Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (84)

Search Parameters:
Keywords = secrecy outage probability

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
30 pages, 1328 KB  
Article
Evaluating the Reliability and Security of an Uplink NOMA Relay System Under Hardware Impairments
by Duy-Hung Ha, The-Anh Ngo, Xuan-Truong Tran, Minh-Linh Dam, Viet-Thanh Le, Agbotiname Lucky Imoize and Chun-Ta Li
Mathematics 2025, 13(21), 3491; https://doi.org/10.3390/math13213491 - 1 Nov 2025
Viewed by 413
Abstract
With the rapid growth of wireless devices, security has become a key research concern in beyond-5G (B5G) and sixth-generation (6G) networks. Non-orthogonal multiple access (NOMA), one of the supporting technologies, is a strong contender to enable massive connectivity, increase spectrum efficiency, and guarantee [...] Read more.
With the rapid growth of wireless devices, security has become a key research concern in beyond-5G (B5G) and sixth-generation (6G) networks. Non-orthogonal multiple access (NOMA), one of the supporting technologies, is a strong contender to enable massive connectivity, increase spectrum efficiency, and guarantee high-quality access for a sizable user base. Furthermore, the scientific community has recently paid close attention to the effects of hardware impairments (HIs). The safe transmission of NOMA in a two-user uplink relay network is examined in this paper, taking into account both hardware limitations and the existence of listening devices. Each time frame in a mobile network environment comprises two phases in which users use a relay (R) to interact with the base station (BS). The research focuses on scenarios where a malicious device attempts to intercept the uplink signals transmitted by users through the R. Using important performance and security metrics, such as connection outage probability (COP), secrecy outage probability (SOP), and intercept probability (IP), system behavior is evaluated. To assess the system’s security and reliability under the proposed framework, closed-form analytical expressions are derived for SOP, IP, and COP. The simulation results provide the following insights: (i) they validate the accuracy of the derived analytical expressions; (ii) the study significantly deepens the understanding of secure NOMA uplink transmission under the influence of HIs across all the network entities, paving the way for future practical implementations; and (iii) the results highlight the superior performance of secure and reliable NOMA uplink systems compared to benchmark orthogonal multiple access (OMA) counterparts when both operate under the same HI conditions. Furthermore, an extended model without a relay is considered for comparison with the proposed relay-assisted scheme. Moreover, the numerical results indicate that the proposed communication model achieves over 90% reliability (with a COP below 0.1) and provides approximately a 30% improvement in SOP compared to conventional OMA-based systems under the same HI conditions. Full article
Show Figures

Figure 1

14 pages, 3512 KB  
Article
Secure Downlink Transmission with NOMA-Based Mixed FSO/RF Communications in Space–Air–Ground Integrated Networks
by Yu Li, Yongjun Li, Xin Li, Kai Zhang and Shanghong Zhao
Photonics 2025, 12(10), 1012; https://doi.org/10.3390/photonics12101012 - 14 Oct 2025
Viewed by 377
Abstract
Security is paramount in space–air–ground integrated networks (SAGINs) due to their inherent openness and the broadcast characteristics of wireless transmission. In this paper, we propose a secure downlink transmission scheme with NOMA-based mixed FSO/RF communications for SAGINs. Specifically, the satellite communicates with two [...] Read more.
Security is paramount in space–air–ground integrated networks (SAGINs) due to their inherent openness and the broadcast characteristics of wireless transmission. In this paper, we propose a secure downlink transmission scheme with NOMA-based mixed FSO/RF communications for SAGINs. Specifically, the satellite communicates with two ground users through an unmanned aerial vehicle (UAV) relay, where FSO and RF transmissions are adopted for the satellite–relay and relay–user links, respectively. Furthermore, the NOMA technique is integrated to further enhance secrecy performance. Subsequently, exact closed-form expressions for the secrecy outage probability of the downlink transmission link in SAGINs are derived. Finally, Monte Carlo simulations are performed to validate the effectiveness of the proposed secure downlink transmission scheme and the accuracy of the analytical expressions. Full article
(This article belongs to the Special Issue Emerging Technologies for 6G Space Optical Communication Networks)
Show Figures

