Secrecy capacity analysis of bi-static backscatter communication systems
نویسندگان
چکیده
The rapid adoption of battery-free internet-of-things (IoT) sensors in multiple environments ranging from agriculture to wildlife surveillance, has seen increased research interest backscatter communication (BSC) technology. BSC is viewed as a potential technology enable the further spread sustainable IoT applications and scenarios where bulkier-sized battery-powered devices would be unsuitable. In this study, we investigate secrecy capacity bi-static network presence malicious eavesdropper. proposed system consists reader, devices, an We derive closed-form strictly positive (SPSC) expressions ergodic (ESC) for reader. Monte Carlo simulations verify exact expressions.
منابع مشابه
Outage Analysis of Ambient Backscatter Communication Systems
This paper addresses the problem of outage characterization of an ambient backscatter communication system with a pair of passive tag and reader. In particular, an exact expression for the effective channel distribution is derived. Then, the outage probability at the reader is analyzed rigorously. Since the expression contains an infinite sum, a tight truncation error bound has been derived to ...
متن کاملOn the Capacity of Bi-static Modulated Re-scatter Systems
In ambient re-scatter1 communications, devices convey information by modulating and re-scattering the radio frequency signals impinging on their antennas. In this correspondence, we consider a system consisting of a modulated continuous carrier multiple-input multiple-output (MIMO) link (primary) and a multi-antenna modulated re-scatter (MRS) node (secondary), where the MRS node uses the signal...
متن کاملStatic Analysis of Dynamic Communication Systems
Prominent examples of dynamic communication systems include traffic control systems and ad hoc networks. Dynamic communication systems are hard to verify due to inherent unboundedness. Unbounded creation and destruction of objects and a dynamically evolving communication topology are characteristic features. Partner graph grammars are presented as an adequate specification formalism for dynamic...
متن کاملStatic Analysis with Set-Closure in Secrecy
We report that the homomorphic encryption scheme can unleash the possibility of static analysis of encrypted programs. Static analysis in cipher-world is desirable in the static-analysis-as-a-service setting, because it allows the program owners to encrypt and upload their programs to the static analysis service while the service provider can still analyze the encrypted programs without decrypt...
متن کاملAn Introduction to Secrecy Capacity
This paper introduces the reader to several information theoretic aspects of covert communications. In particular, it discusses fundamental limits on the amount of information that can be reliably communicated in such a way that a malevolent third-party observer cannot decode the messages. This situation is considered first for a system with a single intended receiver, and then extensions of se...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Bulletin of Electrical Engineering and Informatics
سال: 2022
ISSN: ['2302-9285']
DOI: https://doi.org/10.11591/eei.v11i6.3981