{"id":"https://openalex.org/W2343858165","doi":"https://doi.org/10.1109/tase.2015.2497663","title":"On Secure Wireless Communications for IoT Under Eavesdropper Collusion","display_name":"On Secure Wireless Communications for IoT Under Eavesdropper Collusion","publication_year":2015,"publication_date":"2015-12-10","ids":{"openalex":"https://openalex.org/W2343858165","doi":"https://doi.org/10.1109/tase.2015.2497663","mag":"2343858165"},"language":"en","primary_location":{"id":"doi:10.1109/tase.2015.2497663","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tase.2015.2497663","pdf_url":null,"source":{"id":"https://openalex.org/S34881539","display_name":"IEEE Transactions on Automation Science and Engineering","issn_l":"1545-5955","issn":["1545-5955","1558-3783"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Automation Science and Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5049750015","display_name":"Yanchun Zhang","orcid":"https://orcid.org/0000-0002-5094-5980"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]},{"id":"https://openalex.org/I84400586","display_name":"Future University Hakodate","ror":"https://ror.org/05szw2z23","country_code":"JP","type":"education","lineage":["https://openalex.org/I84400586"]}],"countries":["CN","JP"],"is_corresponding":true,"raw_author_name":"Yuanyu Zhang","raw_affiliation_strings":["School of Computer Science and Technology, Xidian University, China","School of Systems Information Science, Future University Hakodate, Hakodate, Hokkaido, Japan"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Xidian University, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"School of Systems Information Science, Future University Hakodate, Hakodate, Hokkaido, Japan","institution_ids":["https://openalex.org/I84400586"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043356063","display_name":"Yulong Shen","orcid":"https://orcid.org/0000-0002-8448-705X"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yulong Shen","raw_affiliation_strings":["School of Computer Science and Technology, Xidian University, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Xidian University, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100403969","display_name":"Hua Wang","orcid":"https://orcid.org/0000-0002-8465-0996"},"institutions":[{"id":"https://openalex.org/I71270174","display_name":"Victoria University","ror":"https://ror.org/04j757h98","country_code":"AU","type":"education","lineage":["https://openalex.org/I71270174"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Hua Wang","raw_affiliation_strings":["College of Engineering and Science, Victoria University, Australia"],"affiliations":[{"raw_affiliation_string":"College of Engineering and Science, Victoria University, Australia","institution_ids":["https://openalex.org/I71270174"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012159374","display_name":"Jianming Yong","orcid":"https://orcid.org/0000-0003-4111-1076"},"institutions":[{"id":"https://openalex.org/I185523456","display_name":"University of Southern Queensland","ror":"https://ror.org/04sjbnx57","country_code":"AU","type":"education","lineage":["https://openalex.org/I185523456"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jianming Yong","raw_affiliation_strings":["Faculty of Business, Education, Law and Arts, University of Southern Queensland, Australia"],"affiliations":[{"raw_affiliation_string":"Faculty of Business, Education, Law and Arts, University of Southern Queensland, Australia","institution_ids":["https://openalex.org/I185523456"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5014884811","display_name":"Xiaohong Jiang","orcid":"https://orcid.org/0000-0001-9739-1930"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]},{"id":"https://openalex.org/I84400586","display_name":"Future University Hakodate","ror":"https://ror.org/05szw2z23","country_code":"JP","type":"education","lineage":["https://openalex.org/I84400586"]}],"countries":["CN","JP"],"is_corresponding":false,"raw_author_name":"Xiaohong Jiang","raw_affiliation_strings":["School of Computer Science and Technology, Xidian University, China","School of Systems Information Science, Future University Hakodate, Hakodate, Hokkaido, Japan"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Xidian University, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"School of Systems Information Science, Future University