Skip to main navigation Skip to search Skip to main content

Secrecy Performance of a Keyhole-Based Multi-User System With Multiple Eavesdroppers

  • Parwez Alam
  • , Ankit Dubey
  • , Jules M. Moualeu
  • , Telex M.N. Ngatched
  • , Chinmoy Kundu
  • Indian Institute of Technology Jammu
  • University of the Witwatersrand
  • McMaster University

Research output: Chapter in Book/Report/Conference proceedingsConference proceedingpeer-review

Abstract

This paper investigates the secrecy performance of a keyhole-aided multi-user communication network in the presence of multiple eavesdroppers. The communication happens through the same keyhole for legitimate users and eavesdroppers. In this context, the secrecy performance is evaluated for a user scheduling technique by obtaining the exact closed-form expression of secrecy outage probability (SOP). Further, a simplified asymptotic SOP expression is derived assuming high signal-to-noise ratio (SNR) scenario for a better understanding of the impact of system parameters. The effect of the keyhole parameters, number of users, number of eavesdroppers, and threshold secrecy rate on the SOP performance are also investigated for the considered system model. In the high-SNR regime, the asymptotic SOP saturates to a constant value and does not depend on the keyhole parameter and the channel parameter of the source-to-keyhole channel.

Original languageEnglish
Title of host publication2025 IEEE 101st Vehicular Technology Conference, VTC 2025-Spring 2025 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9798331531478
DOIs
Publication statusPublished - 2025
Event101st IEEE Vehicular Technology Conference, VTC 2025-Spring 2025 - Oslo, Norway
Duration: 17 Jun 202520 Jun 2025

Publication series

NameIEEE Vehicular Technology Conference
ISSN (Print)1550-2252

Conference

Conference101st IEEE Vehicular Technology Conference, VTC 2025-Spring 2025
Country/TerritoryNorway
CityOslo
Period17/06/2520/06/25

Keywords

  • Asymptotic analysis
  • keyhole
  • physical layer security
  • secrecy outage probability

Fingerprint

Dive into the research topics of 'Secrecy Performance of a Keyhole-Based Multi-User System With Multiple Eavesdroppers'. Together they form a unique fingerprint.

Cite this