probability and the interception probability simultaneously, we propose an SNR-gated transmission control scheme in this section. Note that an outage might occur when the main channel is poor while an interception may occur if the main channel is relatively strong. Therefore, it is reasonable to control the transmission of Alice, and only perform transmission in slots where the estimated SNR of the main channel is neither too small nor too large. Figure 2 shows the transmission process of data packets under the SNR-gated transmission control.
Specifically, when the packet obtains its chance to be transmitted, we shall check if the estimated SNR of the main channel falls into the desired range ( V T 1 , V T 2 ) . If yes, the packet will be transmitted. If not, the packet needs to wait and will be retransmitted in the next time slot. When the packet is transmitted in the current slot, an outage can still possibly occur, in which case, the packet will be retransmitted in the next time slot. A packet is considered as successfully transmitted only if no outage occurs.

3.1. Outage Probability

3.1.1. Outage Probability under Saturated Model

We denote the lower and upper SNR thresholds of the control scheme as V T 1 and V T 2 . That is, Alice performs a transmission if and only if the estimated SNR satisfies V T 1 < γ ^ b < V T 2 . In other cases, the packet will not be transmitted; thus the probability of outage and interception is reduced. First, the outage probability of the saturated model is given by the following proposition.
Proposition 1. 
Regarding saturated transmission, the outage probability is expressed as follows:
P ^ out . s = Pr { C b < R b | V T 1 < γ ^ b < V T 2 } Pr { V T 1 < γ ^ b < V T 2 } = e V T 1 W 1 N 1 d 1 α P t ( 1 β ) e V T 2 W 1 N 1 d 1 α P t ( 1 β ) · e W 1 N 1 d 1 α ( V T 2 k 1 ) P t β + e W 1 N 1 d 1 α ( V T 1 k 1 ) P t β e W 1 N 1 d 1 α ( V T 2 k 1 ) P t β · e V T 1 W 1 N 1 d 1 α P t ( 1 β ) 1 β k β + 1 β e k W 1 N 1 d 1 α P t ( 1 β ) · ( e W 1 N 1 d 1 α ( V T 1 k 1 ) ( k β + 1 β ) P t β ( 1 β ) e W 1 N 1 d 1 α ( V T 2 k 1 ) ( k β + 1 β ) P t β ( 1 β ) ) .
Proof. 
See Appendix A.1. □

3.1.2. Outage Probability under the Unsaturated Model

Second, in the unsaturated model, Alice does not have any transmission slot with probability λ μ . The corresponding actual outage probability is given by the following proposition.
Proposition 2. 
Regarding unsaturated transmissions, the outage probability is expressed as follows:
P ^ out . us = Pr { C b < R b | V T 1 < γ ^ b < V T 2 } Pr { V T 1 < γ ^ b < V T 2 } μ λ = e V T 1 W 1 N 1 d 1 α P t ( 1 β ) e V T 2 W 1 N 1 d 1 α P t ( 1 β ) · e W 1 N 1 d 1 α ( V T 2 k 1 ) P t β + e W 1 N 1 d 1 α ( V T 1 k 1 ) P t β e W 1 N 1 d 1 α ( V T 2 k 1 ) P t β · e V T 1 W 1 N 1 d 1 α P t ( 1 β ) 1 β k β + 1 β e k W 1 N 1 d 1 α P t ( 1 β ) · ( e W 1 N 1 d 1 α ( V T 1 k 1 ) ( k β + 1 β ) P t β ( 1 β ) e W 1 N 1 d 1 α ( V T 2 k 1 ) ( k β + 1 β ) P t β ( 1 β ) ) μ λ .
Proof. 
See Appendix A.2. □
From Appendix A.2, the load factor plays a crucial role in the unsaturated transmission scenario.

3.2. Interception Probability

3.2.1. Interception Probability under Saturated Model

Since we determine whether to transmit a packet based on the estimated SNR of the main channel, we will define and derive the interception probability of the system as follows.
Proposition 3. 
In saturated transmissions, the interception probability can be expressed as follows:
P ^ int . s = Pr { C e > R e | V T 1 < γ ^ b < V T 2 } Pr { V T 1 < γ ^ b < V T 2 } = e V T 1 W 1 N 1 d 1 α P t ( 1 β ) e V T 2 W 1 N 1 d 1 α P t ( 1 β ) · e W 2 N 2 d 2 α ( V T 2 k 2 ) P t σ e + e W 2 N 2 d 2 α V T 1 P t β k 2 e W 2 N 2 d 2 α V T 2 P t β k 2 · e V T 1 W 1 N 1 d 1 α P t ( 1 β ) 1 β k σ e + 1 β · ( e W 2 N 2 d 2 α ( V T 1 k ) ( k σ e + 1 β ) P t σ e ( 1 β ) e W 1 N 1 d 1 α ( V T 2 k ) ( k σ e + 1 β ) P t σ e ( 1 β ) ) .
Proof. 
See Appendix A.3. □
Equation (16) indicates that the transmission of data through the channel is determined by the channel quality of the main channel. As the system is fully saturated in terms of transmission, the probability of the packet being intercepted in the channel is the probability that the capacity of the eavesdropping channel is greater than the secrecy overhead.

