{"id":"https://openalex.org/W4285813989","doi":"https://doi.org/10.1109/iwcmc55113.2022.9825203","title":"Secrecy Performance of Short Packet Communications: Wiretap Channel with Multiple Receivers and Eavesdroppers","display_name":"Secrecy Performance of Short Packet Communications: Wiretap Channel with Multiple Receivers and Eavesdroppers","publication_year":2022,"publication_date":"2022-05-30","ids":{"openalex":"https://openalex.org/W4285813989","doi":"https://doi.org/10.1109/iwcmc55113.2022.9825203"},"language":"en","primary_location":{"id":"doi:10.1109/iwcmc55113.2022.9825203","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc55113.2022.9825203","pdf_url":null,"source":{"id":"https://openalex.org/S4363605313","display_name":"2022 International Wireless Communications and Mobile Computing (IWCMC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 International Wireless Communications and Mobile Computing (IWCMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5016538519","display_name":"Nihan Ar\u0131","orcid":"https://orcid.org/0000-0002-9325-1022"},"institutions":[{"id":"https://openalex.org/I110002522","display_name":"University of Essex","ror":"https://ror.org/02nkf1q06","country_code":"GB","type":"education","lineage":["https://openalex.org/I110002522"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Nihan Ari","raw_affiliation_strings":["School of Computer Science and Electronic Engineering, University of Essex,Colchester,United Kingdom","School of Computer Science and Electronic Engineering, University of Essex, Colchester, United Kingdom"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Electronic Engineering, University of Essex,Colchester,United Kingdom","institution_ids":["https://openalex.org/I110002522"]},{"raw_affiliation_string":"School of Computer Science and Electronic Engineering, University of Essex, Colchester, United Kingdom","institution_ids":["https://openalex.org/I110002522"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011969400","display_name":"Nikolaos Thomos","orcid":"https://orcid.org/0000-0001-7266-2642"},"institutions":[{"id":"https://openalex.org/I110002522","display_name":"University of Essex","ror":"https://ror.org/02nkf1q06","country_code":"GB","type":"education","lineage":["https://openalex.org/I110002522"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Nikolaos Thomos","raw_affiliation_strings":["School of Computer Science and Electronic Engineering, University of Essex,Colchester,United Kingdom","School of Computer Science and Electronic Engineering, University of Essex, Colchester, United Kingdom"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Electronic Engineering, University of Essex,Colchester,United Kingdom","institution_ids":["https://openalex.org/I110002522"]},{"raw_affiliation_string":"School of Computer Science and Electronic Engineering, University of Essex, Colchester, United Kingdom","institution_ids":["https://openalex.org/I110002522"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5016462759","display_name":"Leila Musavian","orcid":"https://orcid.org/0000-0002-5276-1157"},"institutions":[{"id":"https://openalex.org/I110002522","display_name":"University of Essex","ror":"https://ror.org/02nkf1q06","country_code":"GB","type":"education","lineage":["https://openalex.org/I110002522"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Leila Musavian","raw_affiliation_strings":["School of Computer Science and Electronic Engineering, University of Essex,Colchester,United Kingdom","School of Computer Science and Electronic Engineering, University of Essex, Colchester, United Kingdom"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Electronic Engineering, University of Essex,Colchester,United Kingdom","institution_ids":["https://openalex.org/I110002522"]},{"raw_affiliation_string":"School of Computer Science and Electronic Engineering, University of Essex, Colchester, United Kingdom","institution_ids":["https://openalex.org/I110002522"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5016538519"],"corresponding_institution_ids":["https://openalex.org/I110002522"],"apc_list":null,"apc_paid":null,"fwci":0.9667,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.67866383,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10148","display_name":"Advanced MIMO Systems Optimization","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.9150311946868896},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.836371898651123},{"id":"https://openalex.org/keywords/throughput","display_name":"Throughput","score":0.7733771800994873},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6999551057815552},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6832327246665955},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.6134136319160461},{"id":"https://openalex.org/keywords/fading","display_name":"Fading","score":0.5644504427909851},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.5426464676856995},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3310977816581726},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.2685270607471466},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.21045619249343872}],"concepts":[{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.9150311946868896},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.836371898651123},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.7733771800994873},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6999551057815552},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6832327246665955},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.6134136319160461},{"id":"https://openalex.org/C81978471","wikidata":"https://www.wikidata.org/wiki/Q1196572","display_name":"Fading","level":3,"score":0.5644504427909851},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.5426464676856995},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3310977816581726},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.2685270607471466},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.21045619249343872}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iwcmc55113.2022.9825203","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc55113.2022.9825203","pdf_url":null,"source":{"id":"https://openalex.org/S4363605313","display_name":"2022 International Wireless Communications and Mobile Computing (IWCMC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 International Wireless Communications and Mobile Computing (IWCMC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.49000000953674316,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W2003349868","https://openalex.org/W2004509470","https://openalex.org/W2078191478","https://openalex.org/W2103150712","https://openalex.org/W2182772011","https://openalex.org/W2536073501","https://openalex.org/W2744239749","https://openalex.org/W2892081127","https://openalex.org/W2920382960","https://openalex.org/W2963154570","https://openalex.org/W2963183582","https://openalex.org/W3007267536","https://openalex.org/W3008609509","https://openalex.org/W3092041375","https://openalex.org/W3117288372","https://openalex.org/W3137835414"],"related_works":["https://openalex.org/W2013390885","https://openalex.org/W4285813989","https://openalex.org/W160116885","https://openalex.org/W4312920619","https://openalex.org/W2102378925","https://openalex.org/W3036735965","https://openalex.org/W1555605342","https://openalex.org/W2034825888","https://openalex.org/W2129840061","https://openalex.org/W2327144294"],"abstract_inverted_index":{"In":[0,25],"this":[1],"paper,":[2],"we":[3,27],"study":[4],"the":[5,31,54,80,89,95,108,120],"secrecy":[6,43,56,69,97],"performance":[7,32],"of":[8,33,41,82,91,115,123],"short":[9],"packet":[10],"secure":[11],"communications":[12],"over":[13],"a":[14,60,103],"fading":[15],"wiretap":[16],"channel":[17],"when":[18],"there":[19],"are":[20,76],"multiple":[21],"receivers":[22,116],"and":[23,29,35],"eavesdroppers.":[24,124],"particular,":[26],"evaluate":[28],"compare":[30],"colluding":[34,92],"non-colluding":[36,61,104],"eavesdropping":[37],"modes,":[38],"in":[39],"terms":[40],"achievable":[42],"throughput.":[44],"Our":[45,85],"aim":[46],"is":[47],"to":[48,59,78],"determine":[49],"whether":[50],"eavesdroppers'":[51],"collusion":[52],"degrades":[53],"average":[55,68,96],"throughput":[57,70,98],"compared":[58],"scenario.":[62],"After":[63],"deriving":[64],"closed-form":[65],"approximations":[66],"on":[67,94],"for":[71],"both":[72],"scenarios,":[73],"Monte-Carlo":[74],"simulations":[75],"performed":[77],"obtain":[79],"accuracy":[81],"each":[83],"approximation.":[84],"results":[86],"reveal":[87],"that":[88],"impact":[90,122],"eavesdroppers":[93],"causes":[99],"more":[100],"loss":[101],"than":[102],"case,":[105],"especially":[106],"with":[107],"increasing":[109],"number.":[110],"Besides,":[111],"an":[112],"increased":[113],"number":[114],"does":[117],"not":[118],"eliminate":[119],"negative":[121]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