Figure 1

24 pages, 1626 KB  
Article
Physical Layer Security Enhancement in IRS-Assisted Interweave CIoV Networks: A Heterogeneous Multi-Agent Mamba RainbowDQN Method
by Ruiquan Lin, Shengjie Xie, Wencheng Chen and Tao Xu
Sensors 2025, 25(20), 6287; https://doi.org/10.3390/s25206287 - 10 Oct 2025
Viewed by 632
Abstract
The Internet of Vehicles (IoV) relies on Vehicle-to-Everything (V2X) communications to enable cooperative perception among vehicles, infrastructures, and devices, where Vehicle-to-Infrastructure (V2I) links are crucial for reliable transmission. However, the openness of wireless channels exposes IoV to eavesdropping, threatening privacy and security. This [...] Read more.
The Internet of Vehicles (IoV) relies on Vehicle-to-Everything (V2X) communications to enable cooperative perception among vehicles, infrastructures, and devices, where Vehicle-to-Infrastructure (V2I) links are crucial for reliable transmission. However, the openness of wireless channels exposes IoV to eavesdropping, threatening privacy and security. This paper investigates an Intelligent Reflecting Surface (IRS)-assisted interweave Cognitive IoV (CIoV) network to enhance physical layer security in V2I communications. A non-convex joint optimization problem involving spectrum allocation, transmit power for Vehicle Users (VUs), and IRS phase shifts is formulated. To address this challenge, a heterogeneous multi-agent (HMA) Mamba RainbowDQN algorithm is proposed, where homogeneous VUs and a heterogeneous secondary base station (SBS) act as distinct agents to simplify decision-making. Simulation results show that the proposed method significantly outperform benchmark schemes, achieving a 13.29% improvement in secrecy rate and a 54.2% reduction in secrecy outage probability (SOP). These results confirm the effectiveness of integrating IRS and deep reinforcement learning (DRL) for secure and efficient V2I communications in CIoV networks. Full article
(This article belongs to the Section Sensor Networks)
Show Figures

Figure 1

20 pages, 643 KB  
Article
Improving Physical Layer Security for Multi-Hop Transmissions in Underlay Cognitive Radio Networks with Various Eavesdropping Attacks
by Kyusung Shim and Beongku An
Electronics 2025, 14(19), 3867; https://doi.org/10.3390/electronics14193867 - 29 Sep 2025
Viewed by 450
Abstract
This paper investigates physical layer security (PHY-security) for multi-hop transmission in underlay cognitive radio networks under various eavesdropping attacks. To enhance secrecy performance, we propose two opportunistic scheduling schemes. The first scheme, called the minimal node selection (MNS) scheme, selects the node in [...] Read more.
This paper investigates physical layer security (PHY-security) for multi-hop transmission in underlay cognitive radio networks under various eavesdropping attacks. To enhance secrecy performance, we propose two opportunistic scheduling schemes. The first scheme, called the minimal node selection (MNS) scheme, selects the node in each cluster that minimizes the eavesdropper’s channel capacity. The second scheme, named the optimal node selection (ONS) scheme, chooses the node that maximizes secrecy capacity by using both the main and eavesdropper channel information. To reveal the relationship between network parameters and secrecy performance, we derive closed-form expressions for the secrecy outage probability (SOP) under different scheduling schemes and eavesdropping scenarios. Numerical results show that the ONS scheme provides the most robust secrecy performance among the considered schemes. Furthermore, we analyze the impact of key network parameters on secrecy performance. In detail, although the proposed ONS scheme requires more channel information than the MNS scheme, under a 20 dB interference threshold, the secrecy performance of the ONS scheme is 15% more robust than that of the MNS scheme. Full article
(This article belongs to the Section Networks)
Show Figures