Hakodate, Hakodate, Hokkaido, Japan","institution_ids":["https://openalex.org/I84400586"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5049750015"],"corresponding_institution_ids":["https://openalex.org/I149594827","https://openalex.org/I84400586"],"apc_list":null,"apc_paid":null,"fwci":9.6089,"has_fulltext":false,"cited_by_count":146,"citation_normalized_percentile":{"value":0.98365669,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":"13","issue":"3","first_page":"1281","last_page":"1293"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11392","display_name":"Energy Harvesting in Wireless Networks","score":0.9840999841690063,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.983299970626831,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6955727338790894},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.601181149482727},{"id":"https://openalex.org/keywords/physical-layer","display_name":"Physical layer","score":0.5991473197937012},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.5981563329696655},{"id":"https://openalex.org/keywords/collusion","display_name":"Collusion","score":0.5246888995170593},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5176461338996887},{"id":"https://openalex.org/keywords/wireless-security","display_name":"Wireless security","score":0.48786377906799316},{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.43097999691963196},{"id":"https://openalex.org/keywords/information-theoretic-security","display_name":"Information-theoretic security","score":0.4290144145488739},{"id":"https://openalex.org/keywords/jamming","display_name":"Jamming","score":0.42630666494369507},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4108234643936157},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.34051305055618286},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.22786426544189453}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6955727338790894},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.601181149482727},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.5991473197937012},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.5981563329696655},{"id":"https://openalex.org/C2781198186","wikidata":"https://www.wikidata.org/wiki/Q701521","display_name":"Collusion","level":2,"score":0.5246888995170593},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5176461338996887},{"id":"https://openalex.org/C2776946656","wikidata":"https://www.wikidata.org/wiki/Q1655812","display_name":"Wireless security","level":4,"score":0.48786377906799316},{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.43097999691963196},{"id":"https://openalex.org/C47191418","wikidata":"https://www.wikidata.org/wiki/Q3510462","display_name":"Information-theoretic security","level":3,"score":0.4290144145488739},{"id":"https://openalex.org/C2779079576","wikidata":"https://www.wikidata.org/wiki/Q17092823","display_name":"Jamming","level":2,"score":0.42630666494369507},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4108234643936157},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.34051305055618286},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.22786426544189453},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tase.2015.2497663","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tase.2015.2497663","pdf_url":null,"source":{"id":"https://openalex.org/S34881539","display_name":"IEEE Transactions on Automation Science and Engineering","issn_l":"1545-5955","issn":["1545-5955","1558-3783"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Automation Science and Engineering","raw_type":"journal-article"},{"id":"pmh:oai:eprints.vu.edu.au:30328","is_oa":false,"landing_page_url":"https://vuir.vu.edu.au/30328/","pdf_url":null,"source":{"id":"https://openalex.org/S4306400215","display_name":"Victoria University Research Repository (Victoria University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I41156924","host_organization_name":"Victoria University of Wellington","host_organization_lineage":["https://openalex.org/I41156924"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5699999928474426}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":49,"referenced_works":["https://openalex.org/W595252221","https://openalex.org/W1570537849","https://openalex.org/W1621647796","https://openalex.org/W1743004868","https://openalex.org/W1859574785","https://openalex.org/W1970334960","https://openalex.org/W1971066544","https://openalex.org/W1975700629","https://openalex.org/W1985499562","https://openalex.org/W1989064223","https://openalex.org/W1996129153","https://openalex.org/W1996160600","https://openalex.org/W2012452654","https://openalex.org/W2014149071","https://openalex