{"id":"https://openalex.org/W2959329152","doi":"https://doi.org/10.1109/icc.2019.8761295","title":"Novel QoS-Aware Physical Layer Security Analysis Considering Random Inter-Node Distances","display_name":"Novel QoS-Aware Physical Layer Security Analysis Considering Random Inter-Node Distances","publication_year":2019,"publication_date":"2019-05-01","ids":{"openalex":"https://openalex.org/W2959329152","doi":"https://doi.org/10.1109/icc.2019.8761295","mag":"2959329152"},"language":"en","primary_location":{"id":"doi:10.1109/icc.2019.8761295","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2019.8761295","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2019 - 2019 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5081971398","display_name":"Bhawna Ahuja","orcid":"https://orcid.org/0000-0003-1728-9202"},"institutions":[{"id":"https://openalex.org/I68891433","display_name":"Indian Institute of Technology Delhi","ror":"https://ror.org/049tgcd06","country_code":"IN","type":"education","lineage":["https://openalex.org/I68891433"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Bhawna Ahuja","raw_affiliation_strings":["Bharti School of Telecommunication Technology and Management, Indian Institute of Technology, Delhi, India"],"affiliations":[{"raw_affiliation_string":"Bharti School of Telecommunication Technology and Management, Indian Institute of Technology, Delhi, India","institution_ids":["https://openalex.org/I68891433"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100770198","display_name":"Deepak Mishra","orcid":"https://orcid.org/0000-0002-3225-6495"},"institutions":[{"id":"https://openalex.org/I102134673","display_name":"Link\u00f6ping University","ror":"https://ror.org/05ynxx418","country_code":"SE","type":"education","lineage":["https://openalex.org/I102134673"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Deepak Mishra","raw_affiliation_strings":["Department of Electrical Engineering (ISY), Link\u00f6ping University, Sweden"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering (ISY), Link\u00f6ping University, Sweden","institution_ids":["https://openalex.org/I102134673"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5046405021","display_name":"Ranjan Bose","orcid":"https://orcid.org/0009-0009-2498-4896"},"institutions":[{"id":"https://openalex.org/I68891433","display_name":"Indian Institute of Technology Delhi","ror":"https://ror.org/049tgcd06","country_code":"IN","type":"education","lineage":["https://openalex.org/I68891433"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Ranjan Bose","raw_affiliation_strings":["Bharti School of Telecommunication Technology and Management, Indian Institute of Technology, Delhi, India"],"affiliations":[{"raw_affiliation_string":"Bharti School of Telecommunication Technology and Management, Indian Institute of Technology, Delhi, India","institution_ids":["https://openalex.org/I68891433"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5081971398"],"corresponding_institution_ids":["https://openalex.org/I68891433"],"apc_list":null,"apc_paid":null,"fwci":0.2385,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.54226471,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10148","display_name":"Advanced MIMO Systems Optimization","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9943000078201294,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.9479467868804932},{"id":"https://openalex.org/keywords/physical-layer","display_name":"Physical layer","score":0.856614351272583},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.822938084602356},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.6710456609725952},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.630160927772522},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.6276601552963257},{"id":"https://openalex.org/keywords/probabilistic-logic","display_name":"Probabilistic logic","score":0.6246379613876343},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6010388731956482},{"id":"https://openalex.org/keywords/quality-of-service","display_name":"Quality of service","score":0.5553876757621765},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.5050001740455627},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.4777611792087555},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4656824469566345},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.44134801626205444},{"id":"https://openalex.org/keywords/secure-communication","display_name":"Secure communication","score":0.4238259494304657},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.41239750385284424},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.1806679666042328},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.1500006914138794},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1041308343410492},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.08933007717132568}],"concepts":[{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.9479467868804932},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.856614351272583},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.822938084602356},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.6710456609725952},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.630160927772522},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.6276601552963257},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.6246379613876343},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6010388731956482},{"id":"https://openalex.org/C5119721","wikidata":"https://www.wikidata.org/wiki/Q220501","display_name":"Quality of service","level":2,"score":0.5553876757621765},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.5050001740455627},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.4777611792087555},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4656824469566345},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.44134801626205444},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.4238259494304657},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.41239750385284424},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.1806679666042328},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.1500006914138794},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1041308343410492},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.08933007717132568},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc.2019.8761295","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2019.8761295","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2019 - 2019 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W1667165204","https://openalex.org/W2080693943","https://openalex.org/W2113629043","https://openalex.org/W2159215084","https://openalex.org/W2498444259","https://openalex.org/W2576157399","https://openalex.org/W2752397115","https://openalex.org/W2806384923","https://openalex.org/W2865879387","https://openalex.org/W2904407890","https://openalex.org/W2964113506"],"related_works":["https://openalex.org/W2765236478","https://openalex.org/W3026705917","https://openalex.org/W2516026999","https://openalex.org/W2155410265","https://openalex.org/W2769689807","https://openalex.org/W3121990887","https://openalex.org/W3166880716","https://openalex.org/W2904430835","https://openalex.org/W4360996312","https://openalex.org/W2529506699"],"abstract_inverted_index":{"Physical":[0],"layer":[1],"security":[2,37],"(PLS)":[3],"in":[4,19,34],"wireless":[5],"communication":[6],"has":[7],"gained":[8],"recent":[9],"attention":[10],"due":[11],"to":[12,29,110,119,130],"the":[13,23,35,48,53,99,105,132,143,146,153,159],"emergence":[14],"of":[15,52,75,83,145],"new":[16],"technological":[17],"breakthroughs":[18],"this":[20,78],"space.":[21],"Since":[22],"internode":[24],"distances":[25],"have":[26],"been":[27],"noted":[28],"play":[30],"a":[31,41,57,80,121],"key":[32,112,137],"role":[33],"desired":[36,122,154],"performance,":[38],"we":[39],"propose":[40],"novel":[42,81],"quality-of-service-aware":[43],"PLS":[44,155],"model":[45,62],"that":[46],"incorporates":[47],"random":[49],"spatial":[50],"deployment":[51],"legitimate":[54,70,106,160],"users":[55,71,107],"and":[56,72,108,135,162],"potential":[58,144],"attacker.":[59,76],"This":[60],"proposed":[61,147],"considers":[63],"practical":[64],"constraints":[65],"like":[66,115],"maximum":[67],"separation":[68],"between":[69,104],"eavesdropping":[73,84],"capability":[74],"In":[77],"regard,":[79],"concept":[82],"zone":[85],"is":[86],"also":[87],"introduced.":[88],"Eventually,":[89],"closed-form":[90],"expressions":[91],"are":[92],"derived":[93],"for":[94,149],"secrecy":[95,123],"outage":[96],"probability":[97],"using":[98],"probabilistic":[100],"inter-node":[101],"distance":[102],"distributions":[103],"attacker":[109],"shed":[111],"analytical":[113,133],"insights":[114],"optimal":[116],"parameter":[117],"designing":[118,140],"achieve":[120],"performance.":[124],"Lastly,":[125],"specific":[126],"simulation":[127],"results,":[128],"presented":[129],"validate":[131],"claims":[134],"provide":[136],"secured":[138],"system":[139],"perspectives,":[141],"corroborate":[142],"framework":[148],"more":[150],"accurately":[151],"characterizing":[152],"performance":[156],"from":[157],"both":[158],"users'":[161],"attackers":[163],"point-of-view.":[164]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