Figure 1

17 pages, 1151 KB  
Article
Physical Layer Secure Transmission of AI Models in UAV-Enabled Edge AIoT
by Hui Li, Mingxuan Li, Yiming Lin, Tianshun Li, Runlei Li and Xin Fan
Electronics 2025, 14(17), 3450; https://doi.org/10.3390/electronics14173450 - 29 Aug 2025
Viewed by 606
Abstract
The evolution of sixth-generation (6G) networks enables transformative edge Artificial Intelligence of Things (AIoT) applications but introduces critical security vulnerabilities during model transmission between the central server and edge devices (e.g., unmanned aerial vehicles). Traditional approaches fail to jointly optimize model accuracy and [...] Read more.
The evolution of sixth-generation (6G) networks enables transformative edge Artificial Intelligence of Things (AIoT) applications but introduces critical security vulnerabilities during model transmission between the central server and edge devices (e.g., unmanned aerial vehicles). Traditional approaches fail to jointly optimize model accuracy and physical layer security against eavesdropping. To address this gap, we propose a novel dynamic user selection framework that integrates three key innovations: (1) closed-form secrecy outage probability derivation for Rayleigh fading channels, (2) a Secure Model Accuracy (SMA) metric unifying recognition accuracy and secrecy outage probability, and (3) an alternating optimization algorithm for joint model–bandwidth selection under secrecy constraints. Comprehensive simulations demonstrate 22% SMA gains over baselines across diverse channel conditions and eavesdropper capabilities, resolving the fundamental accuracy–security tradeoff for trustworthy edge intelligence. Full article
(This article belongs to the Special Issue Optimization and Guarantee of AI Service Quality in Native-AI Network)
Show Figures

Figure 1

16 pages, 530 KB  
Article
Performance Analysis of a Multi-User MIMO Reflecting Intelligent Surface-Aided Communication System Under Weibull Fading Channels
by Ricardo C. Ferreira, Gustavo Fraidenraich, Felipe A. P. de Figueiredo and Eduardo R. de Lima
Sensors 2025, 25(9), 2743; https://doi.org/10.3390/s25092743 - 26 Apr 2025
Cited by 2 | Viewed by 999
Abstract
This study analyzes the performance of a multi-user digital communication system aided by reflecting intelligent surfaces (RIS) in terms of bit error probability and secrecy outage probability for a system sending symbols with M-QAM modulation passing through channels with Weibull fading, where [...] Read more.
This study analyzes the performance of a multi-user digital communication system aided by reflecting intelligent surfaces (RIS) in terms of bit error probability and secrecy outage probability for a system sending symbols with M-QAM modulation passing through channels with Weibull fading, where RIS are employed to improve the signal-to-noise plus interference ratio (SINR) for each user. The performance analysis is conducted based on the statistical properties of the phase correction error of the transmitted signal, which follows a von Mises distribution. Furthermore, this study demonstrates that the resulting SINR follows a gamma distribution, with its parameters derived analytically. The RIS performance increases the line of sight strength and reduces the secrecy outage probability and error probability when the number of reflectors is sufficiently large, even without direct links between the users and the transmitter. Full article
(This article belongs to the Section Communications)
Show Figures

Figure 1

12 pages, 812 KB  
Essay
Semantic Communication Physical Layer Security Performance Analysis
by Xiaowei Wang and Fuchao Peng
Electronics 2025, 14(7), 1316; https://doi.org/10.3390/electronics14071316 - 26 Mar 2025
Viewed by 1554
Abstract
Semantic communication based on deep learning technology extracts the meaning of the transmitted source to achieve spectrum resource savings and enhance anti-interference capabilities. The black-box nature of deep learning models increases the difficulty for eavesdroppers in intercepting information, thereby significantly improving transmission security [...] Read more.
Semantic communication based on deep learning technology extracts the meaning of the transmitted source to achieve spectrum resource savings and enhance anti-interference capabilities. The black-box nature of deep learning models increases the difficulty for eavesdroppers in intercepting information, thereby significantly improving transmission security under normal circumstances. However, eavesdroppers may utilize model theft techniques to acquire models that have similar functionality and performance to the victim’s model. Moreover, even if all users are legitimate, the private information of a specific legitimate user should not be accessible to other users, and this issue also requires attention. As the lowest layer of wireless communication, the physical layer has been proven to enhance the security performance of communication systems by leveraging the randomness of physical channels. Unlike traditional communication, which transmits bit streams, semantic communication transmits semantic streams. Therefore, this paper converts semantic streams into bit streams to analyze the security performance of semantic communication using traditional communication metrics. Specifically, this paper assumes that the performance of the eavesdropper’s stolen model is consistent with that of the original model (although this assumption is impossible) and conducts a derivation analysis of the Secrecy Outage Probability (SOP). Full article
(This article belongs to the Section Microwave and Wireless Communications)
Show Figures

