At present, the fifth generation (5G) communication networks are in the time of large-scale deployment principally because its characteristics consists of large bandwidth, fast response, and high stability. As a partner of 5G, the Internet of Things (IoT) involves billions of devices around the world, which can make the wireless communication environment more intelligent and convenient. However, the problem that cannot be ignored is the physical layer security of 5G-IoT networks. Based on this, we perform a security analysis of cognitive radio networks (CRN) for IoT, where the CRN is the single-input multiple-output (SIMO) model experiencing κ-μ shadowed fading with multiple eavesdroppers. To analyze the confidentiality of the system under consideration, we analyze the security performance for the considered IoT systems with the help of the derived secure outage probability (SOP) and probability of strictly positive secrecy capacity (SPSC). As a verification of the theoretical formula, Monte Carlo simulation is also provided. The results of great interest are the factors that can produce better security performance in high SNRs region which consist of smaller M, smaller k, and larger N, and larger μ, smaller IP, and smaller Rth.
National Natural Science Foundation of China41174158Ministry of Land and Resources of the People’s Republic of China201311195-041. Introduction
On the fifth generation (5G) networks, Internet of Things (IoT) technology makes the data exchange between people and things and objects and objects more rapid and intelligent [1]. However, the physical layer security (PLS) problem, that is, the confidential signals between IoT entities are easy to be intercepted and decoded by eavesdroppers [2]. Therefore, how to improve the confidentiality performance of IoT systems is an urgent issue to be solved. There are two methods to deal with this problem; the first is based on the encryption and decryption algorithm of the network layer and above, and the other is to improve the security capacity of the channel by using the characteristics of the fading channel. In recent years, the latter, namely, physical layer security, has gradually become a hot topic in security research. Based on the channel capacity theory [3] and the classic Wyner’s eavesdropping model [4], Wei et al. in [5] described the optimal power of artificial noise to ensure the best antieavesdropping ability in the wiretap networks experiencing Rayleigh fading. The PLS of nonorthogonal multiple access (NOMA) networks [6] and relaying 5G networks [7] with Rayleigh channels were developed. The authors in [8] studied the factors that affect the security capability of Wyner’s model based on Rician channel, where analytical SOP were deduced and proved. The physical performance and security of nonideal IoT networks over Nakagami-m fading channels were investigated through two important metrics, namely, outage probability (OP) and intercept probability (IP) [9].
Different from the channels described above, the universality of generalized channels, that can be equivalent to other fading channels, has recently received considerable attention. [10–16]. On the premise of fully considering the actual unfavourable factors of the relaying wireless communication networks (WCNs) over Weibull channels, Li et al. [10] has completed the derivation of the exact formula of OP and the asymptote. The work in [11] developed the approximate expression of probability density function (PDF) and obtained the SOP analysis of the classical Wyner’s systems over generalized-K fading channels. Based on the proposed IoT relay networks, the authors of [12] explored the theoretical derivation and simulation analysis of OP and average symbol error probability (ASEP). In [13], when all the links in the wiretap networks suffered from κ-μ fading, Bhargav et al. derived the lower limit of SOP and the closed-form expression of SPSC. Under the condition of imperfect signal transmission, the authors in [14] obtained the theoretical formula of OP in considered model over α-μ fading with two different scenarios. Referring to Wyner’s classical wiretap model, Kong et al. derived and analyzed the SOP and the probability of nonzero secrecy capacity (PNZ) of Fox’s H-Function [15] channels and Fisher-Snedecor F [16] channels, respectively.
Recently, security issues are very important for popular applications such as Internet of vehicles [17], neural networks [18], and big data [19]. As a developing strategy to solve the obstacles of spectrum scarcity and power allocation in IoT networks, CRN can significantly improve the transmission range and quality have gained great attention in recent literatures [20–26]. With the aid of artificial noise, the IP in the secondary network over Gaussian channel was investigated in [20]. The cooperation of multiple secondary users will further enhance the capacity of CRN; based on this, two different protocols were proposed, and achievable ergodic secrecy rate (ESR) was used to analyze the security performance of the considered system [21]. By employing a CRN network, which suffered from Rayleigh fading and had a legitimate receiver with multiple antennas, the authors of [22] provided the derivation of PNZ and SOP. In [23, 24], Lei et al. studied the security performance of CRNs undergoing Nakagami-m fading and generalized-K fading, respectively. The study of Zhang et al. [25] proposed a method to improve the security capacity of primary networks and secondary networks simultaneously and discussed the strategy of power allocation and band sharing. The authors in [26] studied the secrecy performance of nonorthogonal multiple access (NOMA) CRN over Nakagami-m fading channels, in which connection outage probability (COP), SOP, and effective secrecy throughput (EST) were obtained in a unified form.