3.2.2. Interception Probability under Unsaturated Model

Proposition 4. 
Regarding unsaturated transmissions, the interception probability is expressed as follows:
P ^ int . us = Pr { C e > R e | V T 1 < γ ^ b < V T 2 } Pr { V T 1 < γ ^ b < V T 2 } μ λ = e V T 1 W 1 N 1 d 1 α P t ( 1 β ) e V T 2 W 1 N 1 d 1 α P t ( 1 β ) · e W 2 N 2 d 2 α ( V T 2 k 2 ) P t σ e + e ( W 2 N 2 d 2 α V T 1 P t β k 2 ) e ( W 2 N 2 d 2 α V T 2 P t β k 2 ) · e V T 1 W 1 N 1 d 1 α P t ( 1 β ) 1 β k σ e + 1 β · ( e W 2 N 2 d 2 α ( V T 1 k ) ( k σ e + 1 β ) P t σ e ( 1 β ) e W 1 N 1 d 1 α ( V T 2 k ) ( k σ e + 1 β ) P t σ e ( 1 β ) ) μ λ .
Proof. 
See Appendix A.4. □
Therefore, after our comparative analysis and calculation, we see that, by using the SNR-gated transmission control, the reduction of the possibility of sending packets on the sender side does reduce the outage probability and interception probability. Thus, it satisfies our expectation to improve transmission reliability and security simultaneously.

3.3. Timeliness Analysis

We formulate the transmission over the main channel as a Geom/Geom/1 queuing policy [25] and measure the timeliness of the received packet by Bob by the violation probability of the peak AoI.
Since the traffic models of packets in the channel are different, we will analyze the timeliness in two parts. There are two commonly used packet service policies: the first-come, first-served policy (FCFS) and the last-come, first-served policy (LCFS) [24]. In this paper, we assume that the packets are served according to the FCFS rule. In the unsaturation traffic model, we assume that the state updates are generated according to a geometric process. Thus, both the inter-arrival time X k and service time S k are independent and geometrically distributed random variables, with mean E [ X k ] = 1 λ and E [ S k ] = 1 μ , respectively.
First, if the service of a packet is completed before the arrival of the next packet, the service of the next packet begins immediately upon its arrival. Second, if the service of the current packet is not completed before the next arrives, the arriving packet needs to wait before starting its service. Thus, interval Y k between the departures can be expressed as follows:
Y k = S k , X k T k 1 X k T k 1 + S k , X k T k 1 .
The distribution of the inter-arrival time, the service time, and the system time can be expressed as follows:
Pr ( X k = i ) = λ ( 1 λ ) i 1 , i 1 Pr ( S k = i ) = μ ( 1 μ ) i 1 , i 1 Pr ( T k 1 = i ) = p 0 ( 1 p 0 ) i 1 , i 1 ,
wherein p 0 = 1 μ 1 λ .
We use the violation probability of the peak AoI as the measure of data freshness, which is expressed as follows:
P Δ p ( A T ) = Pr ( Δ p > A T ) ,
where A T is the threshold value of the peak AoI [26].
We compare the service rate before and after using the SNR-gated transmission control. For the transmission without SNR-gated transmission control, since there is no transmission constraints, packets can be sent in each slot, with a successful probability:
μ = 1 P out .
By using our SNR-gated transmission control, we only attempt to transmit a packet when the estimated SNR γ ^ b of the main channel is greater than A T 1 and less than A T 2 . Thus, the service rate of the main channel is:
μ ^ = Pr { send packets } P ^ out . us .
Since SNR-gated transmission control reduces the possibility of transmission, the probability of a successful packet delivery would also be reduced.

3.3.1. Saturation Transmission Model

In this case, the server is loaded at full capacity. Specifically, a new state update arrives precisely when the last update packet leaves the queue. At this point, the inter-departure time Y k is equal to the service time S k . Therefore, we have E [ Y k T k ] = E [ S k 2 ] and E [ X k ] = 1 λ . Thus, we have:
Δ p = Y k + T k 1 = 2 S k .
For the saturated transmission model, the service rate is mainly affected by the SNR-gated transmission control. Since the saturation transmission model generates a new packet immediately when a packet is delivered, the packet arrival rate can be considered as λ = 1 . Thus, we have:
P Δ p = Pr ( Δ p > A T 1 ) = μ ^ A T 1 .

