{"title":"Reconfigurable Intelligent Surface Assisted Energy Constraint Wireless System under UAV Eavesdropper with Full-Duplex Jammer","authors":"Kehinde O. Odeyemi, Pius A. Owolawi","doi":"10.12720/jcm.18.8.514-521","DOIUrl":null,"url":null,"abstract":"—This paper study the security performance of a Reconfigurable Intelligent Surface (RIS) energy constraint wireless system under the presence of Unmanned Aerial Vehicle (UAV) eavesdropper, where a full-duplex jammer destination is powered by a dedicated power beacon. A time switching scheme with full-duplex operation is considered for the legitimate energy constraint destination to generate jamming signal to interfere the eavesdropper. In particular, the analytical closed-form expression of Connection Outage Probability (COP), Security Outage Probability (SOP) and Secrecy Throughput (ST) are derived to evaluate the performance of the proposed system. To achieve more insight about the system, the ST asymptotic expression is obtained. Moreover, the accuracy of the derived analytical expressions is justified by the Monte-Carlo simulation. Our results illustrate that the number of reflecting elements 𝑵 𝑬 , amount of SIC 𝝍 , and fading parameter 𝒎 𝑱𝑬 significantly affect the security performance of the concerned system.","PeriodicalId":53518,"journal":{"name":"Journal of Communications","volume":"88 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Communications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.12720/jcm.18.8.514-521","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"Engineering","Score":null,"Total":0}
引用次数: 0
Abstract
—This paper study the security performance of a Reconfigurable Intelligent Surface (RIS) energy constraint wireless system under the presence of Unmanned Aerial Vehicle (UAV) eavesdropper, where a full-duplex jammer destination is powered by a dedicated power beacon. A time switching scheme with full-duplex operation is considered for the legitimate energy constraint destination to generate jamming signal to interfere the eavesdropper. In particular, the analytical closed-form expression of Connection Outage Probability (COP), Security Outage Probability (SOP) and Secrecy Throughput (ST) are derived to evaluate the performance of the proposed system. To achieve more insight about the system, the ST asymptotic expression is obtained. Moreover, the accuracy of the derived analytical expressions is justified by the Monte-Carlo simulation. Our results illustrate that the number of reflecting elements 𝑵 𝑬 , amount of SIC 𝝍 , and fading parameter 𝒎 𝑱𝑬 significantly affect the security performance of the concerned system.
期刊介绍:
JCM is a scholarly peer-reviewed international scientific journal published monthly, focusing on theories, systems, methods, algorithms and applications in communications. It provide a high profile, leading edge forum for academic researchers, industrial professionals, engineers, consultants, managers, educators and policy makers working in the field to contribute and disseminate innovative new work on communications. All papers will be blind reviewed and accepted papers will be published monthly which is available online (open access) and in printed version.