More recently, the κ-μ shadowed model was first introduced by Paris in [27], and it is a generalized fading channel, which can be simplified as Rayleigh, Rician shadowed, one-side Gaussian, Nakagami-m, and κ-μ under suitable conditions. Moreover, the κ-μ shadowed fading can be applied to different systems including IoT links [28], satellite channels [29], and underwater links [30]. According to the proposed mobile communication model with κ-μ shadowed fading, the authors of [31] studied the transmission performance by analyzing OP and ergodic channel capacity (ECC). The statistical characteristics of different shadowed κ-μ fading were derived in [32], where the closed-form PDF and cumulative distribution function (CDF) for envelope and signal-to-noise ratio (SNR) were obtained, respectively. The work in [33] investigated the outage performance of hexagonal network affected by κ-μ shadowed fading in term of analyzing the performance benchmark, namely, outage probability and rate. Sun et al. in [34] presented the derivation of SOP and SPSC for the systems over κ-μ shadowed distribution, in which legitimate users and eavesdroppers were both single antenna receivers. As continuations of [34], the security analyses of SIMO networks and decode-and-forward (DF) relaying networks were carried out in [35, 36].
So far, we have not discovered relative research based on CRN over κ-μ shadowed distribution in the open database, let alone the existence of multiple antennas and multieavesdroppers. Therefore, combined with the advantages of multiantenna technology [37, 38], this paper is explored. We first present a CRN for IoT, in which the subchannels undergo κ-μ shadowed fading. Then, we derive the mathematical expressions of SOP and SPSC under the condition of multiple eavesdroppers. Finally, Monte Carlo simulations are provided to compare with the mathematical analysis; moreover, some valuable conclusions are obtained. The work can provide theoretical basis for the security performance evaluation of WCNs (5G, Internet of vehicles, etc.).
The paper is arranged as follows; this section mainly introduces the background, related literatures, and motivation. In Section 2, we explain the CRN model for IoT over κ-μ shadowed fading channels, and the PDF and CDF of the channels with multiple eavesdropping terminals are also illustrated. SOP analysis is presented in Section 3. The theoretical derivation of SPSC is made in Section 4. Section 5 provides the numerical results and some interesting results. The conclusions of the paper appear in Section 6.
2. IOT System Model and Properties of Generalized Channels2.1. IOT System Model
The work considers a four entities CRN model for IoT, as shown in Figure 1, where S is the data source of the secondary networks, while P is the sender of the primary networks, and D is the preset receiver, which uses multiple antennas ND to receive signals. There are many eavesdroppers E1,E2,…,EM equipped with multiple antennas NE. The secondary network is composed of S, D, and E. Underlay CRN makes spectrum sharing possible, but the cost is that the power of S will not affect the communication of the main networks. hSP is interpreted as the channel coefficient of the link S⟶P and the channel coefficients of main link S⟶D and wiretap link S⟶E are hD and hE, respectively. It should be noted that hD and hE are vectors because of multiantenna reception at D and E. In our model, we consider passive eavesdropping scenarios, where S does not know the channel state information (CSI) of the wiretap link, but grasps the CSI of the main link.
The CRN model for IoT.
S will communicate with P, D, and E in the considered IoT networks at the same time. Suppose the secret signal from S is x; then, we have(1)ySP=PShSPx+zSP,ySD=PShDx+zD,ySE=PShEx+zE,where PS is the output power of S, ySP is the signal received by P, zSP is the complex white Gaussian noise on the link from S to P, the statistical expectation of zSP is zero, and the standard deviation is σ. ySD and ySE represent the received signal matrices of D and E, while zD and zE denote noise matrices, and both standard deviations are σ.