3.3.2. Unsaturated Transmission Model

In the unsaturated transmission model, the server is not fully loaded, so the load factor is not equal to one. In this case, Y k is not equal to S k due to the additional waiting time.
We know that our SNR-gated transmission control mainly changes the service rate to μ ^ . By replacing μ with μ ^ , we have
Proposition 5. 
The violation probability of peak AoI can be expressed explicitly as follows:
P Δ p ( A T ) = μ ^ 2 λ 2 ( 1 μ ^ 1 λ ) A T 2 + ( 1 λ ) A T 2 μ ^ 2 ( μ ^ λ ) 2 .
Proof. 
See Appendix A.5. □

3.4. Joint Optimization of Safety, Reliability, and Timeliness

In this section, we jointly optimize the safety, reliability, and timeliness of the system through a weighted sum function J = η 1 P out + η 2 P int + η 3 P Δ p , wherein η 1 , η 2 , η 3 [ 0 , 1 ] are weighing coefficients and η 1 + η 2 + η 3 = 1 . By using different weights, the performance-oriented aspects of the transmission system are different. For example, when we set η 1 close to unity, the reliability of the system plays the most significant role among the three dimensions. When we require a better timeliness performance, we could set η 3 as close to unity. We can find the optimal solution more intuitively by using the MATLAB construction function. Specifically, the optimization problem of the integrated performance can be expressed as follows:
min P t , λ J = η 1 P ^ out . s + η 2 P ^ int . s + η 3 P ^ Δ p . s s . t , ε 1 P t ε 2 0 λ 1 ,
wherein λ is the updating rate of Alice, [ ε 1 , ε 2 ] is the range of power. In the saturated transmission model, we do not need to consider the optimization over λ since we have λ = 1 . In this case, J can be rewritten as follows:
min P t J = η 1 P ^ out . s + η 2 P ^ int . s + η 3 P ^ Δ p . s s . t , ε 1 P t ε 2 .
Since the above equation is an inequality-constrained optimization problem that satisfies the Karush–Kuhn–Tucker (KKT) condition [27], we will discuss it in the following cases. By setting J P t = 0 , the optimized transmit power P t can be obtained. We simplify P ^ out . s , P ^ int . s , and P ^ Δ p . s , and have the following proposition:
Proposition 6. 
In the saturated transmission model, the optimal transmit power is given by:
(1)
When ε 1 > ln ( ( η 1 η 3 ) + 1 1 ( η 1 η 3 ) η 2 ) ω 2 ω 1 , the optimal solution is P t = ε 1 ;
(2)
When ε 2 > ln ( ( η 1 η 3 ) + 1 1 ( η 1 η 3 ) η 2 ) ω 2 ω 1 , the optimal solution is P t = ε 2 ;
(3)
When ε 1 < ln ( ( η 1 η 3 ) + 1 1 ( η 1 η 3 ) η 2 ) ω 2 ω 1 < ε 2 , the optimal solution is P t = ln ( ( η 1 η 3 ) + 1 1 ( η 1 η 3 ) η 2 ) ω 2 ω 1 ,
wherein ω 1 is V T 1 W 1 N 1 d 1 α 1 β and ω 2 is V T 2 W 1 N 1 d 1 α 1 β .
Proof. 
See Appendix A.6. □

