SwePub
Sök i LIBRIS databas

  Extended search

onr:"swepub:oai:DiVA.org:liu-179795"
 

Search: onr:"swepub:oai:DiVA.org:liu-179795" > Delay Performance o...

  • 1 of 1
  • Previous record
  • Next record
  •    To hitlist
  • Arvanitaki, Antonia,1991-Linköpings universitet,Programvara och system,Tekniska fakulteten (author)

Delay Performance of a Two-User Broadcast Channel with Security Constraints

  • Article/chapterEnglish2020

Publisher, publication year, extent ...

  • 2019-12-21
  • Springer,2020
  • printrdacarrier

Numbers

  • LIBRIS-ID:oai:DiVA.org:liu-179795
  • https://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-179795URI
  • https://doi.org/10.1007/s42979-019-0055-3DOI

Supplementary language notes

  • Language:English
  • Summary in:English

Part of subdatabase

Classification

  • Subject category:ref swepub-contenttype
  • Subject category:art swepub-publicationtype

Notes

  • In this paper, we consider the two-user broadcast channel with security constraints. We assume that a source broadcasts packets to two receivers, and that one of them has secrecy constraints, i.e., its packets need to be kept secret from the other receiver. The receiver with secrecy constraint has full-duplex capability, allowing it to transmit a jamming signal to increase its secrecy. We derive the average delay per packet and provide simulations and numerical results, where we compare different performance metrics for the cases when both receivers treat interference as noise, when the legitimate receiver performs successive decoding, and when the eavesdropper performs successive decoding. The results show that successive decoding provides better average packet delay for the legitimate user. Furthermore, we define a new metric that characterizes the reduction on the success probability for the legitimate user that is caused by the secrecy constraint. The results show that secrecy poses a significant amount of packet delay for the legitimate receiver when either receiver performs successive decoding. We also formulate an optimization problem, wherein the throughput of the eavesdropper is maximized under delay and secrecy rate constraints at the legitimate receiver. We provide numerical results for the optimization problem, where we show the trade-off between the transmission power for the jamming and the throughput of the non-legitimate receiver. The results provide insights into how channel ordering and encoding differences can be exploited to improve performance under different interference conditions.

Subject headings and genre

Added entries (persons, corporate bodies, meetings, titles ...)

  • Pappas, Nikolaos,1982-Linköpings universitet,Kommunikations- och transportsystem,Tekniska fakulteten(Swepub:liu)nikpa02 (author)
  • Mohapatra, ParthajitIndian Institute of Technology, Tirupati, India (author)
  • Carlsson, Niklas,1977-Linköpings universitet,Databas och informationsteknik,Tekniska fakulteten(Swepub:liu)nikca89 (author)
  • Linköpings universitetProgramvara och system (creator_code:org_t)

Related titles

  • In:SN Computer Science: Springer1:12661-89072662-995X

Internet link

Find in a library

To the university's database

  • 1 of 1
  • Previous record
  • Next record
  •    To hitlist

Search outside SwePub

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Close

Copy and save the link in order to return to this view