2.2. Properties of Generalized Channels
The generalized channels considered in our IoT model is κ-μ shadowed fading channel. This section describes its statistical properties, mainly including the PDFs and CDFs for SNRs in link S⟶P, link S⟶D, and link S⟶E. Relying on [27], the PDF for κ-μ shadowed variable can be expressed as(2)fγ=μμmm1+kμΓμμk+mmΩμe−μ1+kγ/Ω×γμ−1F11m,μ;μ2k1+kγμk+mΩ,where the parameters used to determine the κ-μ shadowed variable are k, μ, and m. γ and Ω are described as the instantaneous SNR and average SNR on κ-μ shadowed fading channels, Γ⋅ denotes the Gamma function (equation (8.310.1) in [39]), and F11⋅ is defined as confluent hypergeometric function (equation (9.14.1) in [39]), respectively.
According to (2) and [34], we can obtain the PDF and CDF for the SNR at the link from S⟶P as(3)fsγ=asμsbsms1Γμs∑q=0∞msqμsqq!×asksμsbsmsqγμs+q−1e−asγ,(4)Fsγ=bs−ms1Γμs∑q=0∞msqksμs/bsmsqμsqq!×μs+q−1!1−e−asγ∑s=0μs+q−1asγss!,where as=μs1+ks/Ωs, bs=μsks+ms/ms. s in the lower right corner indicates that the parameter belongs to the channel S⟶P.
Because the expected receiver (D) has ND antennas and the maximum ratio combining (MRC) merging is adopted, the pdf for random variable (RV) at S⟶D can be formulated as [35](5)fDγ=NDaDNDμDbD−NDmDΓNDμD∑q=0∞NDmDqNDμDqq!×NDaDkDμDbDmDqγNDμD+q−1e−NDaDγ,where xy means Pochammer calculation [39]. From (4), we can deduce the CDF of RV at S⟶D as(6)FDγ=bD−NDmD1ΓNDμD∑q=0∞NDmDqNDμDqq!×kDμDbDmDqNDμD+q−1!×1−e−NDaDγ∑s=0NDμD+q−1NDaDγss!,for eavesdropping channel S⟶E with multiple eavesdroppers cooperation. Employing [35], we can obtain the PDF of the eavesdropping link as(7)fEγ=NEaENEμEbE−NEmEΓNEμE×∑q=0∞NEmEqMNEμE+qNEμEqq!×NEaEkEμEbEmEqγNEμE+q−1e−NEaEγ/M.
3. SOP Analysis
For the IoT systems, we need clear benchmarks to measure its security performance [40]. For the passive eavesdropping scenario considered in our model, SOPs are very suitable criteria, which can be understood as the probability that the difference value between the instantaneous capacity of the main link and the capacity of the eavesdropping link is less than a fixed threshold Rth [41], and SOP can be written as(8)Sop=PCD−CE≤Rth,where CD−CE is the difference value between the instantaneous capacity of S⟶D and S⟶E.
Two constraints that must be considered in underlay CRN are (i) the power of S cannot exceed the maximum power value Psm and (ii) the power of S should not exceed the threshold of anti-interference ability IP to the primary networks. Referring to (9) and [24], SOP in underlay CRN can be expressed as(9)Sop=PCD−CE≤Rth=PCD−CE≤Rth,PS=Psm+PCD−CE≤Rth,PS=IPX=P1+P2,where X is the instantaneous SNR of the link of S⟶P. Next, we will derive P1 and P2 in (9).
3.1. Calculation of P1
P1 can be further written as(10)P1=PCD−CE≤Rth,X≤IPPsm=PγD≤θγE+θ−1ςPX≤IPPsm=J1J2,where θ=eRth and ς=Psm/σ2, and we obtain(11)J1=∫0∞FDθγE+θ−1ςfEγEdγE.
Employing (6) and (7), we have(12)J1=Λ1∫0∞1−e−NDaDθγE+θ−1/α×∑s=0NDμD+q−1NDaDθγE+θ−1/ςss!×γNEμE+p−1exp−NEaEγEMdγE,where(13)Λ1=bD−NDmDΓNDμD∑q=0∞NDmDqkDμD/bDmDqNDμDqq!×NDμD+q−1!NEaENEμE×bE−NEmEΓNEμE∑p=0∞NEmEpNEaEkEμE/bEmEpMNEμE+pNEμEpp!,utilizing equation (1.111) in [39],(14)θγE+θ−1ςs=∑t1=0st1sθt1γEt1θ−1ςs−t1.
