Physical Layer Security in Mixed UOWC-RF Networks With Energy Harvesting Relay Against Multiple Eavesdroppersopen access
- Authors
- "Ghosh, Moloy Kumar; Kundu, Milton Kumar; Ibrahim, Md.; Badrudduza, A.S.M.; Anower, Md. Shamim; Ansari, Imran Shafique; Solomon, Annie; Chakravarty, Sumit; Ahmed, Imtiaz; Yu, Heejung
- Issue Date
- 2024
- Publisher
- Institute of Electrical and Electronics Engineers Inc.
- Keywords
- Atmospheric modeling; colluding and non-colluding eavesdroppers; Eavesdropping; Effective secrecy throughput; energy harvesting; Energy harvesting; Fading channels; Radio frequency; Relays; secure outage probability; Throughput; underwater optical communication
- Citation
- IEEE Open Journal of the Communications Society, v.5, pp 1 - 1
- Pages
- 1
- Indexed
- SCOPUS
ESCI
- Journal Title
- IEEE Open Journal of the Communications Society
- Volume
- 5
- Start Page
- 1
- End Page
- 1
- URI
- https://scholar.korea.ac.kr/handle/2021.sw.korea/198257
- DOI
- 10.1109/OJCOMS.2024.3373476
- ISSN
- 2644-125X
- Abstract
- "In this study, physical layer security (PLS) in a dual-hop underwater optical wireless communication (UOWC)-radio frequency (RF) network under the intruding attempts of multiple eavesdroppers via RF links is considered. An intermediate decode-and-forward (DF) relay node between an underwater source and a destination transforms the optical signal into an electrical form and forwards it to the destination node with the help of harvested energy by the relay from an integrated power beacon within the system. The source-to-relay link, i.e., a UOWC link, is assumed to follow a mixture of exponential generalized Gamma turbulence with pointing error impairments whereas all the remaining links, i.e., RF links, are assumed to undergo κ-μ shadowed fading. Here, two eavesdropping scenarios are considered depending on the types of intruders, i.e., colluding (Scenario-I) and non-colluding (Scenario-II) eavesdropping operations. The analytical expressions of secrecy outage probability (SOP), probability of strictly positive secrecy capacity (SPSC), and effective secrecy throughput (EST) are derived for each scenario. Furthermore, the impacts of UOWC and RF channel parameters as well as detection techniques on secrecy capacity are demonstrated. A comparative study between two scenarios demonstrates that the collusion between the eavesdroppers imposes the most harmful threat on secrecy throughput but a better secrecy level can be attained by adopting diversity at the destination and power beacon nodes along with heterodyne detection rather than intensity modulation and direct detection technique. Finally, all the derived expressions are verified with the numerical results. Authors
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - Graduate School > Department of Electronics and Information Engineering > 1. Journal Articles

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.