4. Simulation Results

In this section, we evaluate the safety, reliability, and timeliness of the system through the simulation results. We set the main channel bandwidth as W 1 = 10 7 Hz, the eavesdropping channel bandwidth as W 2 = 10 7 Hz, the distance between Alice and Bob as d 1 = 200 m, and the distance between Alice and Eve as d 2 = 150 m. We set the main channel noise power spectral density as N 1 = 4 × 10 12 W and the eavesdropping channel noise power spectral density as N 2 = 4 × 10 12 W. The main channel Rayleigh channel parameter λ 1 is set to 4 and the path loss factor α is set to 2 [28]. To verify the obtained theoretical (TH) results, we also performed corresponding Monte Carlo (MC) simulations. Specifically, we set the simulation time to 10,000 s and block spacing to 10 3 . We assume that the main channel and the eavesdropping channel are correlated.
In Figure 3, we compare the interception probabilities and outage probabilities with and without using the SNR-gated transmission control scheme. From the figure, we can see that the outage probability decreases with the increase in transmit power P t . More importantly, both the outage probability and interception probability are significantly decreased when the SNR-gated transmission control scheme is used. Therefore, we can conclude that the SNR-gated transmission control scheme can effectively improve reliability and safety simultaneously.
In Figure 4, we investigate the correlation between the transmitted power and the probability of peak AoI violation in the saturated model with SNR-gated transmission control. It is seen that as the transmission power increases, the probability of peak AoI violation decreases. By reducing the threshold of violation, the probability of peak AoI violation also decreases. This is due to the fact that increasing the threshold results in a smaller probability for the peak AoI exceeding the threshold.
Figure 5 shows how the violation probability of peak AoI varies with the packet arrival rate λ under the unsaturated traffic model. We observe that the violation probability decreases first and then increases. However, the peak AoI violation probability is larger than when the SNR-gated transmission control scheme is not used. This is because many transmissions are stopped, which leads to a lower service rate and, thus, degrades the timeliness.
In Figure 6, we present a three-dimensional graph of the weighted sum of the outage probability, interception probability, and PAoI violation probability. The x-axis represents the transmit power, the y-axis represents the arrival rate λ , and the z-axis represents the weighted sum of the three probabilities J. It is observed that the weighted sum has a bowl-shaped structure with a minimum point when the transmit power and the arrival rate are neither too small nor too large. This optimal point can be calculated through numerical computation.

5. Conclusions

In this paper, we investigate the security, reliability, and timeliness of a three-node physical layer security system, where the main channel and the eavesdropping channel are correlated. We propose an SNR-gated transmission control scheme and derive closed-form expressions for the outage probability, interception probability, and peak AoI violation probability. Our analysis and numerical results demonstrate the effectiveness of the proposed SNR-gated transmission control scheme; we explicitly derive the probabilities of data outage and interception while enhancing timeliness through the control of the data arrival rate. Moreover, we optimize the transmit power of the source node to minimize the weighted sum probability of outages, interceptions, and peak AoI violations. In the future, we plan to study the system with the adaptive rate, which is an interesting direction, as well as explore the eavesdropping channel model with relay nodes, which is another interesting research direction.

Author Contributions

Conceptualization, Y.D.; methodology, J.L. and Y.D.; writing—original draft preparation, J.L.; writing—review and editing, Y.D and C.P. All authors have read and agreed to the published version of the manuscript.

Funding

The work of Y. Dong was supported by the National Natural Science Foundation of China (NSFC) under grant 62071237. The work of C. Pan was supported by the National Natural Science Foundation of China (NSFC) under grant 61931004.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

The authors would like to thank the editors and the reviewers for their insightful comments and suggestions, which resulted in substantial improvements to this work.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Appendix A.1. Proof of Proposition 1

For the actual outage probability of packets in the channel under saturated transmission, we provide the following proof:
The actual outage probability event is the product of events, where the main channel capacity is less than the encoding rate and events where data can be transmitted.
P ^ out . s = Pr { C b < R b | V T 1 < γ ^ b < V T 2 } P s u c = Pr { W 1 log 2 ( 1 + γ b ) < R b | V T 1 < γ ^ b < V T 2 } P s u c = Pr { W 1 log 2 ( 1 + γ ^ b γ ˜ b + 1 ) < R b | V T 1 < γ ^ b < V T 2 } P s u c = Pr { V T 1 < γ ^ b < min ( k ( γ ˜ b + 1 ) , V T 2 ) }
Since γ ^ b follows an exponential distribution, we can perform the following integration operations:
= V T 1 k 1 V T 2 k 1 f ( γ ˜ b ) d ( γ ˜ b ) V T 1 k ( γ ˜ b + 1 ) f ( γ ^ b ) d ( γ ^ b ) + V T 2 k 1 + f ( γ ˜ b ) d ( γ ˜ b ) V T 1 V T 2 f ( γ ^ b ) d ( γ ^ b ) = e V T 1 W 1 N 1 d 1 α P t ( 1 β ) e V T 2 W 1 N 1 d 1 α P t ( 1 β ) · e W 1 N 1 d 1 α ( V T 2 k 1 ) P t β + e W 1 N 1 d 1 α ( V T 1 k 1 ) P t β e W 1 N 1 d 1 α ( V T 2 k 1 ) P t β · e V T 1 W 1 N 1 d 1 α P t ( 1 β ) 1 β k β + 1 β e k W 1 N 1 d 1 α P t ( 1 β ) · ( e W 1 N 1 d 1 α ( V T 1 k 1 ) ( k β + 1 β ) P t β ( 1 β ) e W 1 N 1 d 1 α ( V T 2 k 1 ) ( k β + 1 β ) P t β ( 1 β ) ) ,
wherein k = 2 R b W 1 1 and Pr { V T 1 < γ ^ b < V T 2 } P s u c .

