{"id":"https://openalex.org/W4312806756","doi":"https://doi.org/10.1109/jsyst.2022.3224982","title":"Secrecy Analysis of DCSK-Based PLC Systems With Multiple Eavesdroppers","display_name":"Secrecy Analysis of DCSK-Based PLC Systems With Multiple Eavesdroppers","publication_year":2022,"publication_date":"2022-12-05","ids":{"openalex":"https://openalex.org/W4312806756","doi":"https://doi.org/10.1109/jsyst.2022.3224982"},"language":"en","primary_location":{"id":"doi:10.1109/jsyst.2022.3224982","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jsyst.2022.3224982","pdf_url":null,"source":{"id":"https://openalex.org/S95999327","display_name":"IEEE Systems Journal","issn_l":"1932-8184","issn":["1932-8184","1937-9234","2373-7816"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Systems Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5080860544","display_name":"Vinay Mohan","orcid":null},"institutions":[{"id":"https://openalex.org/I154549908","display_name":"Indian Institute of Technology Jodhpur","ror":"https://ror.org/03yacj906","country_code":"IN","type":"education","lineage":["https://openalex.org/I154549908"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Vinay Mohan","raw_affiliation_strings":["Department of Electrical Engineering, Indian Institute of Technology Jodhpur, Jodhpur, India"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, Indian Institute of Technology Jodhpur, Jodhpur, India","institution_ids":["https://openalex.org/I154549908"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060717290","display_name":"Aashish Mathur","orcid":"https://orcid.org/0000-0003-1269-855X"},"institutions":[{"id":"https://openalex.org/I154549908","display_name":"Indian Institute of Technology Jodhpur","ror":"https://ror.org/03yacj906","country_code":"IN","type":"education","lineage":["https://openalex.org/I154549908"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Aashish Mathur","raw_affiliation_strings":["Department of Electrical Engineering and Interdisciplinary Research Platform on IoT and Applications, Indian Institute of Technology Jodhpur, Jodhpur, India"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering and Interdisciplinary Research Platform on IoT and Applications, Indian Institute of Technology Jodhpur, Jodhpur, India","institution_ids":["https://openalex.org/I154549908"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5080860544"],"corresponding_institution_ids":["https://openalex.org/I154549908"],"apc_list":null,"apc_paid":null,"fwci":1.1966,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.78272794,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":98},"biblio":{"volume":"17","issue":"3","first_page":"3646","last_page":"3657"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12146","display_name":"Power Line Communications and Noise","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12146","display_name":"Power Line Communications and Noise","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10125","display_name":"Advanced Wireless Communication Techniques","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.6569211483001709},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6310320496559143},{"id":"https://openalex.org/keywords/physical-layer","display_name":"Physical layer","score":0.626765787601471},{"id":"https://openalex.org/keywords/modulation","display_name":"Modulation (music)","score":0.5772419571876526},{"id":"https://openalex.org/keywords/independent-and-identically-distributed-random-variables","display_name":"Independent and identically distributed random variables","score":0.5542610287666321},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.5440711975097656},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.5321060419082642},{"id":"https://openalex.org/keywords/keying","display_name":"Keying","score":0.5275024175643921},{"id":"https://openalex.org/keywords/secure-communication","display_name":"Secure communication","score":0.5226531028747559},{"id":"https://openalex.org/keywords/bernoullis-principle","display_name":"Bernoulli's principle","score":0.4904744327068329},{"id":"https://openalex.org/keywords/throughput","display_name":"Throughput","score":0.4729185700416565},{"id":"https://openalex.org/keywords/power-line-communication","display_name":"Power-line communication","score":0.44112512469291687},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4284255802631378},{"id":"https://openalex.org/keywords/random-variable","display_name":"Random variable","score":0.3898221254348755},{"id":"https://openalex.org/keywords/electronic-engineering","display_name":"Electronic engineering","score":0.38321608304977417},{"id":"https://openalex.org/keywords/power","display_name":"Power (physics)","score":0.3429645001888275},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.2909216582775116},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.2103208601474762},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.195159912109375},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.17832717299461365},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.17383399605751038},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.15951994061470032},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.07647943496704102}],"concepts":[{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.6569211483001709},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6310320496559143},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.626765787601471},{"id":"https://openalex.org/C123079801","wikidata":"https://www.wikidata.org/wiki/Q750240","display_name":"Modulation (music)","level":2,"score":0.5772419571876526},{"id":"https://openalex.org/C141513077","wikidata":"https://www.wikidata.org/wiki/Q378542","display_name":"Independent and identically distributed random variables","level":3,"score":0.5542610287666321},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.5440711975097656},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.5321060419082642},{"id":"https://openalex.org/C2776542216","wikidata":"https://www.wikidata.org/wiki/Q6398306","display_name":"Keying","level":2,"score":0.5275024175643921},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.5226531028747559},{"id":"https://openalex.org/C152361515","wikidata":"https://www.wikidata.org/wiki/Q181328","display_name":"Bernoulli's