Then, making using of equation (3.381.4) in [39], after a more complex integral operation, we have(15)J1=Λ1Λ2−e−NDaDΘ−1/ς×∑s=0NDμD+q−1NDaDs∑t1=0ss/t1θt1θ−1/ςs−t1s!×ΓNEμE+p+t1NDaDθ+NEaE/MNEμE+p+t1,where(16)Λ2=ΓNEμE+pNEaE/MNEμE+p.
From (4), J2 is derived as(17)J2=PX≤IPPsm=bs−msΓμs∑q=0∞msqksμs/bsmsqμs+q−1!μsqq!×1−e−asIP/Psm∑s=0μs+q−1asIP/Psmss!.
3.2. Calculation of P2
It can be seen from (9), P2 is stated as(18)P2=PCD−CE≤Rth,PS=IPX.
Referring to [22], we can rewrite P2 as(19)P2=∫IP/Psm∞Gxfsxdx,where(20)Gx=∫0∞FDθy+θ−1xξfEydy.
In (20), ξ=IP/σ2. By means of (6) and (7), Gx can be derived as(21)Gx=Λ1Λ2−e−NDaDθ−1x/ξΛ3xs−t2,where(22)Λ3=ΓNEμE+p+t2NDaDθ+NEaE/MNEμE+p+t1×∑s=0NDμD+q−1NDaDss!∑t2=0st2sθt2θ−1ξs−t2.
Replacing Gx in (19) with (21), then, after the integral is completed by using equation (3.351.2) in [39], we obtain the derivation of P2 as(23)P2=Λ1asμsbsms1Γμs∑q=0∞msqasksμs/bsmsqμsqq!×Λ2as−μs+qΓμs+q,asIPPmax−Λ3as−s−t2+μs+qΓs−t2+μs+q,as+NDaDθ−1ξIPPsm,where Γa,b is called the incomplete Gamma function (equation (8.350.2) in [39]).
According to (15), (17), (23), and (9), we finally deduce the theoretical analysis formula of SOP.
4. SPSC Analysis
For passive eavesdropping scenarios, SPSC is often used to investigate the confidentiality of WCNs; therefore, we explore the SPSC of IoT networks in this section. According to the definition of SPSC in [41], we know that it can understand the probability that the difference value of instantaneous capacity between main channel and eavesdropping channel is not less than zero, which can be formulated as(24)Spsc=1−PCD−CE≤0=1−∫0∞FDγEfEγEdγE=1−Ξ.
For Ξ in (24), after replacing the integral term with (6) and (7), we can obtain(25)Ξ=∫0∞bD−NDmDΓNDμD∑q=0∞NDmDqNDμDqq!×kDμDbDmDqNDμD+q−1!×1−∑s=0NDμD+q−1e−NDaDγNDaDγss!×NEaENEμEbE−NEmEΓNEμE∑p=0∞NEmEpMNEμE+pNEμEpp!=Λ1Λ2−∑s=0NDμD+q−1NDaDss!×ΓNEμE+p+sNEaE/M+NDaDNEμE+p+s.
Finally, by employing (24), we can complete the proof of SPSC.
5. Numerical Results
In this part, we perform the theoretical simulations of (9) and (24). As a verification of correctness, Monte Carlo simulations are also obtained for comparison with the analysis results. From all simulation diagrams (Figures 2–9), we can capture the following information. (i) All the analysis curves coincide well with the statistical simulation curves. (ii) All simulation results change with abscissa, namely, ΩD, and the change trend indicates that a large ΩD can improve the security of IoT systems. Moreover, matlab simulations show that the convergence condition of the analytical expression including infinite series is that the upper limit of the cycle is 55 times.
SOP versus ΩD with various (M), where kS=kD=kE=2, μS=μD=μE=2, mS=mD=mE=1, ND=NE=2, Rth=0.1, and IP=0.1.
SPSC versus ΩD with various (M), where kS=kD=kE=2, μS=μD=μE=2, mS=mD=mE=1, ND=NE=2, Rth=0.1, and IP=0.1.