.org/W2025212043","https://openalex.org/W2029363743","https://openalex.org/W2036210457","https://openalex.org/W2042253123","https://openalex.org/W2046906023","https://openalex.org/W2056973119","https://openalex.org/W2068090402","https://openalex.org/W2072618695","https://openalex.org/W2081657888","https://openalex.org/W2085889812","https://openalex.org/W2103150712","https://openalex.org/W2105103777","https://openalex.org/W2113706820","https://openalex.org/W2124841881","https://openalex.org/W2128295617","https://openalex.org/W2129457795","https://openalex.org/W2132124099","https://openalex.org/W2149522963","https://openalex.org/W2149959815","https://openalex.org/W2152121970","https://openalex.org/W2162881936","https://openalex.org/W2168527529","https://openalex.org/W2168676717","https://openalex.org/W2171006634","https://openalex.org/W2339558182","https://openalex.org/W2602956630","https://openalex.org/W2610335499","https://openalex.org/W3098336264","https://openalex.org/W3100282565","https://openalex.org/W3100839090","https://openalex.org/W3102354688","https://openalex.org/W4300223101","https://openalex.org/W6638945058","https://openalex.org/W6703689633","https://openalex.org/W6736178439"],"related_works":["https://openalex.org/W4287638930","https://openalex.org/W3026705917","https://openalex.org/W2516026999","https://openalex.org/W2155410265","https://openalex.org/W2769689807","https://openalex.org/W3121990887","https://openalex.org/W3166880716","https://openalex.org/W2959329152","https://openalex.org/W2460691506","https://openalex.org/W1970334960"],"abstract_inverted_index":{"Wireless":[0],"communication":[1,44],"is":[2,81],"one":[3],"of":[4,12,24,34,59,70,101,120,140],"the":[5,10,17,21,28,31,65,77,89,98,102,116,121,136,138,156,168,182,208],"key":[6],"technologies":[7],"that":[8,167,207],"actualize":[9],"Internet":[11],"Things":[13],"(IoT)":[14],"concept":[15],"into":[16],"real":[18],"world.":[19],"Understanding":[20],"security":[22,32,48,60,80],"performance":[23,69],"wireless":[25,43,71],"communications":[26,72],"lays":[27],"foundation":[29],"for":[30,173],"management":[33],"IoT.":[35],"Eavesdropper":[36],"collusion":[37],"represents":[38],"a":[39,51,56],"significant":[40],"threat":[41],"to":[42,54,83,134,153,198],"security,":[45],"while":[46],"physical-layer":[47],"serves":[49],"as":[50],"promising":[52],"approach":[53],"providing":[55],"strong":[57],"form":[58],"guarantee.":[61],"This":[62],"paper":[63],"studies":[64],"important":[66],"secrecy":[67,99,117,184],"outage":[68,100,118,185],"under":[73],"eavesdropper":[74],"collusion,":[75],"where":[76,126],"physical":[78],"layer":[79],"adopted":[82,152],"counteract":[84],"such":[85,164,166],"attack.":[86],"Based":[87],"on":[88,97],"classical":[90],"Probability":[91],"Theory,":[92],"we":[93],"first":[94,211],"conduct":[95],"analysis":[96,119],"simple":[103],"noncolluding":[104],"case":[105],"in":[106,163],"which":[107],"eavesdroppers":[108,129,176],"do":[109],"not":[110],"collude":[111],"and":[112,146,180,193,213],"operate":[113],"independently.":[114],"For":[115],"more":[122],"hazardous":[123],"M-colluding":[124],"scenario,":[125],"any":[127],"M":[128],"can":[130,177,187],"combine":[131],"their":[132],"observations":[133],"decode":[135],"message,":[137],"techniques":[139],"Laplace":[141],"transform,":[142],"keyhole":[143],"contour":[144],"integral,":[145],"Cauchy":[147],"Integral":[148],"Theorem":[149],"are":[150,196],"jointly":[151],"work":[154],"around":[155],"highly":[157],"cumbersome":[158],"multifold":[159],"convolution":[160],"problem":[161],"involved":[162],"analysis,":[165],"related":[169],"signal-to-interference":[170],"ratio":[171],"modeling":[172],"all":[174],"colluding":[175],"be":[178,188],"conducted":[179],"thus":[181],"corresponding":[183],"probability":[186],"analytically":[189],"determined.":[190],"Finally,":[191],"simulation":[192],"numerical":[194],"results":[195],"provided":[197],"illustrate":[199],"our":[200],"theoretical":[201],"achievements.":[202],"An":[203],"interesting":[204],"observation":[205],"suggests":[206],"SOP":[209],"increases":[210],"superlinearly":[212],"then":[214],"sublinearly":[215],"with":[216],"M.":[217]},"counts_by_year":[{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":14},{"year":2023,"cited_by_count":15},{"year":2022,"cited_by_count":12},{"year":2021,"cited_by_count":12},{"year":2020,"cited_by_count":13},{"year":2019,"cited_by_count":23},{"year":2018,"cited_by_count":27},{"year":2017,"cited_by_count":16},{"year":2016,"cited_by_count":5}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
