Papers
Topics
Authors
Recent
Assistant
AI Research Assistant
Well-researched responses based on relevant abstracts and paper content.
Custom Instructions Pro
Preferences or requirements that you'd like Emergent Mind to consider when generating responses.
Gemini 2.5 Flash
Gemini 2.5 Flash 167 tok/s
Gemini 2.5 Pro 49 tok/s Pro
GPT-5 Medium 36 tok/s Pro
GPT-5 High 42 tok/s Pro
GPT-4o 97 tok/s Pro
Kimi K2 203 tok/s Pro
GPT OSS 120B 442 tok/s Pro
Claude Sonnet 4.5 32 tok/s Pro
2000 character limit reached

When Satellites Work as Eavesdroppers (2206.12006v1)

Published 23 Jun 2022 in cs.IT and math.IT

Abstract: This paper considers satellite eavesdroppers in uplink satellite communication systems where the eavesdroppers are randomly distributed at arbitrary altitudes according to homogeneous binomial point processes and attempt to overhear signals that a ground terminal transmits to a serving satellite. Non-colluding eavesdropping satellites are assumed, i.e., they do not cooperate with each other, so that their received signals are not combined but are decoded individually. Directional beamforming with two types of antennas: fixed- and steerable-beam antennas, is adopted at the eavesdropping satellites. The possible distribution cases for the eavesdropping satellites and the distributions of the distances between the terminal and the satellites are analyzed. The distributions of the signal-to-noise ratios (SNRs) at both the serving satellite and the most detrimental eavesdropping satellite are derived as closed-form expressions. The ergodic and outage secrecy capacities of the systems are derived with the secrecy outage probability using the SNR distributions. Simpler approximate expressions for the secrecy performance are obtained based on the Poisson limit theorem, and asymptotic analyses are also carried out in the high-SNR regime. Monte-Carlo simulations verify the analytical results for the secrecy performance. The analytical results are expected to be used to evaluate the secrecy performance and design secure satellite constellations by considering the impact of potential threats from malicious satellite eavesdroppers.

Citations (9)

Summary

We haven't generated a summary for this paper yet.

Lightbulb Streamline Icon: https://streamlinehq.com

Continue Learning

We haven't generated follow-up questions for this paper yet.

List To Do Tasks Checklist Streamline Icon: https://streamlinehq.com

Collections

Sign up for free to add this paper to one or more collections.

Don't miss out on important new AI/ML research

See which papers are being discussed right now on X, Reddit, and more:

“Emergent Mind helps me see which AI papers have caught fire online.”

Philip

Philip

Creator, AI Explained on YouTube