SOP versus ΩD with various (N), where kS=kD=kE=2, μS=μD=μE=2, mS=mD=mE=1, M=2, Rth=0.1, and IP=0.1.
SPSC versus ΩD with various (N), where kS=kD=kE=2, μS=μD=μE=2, mS=mD=mE=1, M=2, Rth=0.1, and IP=0.1.
(a) SOP versus ΩD with various k, where μS=μD=μE=2, mS=mD=mE=1, ND=NE=2, M=2, Rth=0.1, and IP=0.1. (b) SOP versus ΩD with various μ, where kS=kD=kE=2, mS=mD=mE=1, ND=NE=2, M=2, Rth=0.1, and IP=0.1.
(a) SPSC versus ΩD with various k where μS=μD=μE=2, mS=mD=mE=1, ND=NE=2, M=2, Rth=0.1, and IP=0.1. (b) SPSC versus ΩD with various μ, where kS=kD=kE=2, mS=mD=mE=1, ND=NE=2, M=2, Rth=0.1, and IP=0.1.
SOP versus ΩD with various IP, where kS=kD=kE=2, μS=μD=μE=2, mS=mD=mE=1, ND=NE=2, M=2, and Rth=0.1.
SOP versus ΩD with various Rth, where kS=kD=kE=2, μS=μD=μE=2, mS=mD=mE=1, ND=NE=2, M=2, and IP=0.1.
Figures 2 and 3 indicate how the SOP and SPSC change with ΩD when M takes different values. From Figure 2, we can see that when ΩD is fixed, the value of SOP will rise along with the rise of M. In Figure 3, the increase of M will lead to the decrease of SPSC. Moreover, the distances between curves represented by different M are larger. Therefore, we conclude that the increase of the number of eavesdroppers will significantly reduce the performance of IoT model.
The influence of the number of antennas on the safety performance is provided in Figures 4 and 5. We assume ND=NE=N. According to simulation curves, a valuable discovery is that when the value of abscissa is greater than 9 dB; the increase of antenna number, i.e., N, will decrease the SOP and increase the SPSC. This means that, under the mechanism of high SNR, the security can be improved by increasing the number of receiving antennas. On the contrary, in the case of small SNR, the increase of the number of antennas will reduce the ability of security.
When the shape parameters k and μ of the generalized channel change, the security analyses are shown in Figures 6 and 7. We suppose that kS=kD=kE=k and μS=μD=μE=μ, where the subscript S, D, and E indicate that the links are S⟶P, S⟶D, and S⟶E, respectively. Referring to Figures 6(a) and 7(a), we can see that the gradual increase of k causes the increase of SOP and the decrease of SPSC with ΩD≥7 dB. However, the effect of increasing μ on the IoT systems is opposite to that of k based on Figures 6(b) and 7(b).
IP means the threshold of anti-interference ability to the primary networks. Figure 8 describes its effect on SOP for IoT networks under consideration.Rin represents the threshold value of security capacity interruption, the impact of its change on system performance is illustrated in Figure 9. When IP changes from 5 dB to −7 dB, then to 15 dB and Rth from 0.1 dB to 0.5 dB and then to 1 dB, the change trend of SOP is gradually decreasing. Therefore, we can find that smaller IP and smaller Rth will increase the probability of system security interruption. Moreover, it is interesting that the impact of IP on security is more significant than that of Rth.
m is also an important parameter of κ-μ shadowed distribution, which represents the degree of shadow fading. The simulation results show that when the high SNR is established, the increase of m will improve the SPSC and reduce the SOP, but the difference between the curves is very small. In other words, the impact of m on the security performance is not obvious.
Good security performance requires as small as possible SOP and as large as possible SPSC. Through the above analysis of all simulations, we can obtain that larger M, larger k, and smaller N will worsen the security of the system when the SNR is large. Meanwhile, we also know that larger μ, smaller IP, and smaller Rth will enhance the security performance.
6. Conclusion
In this paper, we explore PHY layer security of Underlay CRNs for IoT networks over generalized fading channels on the basis of the derived SOP and SPSC. The CRN model with multiple antennas can be used in many different situations. The analytical formulas for SOP and SPSC are derived in a concise form. The accuracy of the analytical formulas is verified by Monte Carlo simulations. Moreover, we discuss the influence of the parameters including M, N, k, μ, IP, and Rth on the security of IoT networks.
