Secrecy Performance of Backscatter Communication Networks with Multiple Reader and Tag Selection Schemes

Yasin Khan, Ankit Dubey, Sunish Kumar Orappanpara Soman

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Downloads (Pure)

Abstract

This paper investigates the secrecy performance of optimal tag selection (OTS) and random tag selection (RTS) schemes of a passive backscatter communication network comprising multiple tags, multiple readers, and an eavesdropper with a practical non-linear energy harvesting model. The exhaustive search-based OTS scheme requires the complete channel state information (CSI) to provide the secrecy to the reader. In contrast, RTS schemes deploy the arbitrary search-based selection without any CSI. The secrecy outage probability (SOP) is evaluated as the secrecy performance metric for the BackCom network. The exact closed-form expressions for SOP are obtained for both selection schemes. We also derive the exact closed-form expressions for asymptotic SOP for OTS and RTS schemes, which gives a better understanding of the SOP concerning different parameters. Furthermore, we demonstrated the effect of the number of tags, number of readers, and path loss parameters on the SOP performance for the adapted BackCom network.
Original languageEnglish
Title of host publication 2025 National Conference on Communications (NCC)
PublisherIEEE
Pages1-6
Number of pages6
DOIs
Publication statusPublished online - 21 Apr 2025
Event2025 National Conference on Communications (NCC) - New Delhi, India
Duration: 6 Mar 20259 Mar 2025

Publication series

Name2025 National Conference on Communications (NCC)
PublisherIEEE Control Society
ISSN (Print)2993-2610
ISSN (Electronic)2993-2645

Conference

Conference2025 National Conference on Communications (NCC)
Country/TerritoryIndia
CityNew Delhi
Period6/03/259/03/25

Keywords

  • Analytical models
  • Adaptation models
  • Closed-form solutions
  • Probability
  • Power system reliability
  • Energy harvesting
  • Communication networks
  • Channel state information
  • Backscatter
  • Asymptotic analysis
  • backscatter communication
  • energy harvesting
  • secrecy outage probability
  • tag selection

Fingerprint

Dive into the research topics of 'Secrecy Performance of Backscatter Communication Networks with Multiple Reader and Tag Selection Schemes'. Together they form a unique fingerprint.

Cite this