principle","level":2,"score":0.4904744327068329},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.4729185700416565},{"id":"https://openalex.org/C132885549","wikidata":"https://www.wikidata.org/wiki/Q271870","display_name":"Power-line communication","level":3,"score":0.44112512469291687},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4284255802631378},{"id":"https://openalex.org/C122123141","wikidata":"https://www.wikidata.org/wiki/Q176623","display_name":"Random variable","level":2,"score":0.3898221254348755},{"id":"https://openalex.org/C24326235","wikidata":"https://www.wikidata.org/wiki/Q126095","display_name":"Electronic engineering","level":1,"score":0.38321608304977417},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.3429645001888275},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.2909216582775116},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.2103208601474762},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.195159912109375},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.17832717299461365},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.17383399605751038},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.15951994061470032},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.07647943496704102},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C107038049","wikidata":"https://www.wikidata.org/wiki/Q35986","display_name":"Aesthetics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jsyst.2022.3224982","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jsyst.2022.3224982","pdf_url":null,"source":{"id":"https://openalex.org/S95999327","display_name":"IEEE Systems Journal","issn_l":"1932-8184","issn":["1932-8184","1937-9234","2373-7816"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Systems Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":46,"referenced_works":["https://openalex.org/W1903993611","https://openalex.org/W1978718365","https://openalex.org/W1998458574","https://openalex.org/W1998622818","https://openalex.org/W2023641495","https://openalex.org/W2029326548","https://openalex.org/W2036710797","https://openalex.org/W2053336065","https://openalex.org/W2056397562","https://openalex.org/W2060759080","https://openalex.org/W2061695646","https://openalex.org/W2070723874","https://openalex.org/W2071161309","https://openalex.org/W2079960731","https://openalex.org/W2093880568","https://openalex.org/W2098326508","https://openalex.org/W2102950464","https://openalex.org/W2103941230","https://openalex.org/W2106015652","https://openalex.org/W2113706820","https://openalex.org/W2114289175","https://openalex.org/W2122092743","https://openalex.org/W2124482374","https://openalex.org/W2124872962","https://openalex.org/W2126304552","https://openalex.org/W2146794521","https://openalex.org/W2155405129","https://openalex.org/W2156214717","https://openalex.org/W2167634505","https://openalex.org/W2189501996","https://openalex.org/W2317381733","https://openalex.org/W2408396831","https://openalex.org/W2486876923","https://openalex.org/W2536073501","https://openalex.org/W2556708171","https://openalex.org/W2737625898","https://openalex.org/W2765938796","https://openalex.org/W2793229005","https://openalex.org/W2809650216","https://openalex.org/W2923521301","https://openalex.org/W2985309855","https://openalex.org/W3088841513","https://openalex.org/W3172626944","https://openalex.org/W4249210728","https://openalex.org/W4253871110","https://openalex.org/W6667959831"],"related_works":["https://openalex.org/W3004218185","https://openalex.org/W4390241083","https://openalex.org/W4245457074","https://openalex.org/W2347733609","https://openalex.org/W184958470","https://openalex.org/W2912990606","https://openalex.org/W1717256175","https://openalex.org/W2323735050","https://openalex.org/W2337178537","https://openalex.org/W2915233023"],"abstract_inverted_index":{"In":[0,39],"the":[1,23,27,34,44,85,101,116,120,125,134,143,162,177,184],"past":[2],"two":[3,79],"decades,":[4],"chaotic":[5],"modulation":[6,19,67],"schemes":[7],"have":[8],"drawn":[9],"much":[10],"attention":[11],"for":[12],"their":[13],"significant":[14],"advantages":[15,25],"over":[16],"other":[17],"traditional":[18],"techniques.":[20],"One":[21],"of":[22,29,36,50,115,133,142,179],"noticeable":[24],"is":[26,75,138],"capability":[28],"providing":[30],"secure":[31,147],"communication":[32,54],"in":[33,140],"presence":[35],"an":[37,158],"eavesdropper.":[38],"this":[40],"article,":[41],"we":[42,175],"study":[43,132],"physical":[45],"layer":[46],"security":[47,166],"(PLS)":[48],"performance":[49],"low-frequency":[51],"power":[52,71],"line":[53,72],"(PLC)":[55],"systems":[56],"against":[57],"multiple":[58],"eavesdroppers":[59],"by":[60,77],"employing":[61],"differential":[62],"chaos":[63],"shift":[64],"keying":[65],"based":[66],"technique.":[68],"A":[69],"wiretap":[70,102],"channel":[73],"model":[74],"investigated":[76],"considering":[78],"different":[80],"cases:":[81],"1)":[82],"when":[83],"all":[84],"channels":[86,103],"are":[87,104],"assumed":[88],"to":[89,106,160,171],"be":[90,107],"independent":[91,114],"and":[92,99,113,150,167],"identically":[93],"distributed":[94,112],"(IID)":[95],"following":[96],"Log-normal":[97],"distribution;":[98],"2)":[100],"considered":[105,135],"identical":[108],"but":[109],"correlated":[110],"Log-normally":[111],"main":[117],"channel.":[118],"Contemporaneously,":[119],"Bernoulli-Gaussian":[121],"random":[122],"process":[123],"models":[124],"PLC":[126,136],"noise.":[127],"Further,":[128],"a":[129],"comprehensive":[130],"PLS":[131],"system":[137],"characterized":[139],"terms":[141],"average":[144],"secrecy":[145,153,163],"capacity,":[146],"outage":[148],"probability,":[149],"strictly":[151],"positive":[152],"capacity.":[154],"We":[155],"also":[156],"propose":[157],"algorithm":[159],"maximize":[161],"throughput":[164],"under":[165],"reliability":[168],"constraints.":[169],"Moreover,":[170],"obtain":[172],"essential":[173],"insights,":[174],"reveal":[176],"impact":[178],"various":[180],"crucial":[181],"parameters":[182],"onto":[183],"proposed":[185],"system.":[186]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":6}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