Data Availability
The data used to support the findings of this study are available from the corresponding author upon request.
Conflicts of Interest
The authors declare that there are no conflicts of interest regarding the publication of this paper.
Acknowledgments
This work was supported in part by the National Natural Science Foundation of China under Grant 41174158 and Ministry of Land and Resources P.R.C. Special Project in the Public Interest under Grant 201311195-04.
AkpakwuG. A.SilvaB. J.HanckeG. P.Abu-MahfouzA. M.A survey on 5G networks for the Internet of things: communication technologies and challenges201863619364710.1109/access.2017.27798442-s2.0-85038405184SeliemM.ElgazzarK.KhalilK.Towards privacy preserving IoT environments: a survey2018201815103276110.1155/2018/10327612-s2.0-85058294386ShannonC. E.Communication theory of secrecy systems194928465671510.1002/j.1538-7305.1949.tb00928.x2-s2.0-84890522850WynerA. D.The wire-tap channel19755481355138710.1002/j.1538-7305.1975.tb02040.x2-s2.0-0016562514WeiH.HouX.ZhuY.WangD.Security analysis for rayleigh fading channel by artificial noiseProceedings of the 2014 Sixth International Conference On Wireless Communications And Signal Processing2014Hefei, ChinaWCSP)16LiX.ZhaoM.LiuY.LiL.DingZ.Secrecy analysis of ambient backscatter NOMA systems under I/Q imbalance2020110.1109/tvt.2020.3006478LiX.MengyanH.LiuY.MenonV. G.PaulA.DingZ.I/Q imbalance aware nonlinear wireless-powered relaying of b5g networks: security and reliability analysis20060390210.1109/tnse.2020.3020950AiY.KongL.CheffenaM.Secrecy outage analysis of double shadowed Rician channels2019551376576710.1049/el.2019.07072-s2.0-85067983292LiX.HuangM.LiJ.YuQ.RabieK.Secure analysis of multi-antenna cooperative networks with residual transceiver HIs and CEEs201913172649265910.1049/iet-com.2019.00112-s2.0-85073737499LiX.LiJ.LiL.Performance analysis of impaired SWIPT NOMA relaying networks over imperfect Weibull channels2020141669672ZhaoH.LiuY.Sultan-SalemA.AlouiniM.-S.A simple evaluation for the secrecy outage probability over generalized-K fading channels20192391479148310.1109/lcomm.2019.29263602-s2.0-85072246584DziriA.TerreM.NasserN.Performance analysis of relay selection for iot networks over generalized k distributionProceedings of the 2019 15th International Wireless Communications And Mobile Computing Conference (IWCMC)2019Tangier, Morocco14111415BhargavN.CottonS. L.SimmonsD. E.Secrecy capacity analysis over $\kappa $ - $\mu $ fading channels: theory and applications20166473011302410.1109/tcomm.2016.25655802-s2.0-84978700088LiX.LiJ.LiuY.DingZ.NallanathanA.Residual transceiver hardware impairments on cooperative NOMA networks202019168069510.1109/twc.2019.2947670KongL.KaddoumG.CherguiH.On physical layer security over fox’s $H$-function wiretap fading channels20196876608662110.1109/tvt.2019.29150172-s2.0-85069778136KongL.KaddoumG.On physical layer security over the Fisher-snedecor ${\mathcal{F}}$ wiretap fading channels20186394663947210.1109/access.2018.28537002-s2.0-85049670916XuL.YuX.WangH.Physical layer security performance of mobile vehicular networks2020252643649XuL.WangJ.WangH.BP neural network-based ABEP performance prediction for mobile internet of things communication systems201910.1007/s00521-019-04604-zWangH.XuL.YanZ.GulliverT. A.Low complexity MIMO-FBMC sparse channel parameter estimation for industrial big data communications2020202011299559810.1109/TII.2020.2995598XieP.ZhangM.ZhangG.ZhengR.On physical-layer security for primary system in underlay cognitive radio networks201872687310.1049/iet-net.2017.01382-s2.0-85042766049QinM.YangS.DengH.LeeM. H.Enhancing