Appendix A.2. Proof of Proposition 2

For the actual outage probability of packets in the channel under unsaturated transmission, we provide the following proof:
P ^ out . us = Pr { C b < R b | V T 1 < γ ^ b < V T 2 } P s u c μ λ = Pr { W 1 log 2 ( 1 + γ b ) < R b | V T 1 < γ ^ b < V T 2 } P s u c μ λ = Pr { W 1 log 2 ( 1 + γ ^ b γ ˜ b + 1 ) < R b | V T 1 < γ ^ b < V T 2 } P s u c μ λ = e V T 1 W 1 N 1 d 1 α P t ( 1 β ) e V T 2 W 1 N 1 d 1 α P t ( 1 β ) · e W 1 N 1 d 1 α ( V T 2 k 1 ) P t β + e W 1 N 1 d 1 α ( V T 1 k 1 ) P t β e W 1 N 1 d 1 α ( V T 2 k 1 ) P t β · e V T 1 W 1 N 1 d 1 α P t ( 1 β ) 1 β k β + 1 β e k W 1 N 1 d 1 α P t ( 1 β ) · ( e W 1 N 1 d 1 α ( V T 1 k 1 ) ( k β + 1 β ) P t β ( 1 β ) e W 1 N 1 d 1 α ( V T 2 k 1 ) ( k β + 1 β ) P t β ( 1 β ) ) μ λ ,
where k = 2 R b W 1 1 .

Appendix A.3. Proof of Proposition 3

For the actual interception probability of packets in the channel under saturated transmission, we provide the following proof:
The actual interception probability event is a product of the events where the eavesdropping channel capacity is greater than the encoding rate (which aims to prevent eavesdropping) and the events where data can be transmitted.
P ^ int . s = Pr { C e > R e | V T 1 < γ ^ b < V T 2 } P s u c = Pr { W 2 log 2 ( 1 + γ e ) > R e | V T 1 < γ ^ b < V T 2 } P s u c = Pr { γ e > 2 R e W 2 1 | V T 1 < γ ^ b < V T 2 } P s u c = Pr { ξ 2 γ ^ b + ( 1 ξ 2 ) γ A > k 1 | V T 1 < γ ^ b < V T 2 } P s u c = Pr { γ ^ b > k 1 ( 1 ξ 2 ) γ A ξ 2 | V T 1 < γ ^ b < V T 2 } P s u c = Pr { max ( V T 1 , k 1 ( 1 ξ 2 ) γ A ξ 2 ) < γ ^ b < V T 2 }
Since γ ^ b follows an exponential distribution, we can perform the following integration operations:
= V T 1 k 2 V T 2 k 2 f ( γ ˜ b ) d ( γ ˜ b ) V T 1 k ( γ ˜ b + 1 ) f ( γ A ) d ( γ A ) + V T 2 k 2 + f ( γ ˜ b ) d ( γ ˜ b ) V T 1 V T 2 f ( γ A ) d ( γ A ) = e V T 1 W 1 N 1 d 1 α P t ( 1 β ) e V T 2 W 1 N 1 d 1 α P t ( 1 β ) · e W 2 N 2 d 2 α ( V T 2 k 2 ) P t σ e + e W 2 N 2 d 2 α V T 1 P t β k 2 e W 2 N 2 d 2 α V T 2 P t β k 2 · e V T 1 W 1 N 1 d 1 α P t ( 1 β ) 1 β k σ e + 1 β · ( e W 2 N 2 d 2 α ( V T 1 k ) ( k σ e + 1 β ) P t σ e ( 1 β ) e W 1 N 1 d 1 α ( V T 2 k ) ( k σ e + 1 β ) P t σ e ( 1 β ) ) ,
where k 2 = 2 R e W 2 1 .

