TY - GEN
T1 - Secrecy Performance of a Keyhole-Based Multi-User System With Multiple Eavesdroppers
AU - Alam, Parwez
AU - Dubey, Ankit
AU - Moualeu, Jules M.
AU - Ngatched, Telex M.N.
AU - Kundu, Chinmoy
N1 - Publisher Copyright:
© 2025 IEEE.
PY - 2025
Y1 - 2025
N2 - This paper investigates the secrecy performance of a keyhole-aided multi-user communication network in the presence of multiple eavesdroppers. The communication happens through the same keyhole for legitimate users and eavesdroppers. In this context, the secrecy performance is evaluated for a user scheduling technique by obtaining the exact closed-form expression of secrecy outage probability (SOP). Further, a simplified asymptotic SOP expression is derived assuming high signal-to-noise ratio (SNR) scenario for a better understanding of the impact of system parameters. The effect of the keyhole parameters, number of users, number of eavesdroppers, and threshold secrecy rate on the SOP performance are also investigated for the considered system model. In the high-SNR regime, the asymptotic SOP saturates to a constant value and does not depend on the keyhole parameter and the channel parameter of the source-to-keyhole channel.
AB - This paper investigates the secrecy performance of a keyhole-aided multi-user communication network in the presence of multiple eavesdroppers. The communication happens through the same keyhole for legitimate users and eavesdroppers. In this context, the secrecy performance is evaluated for a user scheduling technique by obtaining the exact closed-form expression of secrecy outage probability (SOP). Further, a simplified asymptotic SOP expression is derived assuming high signal-to-noise ratio (SNR) scenario for a better understanding of the impact of system parameters. The effect of the keyhole parameters, number of users, number of eavesdroppers, and threshold secrecy rate on the SOP performance are also investigated for the considered system model. In the high-SNR regime, the asymptotic SOP saturates to a constant value and does not depend on the keyhole parameter and the channel parameter of the source-to-keyhole channel.
KW - Asymptotic analysis
KW - keyhole
KW - physical layer security
KW - secrecy outage probability
UR - https://www.scopus.com/pages/publications/105019039233
U2 - 10.1109/VTC2025-Spring65109.2025.11174874
DO - 10.1109/VTC2025-Spring65109.2025.11174874
M3 - Conference proceeding
AN - SCOPUS:105019039233
T3 - IEEE Vehicular Technology Conference
BT - 2025 IEEE 101st Vehicular Technology Conference, VTC 2025-Spring 2025 - Proceedings
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 101st IEEE Vehicular Technology Conference, VTC 2025-Spring 2025
Y2 - 17 June 2025 through 20 June 2025
ER -