security of primary user in underlay cognitive radio networks with secondary user selection20186326243263610.1109/access.2018.28418752-s2.0-85047806903ZhaoH.LiuH.LiuY.TangC.PanG.Physical layer security of maximal ratio combining in underlay cognitive radio unit over rayleigh fading channelsProceedings of the 2015 IEEE International Conference On Communication Software And Networks2015Chengdu, ChinaICCSN)201205LeiH.ZhangH.AnsariI. S.GaoC.Secrecy outage performance for SIMO underlay cognitive radio systems with generalized selection combining over Nakagami-20166512101261013210.1109/tvt.2016.25368012-s2.0-85012975570LeiH.ZhangH.AnsariI. S.PanG.QaraqeK. A.Secrecy outage analysis for SIMO underlay cognitive radio networks over generalized-K fading channels201623811061110ZhangY.LuR.CaoB.ZhangQ.Cooperative jamming-based physical-layer security of cooperative cognitive radio networks: system model and enabling techniques201913553954410.1049/iet-com.2018.52162-s2.0-85066068363XiangZ.YangW.PanG.CaiY.Physical layer security in cognitive radio inspired NOMA network201913370071410.1109/jstsp.2019.29021032-s2.0-85062384804ParisJ. F.Statistical characterization of κ-μ shadowed fading201463251852610.1109/tvt.2013.22812132-s2.0-84896897947Moreno-PozasL.Lopez-MartinezF. J.CottonS. L.ParisJ. F.Martos-NayaE.Comments on human body shadowing in cellular device-to-device communications: channel modelling using the shadowed κ-μ fading model201735251752010.1109/jsac.2016.26386582-s2.0-85017293672ArtiM. K.Beamforming and combining based scheme over κ-μ shadowed fading satellite channels201610152001200910.1049/iet-com.2016.04512-s2.0-84990026689IlliE.El BouananiF.AyoubF.Asymptotic analysis of underwater communication system subject to κ-μ shadowed fading channelProceedings of the 2017 13th International Wireless Communications And Mobile Computing Conference2017Valencia, SpainIWCMC)855860SinghI.SinghN. P.Outage probability and ergodic channel capacity of underlay device-to-device communications over κ-μ shadowed fading channels202026157358210.1007/s11276-019-02164-7SimmonsN.Da SilvaC. R. N.CottonS. L.SofotasiosP. C.On shadowing the κ-μ fading model202020209300552710.1109/ACCESS.2020.3005527KumarS.KalyaniS.Outage probability and rate for κ-μ shadowed fading in interference limited scenario201716128289830410.1109/twc.2017.27608222-s2.0-85045449273SunJ.LiX.HuangM.DingY.JinJ.Performance analysis of physical layer security over κ-μ shadowed fading channels201812897097510.1049/iet-com.2017.12682-s2.0-85046088284SunJ.BieH.LiX.RabieK. M.KharelR.Average secrecy capacity of simo κ-μ shadowed fading channels with multiple eavesdroppersProceedings of the 2020 IEEE Wireless Communications And Networking Conference (WCNC)2020Seoul, Korea16SunJ.BieH.LiX.Security performance analysis of SIMO relay systems over Composite Fading Channels202014626492669ChuZ.ZhuZ.JohnstonM.Le GoffS. Y.Simultaneous wireless information power transfer for MISO secrecy channel20166596913692510.1109/tvt.2015.24994392-s2.0-84990875266ZhuZ.ChuZ.ZhouF.NiuH.WangZ.Secure beamforming designs for secrecy MIMO SWIPT systems20187342442710.1109/lwc.2017.27808302-s2.0-85037593259GradshteynI. S.RyzhikI. M.2007Cambridge, MA, USAAcademic PressNeshenkoN.Bou-HarbE.CrichignoJ.KaddoumG.GhaniN.Demystifying IoT security: an exhaustive survey on IoT vulnerabilities and a first empirical look on internet-scale IoT exploitations20192132702273310.1109/comst.2019.29107502-s2.0-85070586333BlochM.BarrosJ.RodriguesM. R.McLaughlinS. W.Wireless information-theoretic security20085462515253410.1109/tit.2008.9219082-s2.0-45249104850