Appendix A.4. Proof of Proposition 4

For the actual interception probability of packets in the channel under unsaturated transmission, we provide the following proof:
P ^ int . us = Pr { C e > R e | V T 1 < γ ^ b < V T 2 } P s u c ,
owing to the fact that in an unsaturated transmission state, we need to consider the load rate of the server, so we need to multiply the load rate.
= Pr { W 2 log 2 ( 1 + γ e ) > R e | V T 1 < γ ^ b < V T 2 } P s u c μ λ = Pr { γ e > 2 R e W 2 1 | V T 1 < γ ^ b < V T 2 } P s u c = Pr { ξ 2 γ ^ b + ( 1 ξ 2 ) γ A > k 1 | V T 1 < γ ^ b < V T 2 } P s u c μ λ = Pr { γ ^ b > k 1 ( 1 ξ 2 ) γ A ξ 2 | V T 1 < γ ^ b < V T 2 } P s u c μ λ = Pr { max ( V T 1 , k 1 ( 1 ξ 2 ) γ A ξ 2 ) < γ ^ b < V T 2 } μ λ = e V T 1 W 1 N 1 d 1 α P t ( 1 β ) e V T 2 W 1 N 1 d 1 α P t ( 1 β ) · e W 2 N 2 d 2 α ( V T 2 k 2 ) P t σ e + e ( W 2 N 2 d 2 α V T 1 P t β k 2 ) e ( W 2 N 2 d 2 α V T 2 P t β k 2 ) · e V T 1 W 1 N 1 d 1 α P t ( 1 β ) 1 β k σ e + 1 β · ( e W 2 N 2 d 2 α ( V T 1 k ) ( k σ e + 1 β ) P t σ e ( 1 β ) e W 1 N 1 d 1 α ( V T 2 k ) ( k σ e + 1 β ) P t σ e ( 1 β ) ) μ λ ,
where k 2 = 2 R e W 2 1 .

Appendix A.5. Proof of Proposition 5

For X k T k 1 , we have Y k = S k . Thus, we can obtain the following:
P Δ p ( A T ) = Pr ( Δ p e a k A T ) = Pr { T k 1 + S k > A T | X k T k 1 } = Pr { T k 1 > { X k , A T S k } max } Pr { X k T k 1 } ,
When X k > A T S k , the above equation is meaningless; thus, we can obtain the following:
Pr { T k 1 > { X k , A T S k } max } Pr { X k T k 1 } = Pr { T k 1 > A T S k } Pr { X k T k 1 } = i = 1 Pr { S k = i } Pr { T k 1 + i > A T } Pr { X k T k 1 } = i = 1 Pr { S k = i } ( 1 Pr { T k 1 + i A T } ) Pr { X k T k 1 } = i = 1 Pr { S k = i } ( 1 μ 1 λ ) A T i 1 = ( μ λ ) 2 ( 1 μ 1 λ ) A T 2 .
For X k T k 1 , we have Y k = S k + X k T k 1 . Thus, can obtain the following:
Pr { T k 1 + Y k > A T } Pr { X k > T k 1 } = Pr { X k > A T S k } Pr { X k > T k 1 } = i = 1 Pr { S k = i } Pr { X k + i > A T } Pr { X k > T k 1 } = i = 1 μ ( 1 μ ) i 1 ( 1 λ ) A T i 1 = ( 1 λ ) A T 2 μ 2 ( μ p ) 2 .

Appendix A.6. Proof of Proposition 6

For the optimization issues, we provide the following proofs:
min P t J = η 1 P ^ out . s + η 2 P ^ int . s + η 3 P ^ Δ p . s s . t , ε 1 P t ε 2 .
In order to simplify the calculation, we can simplify:
P ^ out . s ( e ( V T 1 W 1 N 1 d 1 α P t ( 1 β ) ) e ( V T 2 W 1 N 1 d 1 α P t ( 1 β ) ) ) · e ( W 1 N 1 d 1 α ( V T 2 k 1 ) P t β ) , P ^ int . s ( e ( V T 1 W 1 N 1 d 1 α P t ( 1 β ) ) e ( V T 2 W 1 N 1 d 1 α P t ( 1 β ) ) ) · e ( W 2 N 2 d 2 α ( V T 2 k 2 ) P t σ e ) , P ^ Δ P ( 1 P ^ out . s ) .
We denote ω 1 = V T 1 W 1 N 1 d 1 α ( 1 β ) , ω 2 = V T 2 W 2 N 2 d 2 α ( 1 β ) and ω 3 = V T 2 W 2 N 2 d 2 α σ e . From J P t = 0 , we know that:
( e ω 1 P t ω 1 P t 2 e ω 2 P t ω 2 P t 2 ) ( ( η 1 η 3 ) e ω 2 P t + η 2 e ω 3 P t ) + ( e ω 1 P t e ω 2 P t ) ( e ω 2 P t ω 2 P t 2 e ω 3 P t ω 3 P t 2 ) ) = 0 ,
where ω 2 ω 3 ; thus, we can conclude the following:
P t = ln ( ( η 1 η 3 ) + 1 1 ( η 1 η 3 ) η 2 ) ω 2 ω 1 .