Figure 1

20 pages, 3754 KB  
Article
Secrecy Outage Performance Analysis of Wirelessly Powered IoT System with Randomly Moving Receiving Nodes
by Vesna Blagojević, Nadica Kozić, Aleksandra Cvetković and Predrag Ivaniš
Sensors 2025, 25(5), 1386; https://doi.org/10.3390/s25051386 - 24 Feb 2025
Cited by 1 | Viewed by 999
Abstract
Due to the need for the implementation of various IoT services, novel generation networks are often characterized by a constant requirement for their expansion and a rising number of nodes. The IoT network nodes are usually low power, so security becomes a challenging [...] Read more.
Due to the need for the implementation of various IoT services, novel generation networks are often characterized by a constant requirement for their expansion and a rising number of nodes. The IoT network nodes are usually low power, so security becomes a challenging issue as conventional cryptographic techniques are hard to implement due to power and computational limitations. Besides, wireless power transfer is an appealing approach for powering IoT systems in scenarios where many nodes are placed in hardly accessible areas. Finally, due to a variety of applications, network nodes are often mobile. Motivated by these facts, in this paper, we investigate physical layer security in IoT systems powered by means of a power beacon, where a legitimate user or eavesdropper can be mobile. The closed-form approximate secrecy outage probability expressions are derived for the Nakagami-m fading environment and three scenarios of receiving node mobility, described by using a random waypoint model with mobility patterns in one, two or three dimensions. The accuracy of the obtained analytical expressions is corroborated by an independently developed simulation model. Full article
(This article belongs to the Special Issue Integrated Sensing and Communication in IoT Applications)
Show Figures

Figure 1

28 pages, 474 KB  
Article
Security Performance Analysis of Downlink Double Intelligent Reflecting Surface Non-Orthogonal Multiple Access Network for Edge Users
by Nguyen Thai Anh, Nguyen Hoang Viet, Dinh-Thuan Do and Adão Silva
Sensors 2025, 25(4), 1274; https://doi.org/10.3390/s25041274 - 19 Feb 2025
Viewed by 881
Abstract
In this work, we study the security performance of a double intelligent reflecting surface non-orthogonal multiple access (DIRS-NOMA) wireless communication system supporting communication for a group of two NOMA users (UEs) at the edge, with the existence of an eavesdropping device (ED). We [...] Read more.
In this work, we study the security performance of a double intelligent reflecting surface non-orthogonal multiple access (DIRS-NOMA) wireless communication system supporting communication for a group of two NOMA users (UEs) at the edge, with the existence of an eavesdropping device (ED). We also assume that there is no direct connection between the BS and the UEs. From the proposed model, we compute closed-form expressions for the secrecy outage probability (SOP) and the average security rate (ASR) for each UE. After that, we discuss and analyze the system security performance according to the NOMA power allocation for each user and the number of IRS counter-emission elements. In addition, we analyze the SOP of both the considered DIRS-NOMA and conventional NOMA systems to demonstrate that DIRS-NOMA systems have much better security than conventional NOMA systems. Based on the analytical results, we develop an ASR optimization algorithm using the alternating optimization method, combining NOMA power allocation factor optimization and IRS passive beam optimization through the Lagrange double transform. The derived analytical expressions are validated through Monte Carlo simulations. Full article
(This article belongs to the Section Communications)
Show Figures