References

  1. Hellman, M.E. An overview of public key cryptography. IEEE Commun. Mag. 2002, 40, 42–49. [Google Scholar] [CrossRef] [Green Version]
  2. Kartalopoulos, S.V. A primer on cryptography in communications. IEEE Commun. Mag. 2006, 44, 146–151. [Google Scholar] [CrossRef]
  3. Wyner, A.D. The wire-tap channel. Bell Syst. Tech. J. 1975, 54, 1355–1387. [Google Scholar] [CrossRef]
  4. Leung-Yan-Cheong, S.; Hellman, M. The Gaussian wire-tap channel. IEEE Trans. Inf. Theory 1978, 24, 451–456. [Google Scholar] [CrossRef]
  5. Tashman, D.; Hamouda, W. Cascaded κ-μ fading channels with colluding and non-colluding eavesdroppers: Physical-layer security analysis. Future Internet 2021, 13, 205. [Google Scholar] [CrossRef]
  6. Phan, V.D.; Nguyen, T.N.; Le, A.V.; Voznak, M. A study of physical layer security in SWIPT-based decode-and-forward relay networks with dynamic power splitting. Sensors 2021, 21, 5692. [Google Scholar] [CrossRef] [PubMed]
  7. Kaul, S.; Yates, R.; Gruteser, M. Real-time status: How often should one update? In Proceedings of the 2012 Proceedings IEEE INFOCOM, Orlando, FL, USA, 25–30 March 2012; IEEE: Piscataway, NJ, USA, 2012; pp. 2731–2735. [Google Scholar]
  8. Devassy, R.; Durisi, G.; Ferrante, G.C.; Simeone, O.; Uysal-Biyikoglu, E. Delay and peak-age violation probability in short-packet transmissions. In Proceedings of the 2018 IEEE International Symposium on Information Theory (ISIT), Vail, CO, USA, 17–22 June 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 2471–2475. [Google Scholar]
  9. Hu, L.; Chen, Z.; Dong, Y.; Jia, Y.; Wang, M.; Liang, L.; Chen, C. Optimal status update in IoT systems: An age of information violation probability perspective. In Proceedings of the 2020 IEEE 92nd Vehicular Technology Conference (VTC2020-Fall), Victoria, BC, Canada, 18 November–16 December 2020; IEEE: Piscataway, NJ, USA, 2020; pp. 1–5. [Google Scholar]
  10. Champati, J.P.; Al-Zubaidy, H.; Gross, J. Statistical guarantee optimization for AoI in single-hop and two-hop FCFS systems with periodic arrivals. IEEE Trans. Commun. 2020, 69, 365–381. [Google Scholar] [CrossRef]
  11. Seo, J.B.; Choi, J. On the outage probability of peak age-of-information for D/G/1 queuing systems. IEEE Commun. Lett. 2019, 23, 1021–1024. [Google Scholar] [CrossRef]
  12. Taylor, J.M.; Hempel, M.; Sharif, H.; Ma, S.; Yang, Y. Impact of channel estimation errors on effectiveness of eigenvector-based jamming for physical layer security in wireless networks. In Proceedings of the 2011 IEEE 16th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Kyoto, Japan, 10–11 June 2011; IEEE: Piscataway, NJ, USA, 2011; pp. 122–126. [Google Scholar]
  13. Zhou, X.; McKay, M.R. Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation. IEEE Trans. Veh. Technol. 2010, 59, 3831–3842. [Google Scholar] [CrossRef] [Green Version]
  14. Liu, T.Y.; Lin, S.C.; Chang, T.H.; Hong, Y.W.P. How much training is enough for secrecy beamforming with artificial noise. In Proceedings of the 2012 IEEE International Conference on Communications (ICC), Ottawa, ON, Canada, 10–15 June 2012; IEEE: Piscataway, NJ, USA, 2012; pp. 4782–4787. [Google Scholar]
  15. Zou, Y.; Zhu, J.; Wang, X.; Hanzo, L. A survey on wireless security: Technical challenges, recent advances, and future trends. Proc. IEEE 2016, 104, 1727–1765. [Google Scholar] [CrossRef]
  16. Zhu, J.; Takahashi, O.; Jiang, X.; Nakamura, Y.; Shiraishi, Y. Outage secrecy capacity over correlated fading channels at high SNR. In Proceedings of the 2012 International Conference on Mobile Computing and Ubiquitous Networking, Barcelona, Spain, 23–28 September 2012; pp. 92–97. [Google Scholar]
  17. Sun, X.; Wang, J.; Xu, W.; Zhao, C. Performance of secure communications over correlated fading channels. IEEE Signal Process. Lett. 2012, 19, 479–482. [Google Scholar] [CrossRef]
  18. Liu, X. Outage probability of secrecy capacity over correlated log-normal fading channels. IEEE Commun. Lett. 2012, 17, 289–292. [Google Scholar] [CrossRef]
  19. He, B.; Zhou, X. Secure on-off transmission design with channel estimation errors. IEEE Trans. Inf. Forensics Secur. 2013, 8, 1923–1936. [Google Scholar] [CrossRef] [Green Version]