Figure 1

21 pages, 1171 KB  
Article
Statistical Analysis of the Sum of Double Random Variables for Security Applications in RIS-Assisted NOMA Networks with a Direct Link
by Sang-Quang Nguyen, Phuong T. Tran, Bui Vu Minh, Tran Trung Duy, Anh-Tu Le, Lubos Rejfek and Lam-Thanh Tu
Electronics 2025, 14(2), 392; https://doi.org/10.3390/electronics14020392 - 20 Jan 2025
Cited by 3 | Viewed by 1680
Abstract
Next- generation wireless communications are projected to integrate reconfigurable intelligent surfaces (RISs) to perpetrate enhanced spectral and energy efficiencies. To quantify the performance of RIS-aided wireless networks, the statistics of a single random variable plus the sum of double random variables becomes a [...] Read more.
Next- generation wireless communications are projected to integrate reconfigurable intelligent surfaces (RISs) to perpetrate enhanced spectral and energy efficiencies. To quantify the performance of RIS-aided wireless networks, the statistics of a single random variable plus the sum of double random variables becomes a core approach to reflect how communication links from RISs improve wireless-based systems versus direct ones. With this in mind, the work applies the statistics of a single random variable plus the sum of double random variables in the secure performance of RIS-based non-orthogonal multi-access (NOMA) systems with the presence of untrusted users. We propose a new communication strategy by jointly considering NOMA encoding and RIS’s phase shift design to enhance the communication of legitimate nodes while degrading the channel capacity of untrusted elements but with sufficient power resources for signal recovery. Following that, we analyze and derive the closed-form expressions of the secrecy effective capacity (SEC) and secrecy outage probability (SOP). All analyses are supported by extensive Monte Carlo simulation outcomes, which facilitate an understanding of system communication behavior, such as the transmit signal-to-noise ratio, the number of RIS elements, the power allocation coefficients, the target data rate of the communication channels, and secure data rate. Finally, the results demonstrate that our proposed communication can be improved significantly with an increase in the number of RIS elements, irrespective of the presence of untrusted proximate or distant users. Full article
(This article belongs to the Special Issue Wireless Sensor Network: Latest Advances and Prospects)
Show Figures

Figure 1

19 pages, 2018 KB  
Article
Secrecy Analysis of LEO Satellite-to-Ground Station Communication System Influenced by Gamma-Shadowed Ricean Fading
by Ivan Radojkovic, Jelena Anastasov, Dejan N. Milic, Predrag Ivaniš and Goran T. Djordjevic
Electronics 2025, 14(2), 293; https://doi.org/10.3390/electronics14020293 - 13 Jan 2025
Cited by 1 | Viewed by 2408
Abstract
The Low Earth Orbit (LEO) small satellites are extensively used for global connectivity to enable services in underpopulated, remote or underdeveloped areas. Their inherent broadcast nature exposes LEO–terrestrial communication links to severe security threats, which always reveal new challenges. The secrecy performance of [...] Read more.
The Low Earth Orbit (LEO) small satellites are extensively used for global connectivity to enable services in underpopulated, remote or underdeveloped areas. Their inherent broadcast nature exposes LEO–terrestrial communication links to severe security threats, which always reveal new challenges. The secrecy performance of the satellite-to-ground user link in the presence of a ground eavesdropper is studied in this paper. We observe both scenarios of the eavesdropper’s channel state information (CSI) being known or unknown to the satellite. Throughout the analysis, we consider that locations of the intended and unauthorized user are both arbitrary in the satellite’s footprint. On the other hand, we analyze the case when the user is in the center of the satellite’s central beam. In order to achieve realistic physical layer security features of the system, the satellite channels are assumed to undergo Gamma-shadowed Ricean fading, where both line-of-site and scattering components are influenced by shadowing effect. In addition, some practical effects, such as satellite multi-beam pattern and free space loss, are considered in the analysis. Capitalizing on the aforementioned scenarios, we derive the novel analytical expressions for the average secrecy capacity, secrecy outage probability, probability of non-zero secrecy capacity, and probability of intercept events in the form of Meijer’s G functions. In addition, novel asymptotic expressions are derived from previously mentioned metrics. Numerical results are presented to illustrate the effects of beam radius, satellite altitude, receivers’ position, as well as the interplay of the fading or/and shadowing impacts over main and wiretap channels on the system security. Analytical results are confirmed by Monte Carlo simulations. Full article
(This article belongs to the Special Issue New Advances of Microwave and Optical Communication)
Show Figures

Figure 1

21 pages, 2931 KB  
Article
On the Performance of Energy Harvesting Dual-Hop Free-Space Optical Communication Systems with Secrecy Analysis
by Abdulgani A. Ibrahim, Serdar Özgür Ata and Lütfiye Durak-Ata
Sensors 2025, 25(2), 319; https://doi.org/10.3390/s25020319 - 8 Jan 2025
Cited by 1 | Viewed by 1281
Abstract
In this study, we present a dual-hop decode-and-forward relaying-based free-space optical (FSO) communication system. We consider utilizing simultaneous lightwave information and power transfer (SLIPT) with a time-splitting technique at the relay, where the direct current component of the received optical signal is harvested [...] Read more.
In this study, we present a dual-hop decode-and-forward relaying-based free-space optical (FSO) communication system. We consider utilizing simultaneous lightwave information and power transfer (SLIPT) with a time-splitting technique at the relay, where the direct current component of the received optical signal is harvested as a transmit power for the relay. It is assumed that the FSO links experience a Malaga turbulence channel with pointing errors. In order to evaluate the performance of the proposed communication system, closed-form expressions for outage probability, ergodic capacity, average bit error rate, and throughput are derived. Additionally, to analyze the physical layer security of the proposed system, closed-form expressions for secrecy outage probability and strictly positive secrecy capacity are obtained. Finally, the accuracy of the derived analytical expressions are validated with Monte Carlo simulations. Results show that our proposed system model outperforms its non-SLIPT counterpart. Full article
(This article belongs to the Special Issue Recent Advances in Optical Wireless Communications)
Show Figures

Figure 1

14 pages, 2905 KB  
Article
On Security Performance of SWIPT Multi-User Jamming Based on Mixed RF/FSO Systems with Untrusted Relay
by Xingyue Guo, Shan Tu, Dexian Yan and Yi Wang
Sensors 2024, 24(24), 8203; https://doi.org/10.3390/s24248203 - 22 Dec 2024
Cited by 2 | Viewed by 1329
Abstract
This paper presents research on the security performance of a multi-user interference-based mixed RF/FSO system based on SWIPT untrusted relay. In this work, the RF and FSO channels experience Nakagami-m fading distribution and Málaga (M) turbulence, respectively. Multiple users transmit messages to the [...] Read more.
This paper presents research on the security performance of a multi-user interference-based mixed RF/FSO system based on SWIPT untrusted relay. In this work, the RF and FSO channels experience Nakagami-m fading distribution and Málaga (M) turbulence, respectively. Multiple users transmit messages to the destination with the help of multiple cooperating relays, one of which may become an untrusted relay as an insider attacker. In a multi-user network, SWIPT acts as a charging device for each user node. In order to prevent the untrusted relays from eavesdropping on the information, some users are randomly assigned to transmit artificial noise in order to interfere with untrusted relays, and the remaining users send information to relay nodes. Based on the above system model, the closed-form expressions of secrecy outage probability (SOP) and average secrecy capacity (ASC) for the mixed RF/FSO system are derived. The correctness of these expressions is verified by the Monte Carlo method. The influences of various key factors on the safety performance of the system are analyzed by simulations. The results show that the security performance of the system is considerably improved by increasing the signal–interference noise ratio, the number of interfering users, the time distribution factor and the energy conversion efficiency when the instantaneous signal-to-noise ratio (SNR) of the RF link instantaneous SNR is low. Full article
(This article belongs to the Section Communications)
Show Figures

Figure 1

10 pages, 532 KB  
Proceeding Paper
Information-Theoretic Security of RIS-Aided MISO System Under N-Wave with Diffuse Power Fading Model
by José David Vega-Sánchez, Ana Zambrano, Ricardo Mena and José Oscullo
Eng. Proc. 2024, 77(1), 1; https://doi.org/10.3390/engproc2024077001 - 18 Nov 2024
Viewed by 888
Abstract
This paper aims to examine the physical layer security (PLS) performance of a reconfigurable intelligent surface (RIS)-aided wiretap multiple-input single-output (MISO) system over generalized fading conditions by assuming inherent phase shift errors at the RIS. Specifically, the procedures (i.e., the method) to conduct [...] Read more.
This paper aims to examine the physical layer security (PLS) performance of a reconfigurable intelligent surface (RIS)-aided wiretap multiple-input single-output (MISO) system over generalized fading conditions by assuming inherent phase shift errors at the RIS. Specifically, the procedures (i.e., the method) to conduct this research is based on learning-based approaches to model the magnitude of the end-to-end RIS channel, i.e., employing an unsupervised expectation-maximization (EM) approach via a finite mixture of Nakagami-m distributions. This general framework allows us to accurately approximate key practical factors in RIS’s channel modeling, such as generalized fading conditions, spatial correlation, discrete phase shift, beamforming, and the presence of direct and indirect links. For the numerical results, the secrecy outage probability, the average secrecy rate, and the average secrecy loss under different setups of RIS-aided wireless systems are assessed by varying the fading parameters of the N-wave with a diffuse power fading channel model. The results show that the correlation between RIS elements and unfavorable channel conditions (e.g., Rayleigh) affect secrecy performance. Likewise, it was confirmed that the use of a RIS is not essential when there is a solid line-of-sight link between the transmitter and the legitimate receiver. Full article
(This article belongs to the Proceedings of The XXXII Conference on Electrical and Electronic Engineering)
Show Figures

Figure 1

19 pages, 4856 KB  
Article
Modeling Analysis for Downlink RIS-UAV-Assisted NOMA over Air-to-Ground Line-of-Sight Rician Channels
by Suoping Li, Xiangyu Liu, Jaafar Gaber and Guodong Pan
Drones 2024, 8(11), 659; https://doi.org/10.3390/drones8110659 - 8 Nov 2024
Cited by 2 | Viewed by 2202
Abstract
This paper proposes a drone-assisted NOMA communication system equipped with a reconfigurable intelligent surface (RIS). Given the Line-of-Sight nature of the Air-to-Ground link, a more realistic Rician fading environment is chosen for the study of system performance. The user’s outage performance and secrecy [...] Read more.
This paper proposes a drone-assisted NOMA communication system equipped with a reconfigurable intelligent surface (RIS). Given the Line-of-Sight nature of the Air-to-Ground link, a more realistic Rician fading environment is chosen for the study of system performance. The user’s outage performance and secrecy outage probability of the RIS-UAV-assisted NOMA downlink communication under the Rician channels are investigated. Jointly considering the Line-of-Sight and Non-Line-of-Sight links, the closed-form expressions of each user’s outage probability are derived by approximating the composite channels as Rician distributions to characterize the channel coefficients of the system’s links. Considering the physical layer security in the presence of the eavesdropper, the secrecy outage probability of two users is further studied. The relationship between the system outage performance and the Rician factor of the channel, the number of RIS elements, and other factors are analyzed. The results of this study show that compared with Rayleigh fading, the Rician fading is more practical with the actual Air-to-Ground links; the user’s outage probability and the secrecy outage probability are lower over the Rician channels. The number of RIS elements and the power allocation factor by the base station for the users are inversely proportional to the user’s outage probability, and RIS element number, path loss index, and distance factor also have a greater impact on the outage probability. Compared with OMA, NOMA has a certain enhancement to the system performance. Full article
(This article belongs to the Special Issue Space–Air–Ground Integrated Networks for 6G)
Show Figures

Figure 1

Back to TopTop