  20. Kay, S.M. Fundamentals of Statistical Signal Processing: Estimation Theory; Prentice-Hall, Inc.: Upper Saddle River, NJ, USA, 1993. [Google Scholar]
  21. Hassibi, B.; Hochwald, B.M. How much training is needed in multiple-antenna wireless links? IEEE Trans. Inf. Theory 2003, 49, 951–963. [Google Scholar] [CrossRef] [Green Version]
  22. Vakili, A.; Sharif, M.; Hassibi, B. The effect of channel estimation error on the throughput of broadcast channels. In Proceedings of the 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings, Toulouse, France, 14–19 May 2006; IEEE: Piscataway, NJ, USA, 2006; Volume 4, p. IV. [Google Scholar]
  23. Lokur, A. Effects of Correlation of Channel Gains on the Secrecy Capacity in the Gaussian Wiretap Channel. Master’s Thesis, University of Nebraska, Lincoln, NE, USA, 2019. [Google Scholar]
  24. Yates, R.D.; Sun, Y.; Brown, D.R.; Kaul, S.K.; Modiano, E.; Ulukus, S. Age of information: An introduction and survey. IEEE J. Sel. Areas Commun. 2021, 39, 1183–1210. [Google Scholar] [CrossRef]
  25. Akar, N.; Dogan, O. Discrete-time queueing model of age of information with multiple information sources. IEEE Internet Things J. 2021, 8, 14531–14542. [Google Scholar] [CrossRef]
  26. Emara, M.; ElSawy, H.; Bauch, G. A spatiotemporal model for peak AoI in uplink IoT networks: Time versus event-triggered traffic. IEEE Internet Things J. 2020, 7, 6762–6777. [Google Scholar] [CrossRef] [Green Version]
  27. Gong, S.; Xing, C.; Jing, Y.; Wang, S.; Wang, J.; Chen, S.; Hanzo, L. A unified MIMO optimization framework relying on the KKT conditions. IEEE Trans. Commun. 2021, 69, 7251–7268. [Google Scholar] [CrossRef]
  28. Peng, D.; Hu, C.; Pan, C.; Dong, Y.; Fan, P.; Letaief, K.B. Timely Communications With and Without Relaying and Buffering. IEEE Internet Things J. 2022, 9, 24903–24918. [Google Scholar] [CrossRef]
Figure 1. System model.
Figure 1. System model.
Entropy 25 01040 g001
Figure 2. Packet transmission under SNR-based control.
Figure 2. Packet transmission under SNR-based control.
Entropy 25 01040 g002
Figure 3. The outage probability and interception probability vary with different transmitting powers.
Figure 3. The outage probability and interception probability vary with different transmitting powers.
Entropy 25 01040 g003
Figure 4. The variation of the probability of peak AoI violation with transmission power under SNR-gated transmission control. P t is set to 5 W. The left threshold is set to 4, the right threshold is set to 15, the pilot power is 0.7 W, and R b = 2.4 bps.
Figure 4. The variation of the probability of peak AoI violation with transmission power under SNR-gated transmission control. P t is set to 5 W. The left threshold is set to 4, the right threshold is set to 15, the pilot power is 0.7 W, and R b = 2.4 bps.
Entropy 25 01040 g004
Figure 5. The variation in the probability of peak AoI violation with the arrival rate λ under SNR-gated transmission control and without SNR-gated transmission control.
Figure 5. The variation in the probability of peak AoI violation with the arrival rate λ under SNR-gated transmission control and without SNR-gated transmission control.
Entropy 25 01040 g005
Figure 6. The three-dimensional graph for the weighted sum of the outage probability, interception probability, and PAoI violation probability.
Figure 6. The three-dimensional graph for the weighted sum of the outage probability, interception probability, and PAoI violation probability.
Entropy 25 01040 g006
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Li, J.; Dong, Y.; Pan, C. Security- and Reliability-Guaranteed Transmission Control of Time-Sensitive Physical Layer Security Systems. Entropy 2023, 25, 1040. https://doi.org/10.3390/e25071040

AMA Style

Li J, Dong Y, Pan C. Security- and Reliability-Guaranteed Transmission Control of Time-Sensitive Physical Layer Security Systems. Entropy. 2023; 25(7):1040. https://doi.org/10.3390/e25071040

Chicago/Turabian Style

Li, Jianye, Yunquan Dong, and Chengsheng Pan. 2023. "Security- and Reliability-Guaranteed Transmission Control of Time-Sensitive Physical Layer Security Systems" Entropy 25, no. 7: 1040. https://doi.org/10.3390/e25071040

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop