Professional Documents
Culture Documents
XX, X 2021 1
Abstract—This paper technically explores the secrecy rate Λ In [1]-[12] and in totally various types of system models,
and a maximisation problem over the concave version of the some novel and closed-form mathematical expressions have
secrecy outage probability (SOP) as Max P𝓇 Λ ≥ 𝜆 . We do been newly derived and proposed − some of them are optimi-
Δ
this from a generic viewpoint even though we use a traditional sation based, some of them are statistical oriented and some
Wyner’s wiretap channel for our system model − something
arXiv:2201.01841v2 [cs.IT] 14 Jun 2022
another one − whether isolated or not − are called homotopic. 17 Generalised Brunn-Minkowski inequality [29].
IEEE, VOL. XX, NO. XX, X 2021 4
How to bound :
In addition to Lemma 4
Lemma 5
………………………………………………………………………………………………... ………....
In addition to Lemma 6 & 7
Eigen
Values
Proposition 1: How to reach out the eigen-values
Fig. 2: Flow of problem-and-solution.
can be18 a dual one for the problem P ROOF : The proof is easy to follow with the aid of the
n o generalised Yong’s ineqality19 which says that
Max E Vℴ𝓁 Λ . (9)
Δ= 𝜆1 , ··· ,𝜆𝑛 𝑓 0 (𝑥)𝑔 0 (𝑥) ≤ 𝑓 (𝑥) + 𝑔(𝑥), (12)
P ROOF : See Appendix C. holds for the arbitary functions 𝑓 (·) and 𝑔(·), while (·) 0 stands
R EMARK 2: for the drivative.
n o n o
• (i) Vℴ𝓁 𝑒 𝓉𝜆 . Whether Max Vℴ𝓁 𝑒 𝓉𝜆 is of a
Δ= 𝜆1 , ··· ,𝜆𝑛 B. How to reach out the eigen-values
partially useless nature here for our main problem or not, R EMARK 3: Regarding to the fact that mainly most of the
we use it as a trick which is of a purely useful nature in secrecy rate problems can be discussed in the context of semi-
the next lemma.
n o definite algebra [4]-[12], that is the format B𝑇 AB, we jump
• (ii) Vℴ𝓁 P𝓇 Λ ≥ 𝜆 . First of all, we have nothing to do in terms of the following to the next steps.
with its maximum version, i.e., 1. Additionally, recalling Lemma 7: Finsler’s lemma20 − The problem
Definition
2 as well as Remark 1 in connection with
Vℴ𝓁 · , we see that the aforementioned value is not ∃X, X𝑇 AX = 𝜉, X𝑇 BX ≤ 𝜉 =⇒ ∃𝑧 : B − 𝑧A < 𝜉, (13)
by-default equated with 1.
• (iii) R ECAPTULATION . So far, we have indeed recasted holds for the arbitary matrices A and B while 𝜉 and 𝑇
the problem Max P𝓇 Λ ≥ 𝜆 into two parts, i.e., stand respectively for an arbitary threshold and the transpose
Δ= 𝜆1 , ··· ,𝜆𝑛 operand.
n o n Proposition 1: Let us assume the descriptor system B, A ,
Max Vℴ𝓁 𝑒 𝓉𝜆 and Max Vℴ𝓁 P𝓇 Λ ≥ so, the characteristic polynomial is given as
Δ= 𝜆1 , ··· ,𝜆𝑛 Δ= 𝜆1 , ··· ,𝜆𝑛
o
𝜆 which are deterministic ones. 𝒫(𝑧) = 𝑑𝑒𝑡 B − 𝑧A , (14)
Lemma 6: The problem while 𝑑𝑒𝑡 (·) stands for the matrix determinant. The number
∫ n o ∫ n of eigenvalues in the region associated with the polynomial
o n o
Max Vℴ𝓁 𝑒 𝓉𝜆 + Vℴ𝓁 P𝓇 Λ ≥ 𝜆 , (10) 𝒫(𝑧) over the Riemannian Vℴ𝓁 P𝓇 Λ ≥ 𝜆 is related to
Δ= 𝜆1 , ··· ,𝜆𝑛 −1
and 𝑑𝑒𝑡 B −𝑧A while (·) −1 stands for the inverse
B −𝑧A
can be a dual for the problem matrix.
n o
𝓉𝜆
n o P ROOF : See Appendix D.
Max Vℴ𝓁 𝑒 Vℴ𝓁 P𝓇 Λ ≥ 𝜆 , (11)
Δ= 𝜆1 , ··· ,𝜆𝑛 C. Futher discussion
as its bound. Proposition 2: Let the random 𝑘−dimensional subspace
P𝓇 Λ ≥ 𝜆 be valid and let 𝑣 𝑖0 be the projection of the point
18 Not definitely, but in terms of one of the highly probably efficient and 19 See e.g. [31] to understand what it is.
acceptable one: See [30] for more details. 20 See e.g. [32] to understand what it is.
IEEE, VOL. XX, NO. XX, X 2021 5
TABLE II: Simulations: SOP’s convex version vs. I X, A while changing 𝜌.
I X, A SOP’s convex version I X, A SOP’s convex version I X, A SOP’s convex version
0 𝑂𝑢𝑟 = 0.005, 𝜌 = 0.1 0.5 𝑂𝑢𝑟 = 0.0026, 𝜌 = 0.1 1 𝑂𝑢𝑟 = 0.0001, 𝜌 = 0.1
0 𝑂𝑢𝑟 = 0.005, 𝜌 = 0.2 0.5 𝑂𝑢𝑟 = 0.0027, 𝜌 = 0.2 1 𝑂𝑢𝑟 = 0.0002, 𝜌 = 0.2
0 𝑃𝑟𝑜 𝑗 = 0.005, 𝜌 = 0.1 0.5 𝑃𝑟𝑜 𝑗 = 0.0027, 𝜌 = 0.1 1 𝑃𝑟𝑜 𝑗 = 0.00011, 𝜌 = 0.1
0 𝑃𝑟𝑜 𝑗 = 0.005, 𝜌 = 0.2 0.5 𝑃𝑟𝑜 𝑗 = 0.00274, 𝜌 = 0.2 1 𝑃𝑟𝑜 𝑗 = 0.0002, 𝜌 = 0.2
n o
TABLE III: Simulations: Complexity vs. Iterations derived from Δ = Max Vℴ𝓁 P𝓇 Λ ≥ 𝜆 divided by the derived
Δ= 𝜆1 , ··· ,𝜆𝑛
n o
one from Δ = Max E Vℴ𝓁 Λ .
Δ= 𝜆1 , ··· ,𝜆𝑛
n o
TABLE IV: Simulations: Accuracy vs. Iterations derived from Δ = Max Vℴ𝓁 P𝓇 Λ ≥ 𝜆 divided by the derived one
Δ= 𝜆1 , ··· ,𝜆𝑛
n o
from Δ = Max E Vℴ𝓁 Λ .
Δ= 𝜆1 , ··· ,𝜆𝑛
policy 𝜋𝑡 (𝑎|𝑠) − while (·)★ stands for the optimum-value − The proof is now completed.
are respectively depicted versus the iteration regime while
|S| = 𝒰0 + 𝒱0 = 5 + 7 = 12, |A| = 𝑚𝑎𝑥{𝒰0 , 𝒱0 } = 7, A PPENDIX B
V𝑒𝑛𝑠𝑒𝑚𝑏𝑒𝑙 (𝜁) = 𝜁 2 are basically selected. P ROOF OF L EMMA 4
The cumulative distribution function (CDF)
V. CONCLUSION
A new bound and the relating interpretations over the ℱΛ (𝜆) = P𝓇 Λ ≤ 𝜆
concave version of the SOP maximisation problem were fun- = 1 − P𝓇 Λ ≥ 𝜆 (19)
damentally explored in this paper. We technically considered =1−𝑒 −𝓉Λ
𝜇Λ (𝓉) ,
a Riemannian mani-fold for the SOP’s concave version and
a volume for it. Towards such end, some highly professional holds while 𝜇Λ (𝓉) is the moment-generating function (MGF),
and insightful principles such as Keyhole contour, Finsler’s so, we have
lemma, the generalised Brunn-Minkowski inequality etc were
E 𝑒 𝓉Λ = 𝑒 𝓉𝜆 P𝓇 Λ ≥ 𝜆 , (20)
used. In order to find the optimal policy in relation to the
eigenvalue distributions, a novel Markov decision process holds.
based reinforcement learning algorithm was also essentially The proof is now completed.
proposed − something that was subsequently extended to a
possibilisitically semi-Markov decision process for the case A PPENDIX C
of periodic attacks and with regard to the possibility-theory. P ROOF OF L EMMA 5
𝒫 0 (𝑧) ∑︁ 1
𝑛
= . (26) A PPENDIX E
𝒫(𝑧) 𝑖=1
𝑧 − 𝜁𝑖 P ROOF OF P ROPOSITION 2
√
For the aboven equation, where 𝑗 = −1 is the imaginary The sketch of the proof is given here which is similar to
[40].
o
unit, ℒ ⊇ Vℴ𝓁 P𝓇 Λ ≥ 𝜆 is a closed anti-clockwise curve
∫ n o We know [40]
on the complex plane, and 𝒞 ⊇ Vℴ𝓁 P𝓇 Λ ≥ 𝜆 is the
P𝓇 𝐿 ≤ (1 − 𝜏2 )𝜏1
region enclosed by ℒ, it is achieved as22 𝑘 (33)
𝑛
( ≤ 𝑒𝑥 𝑝 (1 − (1 − 𝜏2 ) + 𝑙𝑛(1 − 𝜏2 ) ,
2
∮ ∑︁
1 2𝜋 𝑗, if 𝜁𝑖 ∈ 𝒞,
𝑑𝑧 = (27) which can be re-casted to
ℒ 𝑖=1 𝑧 − 𝜁𝑖 0, if 𝜁𝑖 ∉ 𝒞,
P𝓇 𝐿 ≤ (1 − 𝜏2 )𝜏1
accoring to which one can say that the number of the eigen-
𝜏22 (34)
values in the region 𝒞 is 𝑘
≤ 𝑒𝑥 𝑝 𝜏2 − 𝜏2 + ,
1
∮
𝒫 0 (𝑧) 2 2
𝑁= 𝑑𝑧 2
2𝜋 𝑗 ℒ 𝒫(𝑧) since 𝑙𝑛(1 − 𝑥) ≤ −𝑥 − 𝑥2 , ∀ 0 ≤ 𝑥 < 1 holds − something that
𝑛 ∮ (28) can conclude the proof.
1 ∑︁ 1
= 𝑑𝑧.
2𝜋 𝑗 𝑖=1 ℒ 𝑧 − 𝜁𝑖
A PPENDIX F
On the other hand, 𝒫 0 (𝑧) is obtained as [35]23 P ROOF OF P ROPOSITION 3
h 𝜕 (B − 𝑧A) i
𝒫 0 (𝑧) = 𝑑𝑒𝑡 (B − 𝑧A)𝑇𝑟 (B − 𝑧A) −1 , The proof is given as the following.
𝜕𝑧
| {z } (29) We know [41]
−A
𝑡𝑟 (𝜃𝑇 − 𝜃 ∗𝑇 ) − Θ + 𝑃𝑟𝑜 𝑗 (𝜃, Θ) < 0, (35)
while 𝑇𝑟 [·] stands for the trace of the matrix, something that
is equivalent to holds for 𝜃 ∗ ∈ [𝜃 𝑖𝑚𝑖𝑛
𝑗 + 𝜂𝑖 𝑗 , 𝜃 𝑖 𝑗
𝑚𝑎𝑥 − 𝜂 ] while the trace operator
𝑖𝑗
h i 𝑡𝑟 (·) is a function of − sum of − the eigen-values related to
𝒫 0 (𝑧) = 𝒫(𝑧)𝑇𝑟 (B − 𝑧A) −1 (−A) , (30) 𝜃, that is, Λ in our scheme and analysis.
21 See e.g. [33]. 24 See e.g. [39] to understand what it is: It says that the complement of
22 See e.g. [34]. the given random variable in a bounded probability closure is emphatically
23 Page 8, eqn. 46. upperbounded.
IEEE, VOL. XX, NO. XX, X 2021 8
We furthermore know that Sizes of random projections of Now, we initially see that the contractibility radius as well
sets, i.e., Thereom 7.7.1 in [42] may help us to prove that if as the equilibrium we are supposed to go over rely deeply
we have a bounded set 𝜃 ∈ R𝑟1 , 𝑟 1 < 𝑟 while 𝑟 was defined upon the principal curvatures, i.e., the eigen-vectors.
28 says that the Systol of
in Proposition 2, with a projected set Θ ∈ R𝑟2 , 𝑟 2 < 𝑟, with a Additionally, Pu-1952 inquality
probability of at least 1 − 2𝑒 −𝑟2 we have a manifold M as SYS M as the least lenght29 of a non-
√︂
contractible loop of the homeomorphic manifold M − to the
𝑟2
𝑑𝑖𝑎𝑚 Θ𝜃 ≤ 𝐶0 𝑤 𝑠 𝜃 + 𝑑𝑖𝑎𝑚 𝜃 , (36) real projective plan − , i.e., the lowerbound of the lenghts of
𝑟1 non-contractible closed curves over M 30 satisfies
while 𝐶0 is a constant, 𝑑𝑖𝑎𝑚(·) stands for the diameter, 2
S𝑎𝑟 𝑒𝑎 ≥ SYS 2 M ,
and 𝑤 𝑠 (𝜃) denotes the Gaussian width as E Sup h𝑥, ℊi, ℊ ∼ (38)
𝑥∈𝜃
𝜋
𝒩(0, 𝐼𝑟1 ). while the equlity holds31 for the constant Gaussian curvatures,
The proof is now completed. i.e., when M is locally isometric. Or correspondingly32 ,
𝑛1
(39)
A PPENDIX G C𝑛 Vℴ𝓁 M ≥ SYS M , ∃C𝑛 ∈ R𝑛 .
P ROOF OF P ROPOSITION 4
Thus, it has so far been proven that, in order to work on
Let us start the proof with the Gauss-Bonnet-Theorem25 . the contractibility radius as well as the equilibrium discussed
It says that for a manifold M with the boundary 𝜕M, with above, it is necessary and sufficient for us to only focus on
the Euler characterisitcs X M and the Gaussian Curvature26 the eigen-vectors.
K and the Geodesic Curvature27 K𝑔 relating to 𝜕M, the Now, in every kind of manifold and space, there may exist
following is satidfied multiple maximum-eigenvalues or/and minimum-eigenvalues,
for example, a hemisphere has 3 maximum-eigenvalues and
∫ ∫
K𝑑S𝑎𝑟 𝑒𝑎 + K𝑔 𝑑𝑠 = 2𝜋X M , (37) only 1 minimum-eigenvalue. However, the distribution of
M 𝜕M
while S𝑎𝑟 𝑒𝑎 stands theoretically for the area of M and 𝑠 ⊂ 28 [45].
29 [46].
S𝑎𝑟 𝑒𝑎 .
30 That 𝑑𝑒 𝑓
is, = 𝑖𝑛 𝑓 𝓁 (𝑐) | 𝑐 : non-contractible closed curves from a
25 See e.g. [43], [44] to understand what it is. mathematical point of view, while 𝓁 (𝑐) denotes the lenght of 𝑐.
26 See e.g. [17], [18], [19], [20] to understand what it is. 31 Minding’s theorem.
27 See e.g. [17], [18], [19], [20] to understand what it is. 32 See e.g. [47], [48].
IEEE, VOL. XX, NO. XX, X 2021 9
0.8
Averaage Optimal Policy
0.6
0.4
0.2
Fig.
(1) 4: The (𝓋) Markov model in relation
(1) to our scheme and
0
(𝓊)
0 10 20 30 40 50 𝜁 𝑚𝑎𝑥 , · · · , 𝜁 𝑚𝑎𝑥 as well as the 𝜁 𝑚𝑖𝑛 , · · · , 𝜁 𝑚𝑖𝑛 .
Iterations
0.6
we have gone over in Definition 2, this case guarantees the
convexity over the secrecy rate.
C OROLLARY 3 − E XAMPLE 2. In case of X M =
0.4
0 e.g. for Torus or Kelin-Bottle, regarding the inequality
S𝑎𝑟 𝑒𝑎 ≥ 𝜋2 SYS 2 M , it is proven that one should send
( ·) ( ·)
orbit whose period bounds the Hofer-Zehnder capacity on Provisionally speaking, re-call P 𝜁 𝑚𝑎𝑥 , 𝜁 𝑚𝑖𝑛 from Ap-
the energy level which is related to the cylindrical capacity pendix G. Now, if we are supposed to extend the Markov
as follows. It says for M0 ⊂ M1 ⊂ M, the following process F 𝜁 𝑠𝑒𝑡 , (·) 𝑠𝑒𝑡 ∈ {𝑚𝑖𝑛, 𝑚𝑎𝑥} to a semi-Markov one,
capacity inequality holds while C𝑎 𝑝𝑎𝑐𝑖𝑡 𝑦 denotes the capacity: while the timing jumps are randomly distributed as well, that
C𝑎 𝑝𝑎𝑐𝑖𝑡 𝑦 M1
Vℴ𝓁 M 𝑛1 is, F 𝜁 𝑠𝑒𝑡 is only valid as follows
≤ .
C𝑎 𝑝𝑎𝑐𝑖𝑡 𝑦 M0 Vℴ𝓁 M0
C OROLLARY 4 − E XAMPLE 3. F 𝜁 𝑠𝑒𝑡 (𝑡) , ∀𝑡 𝑠 ≤ 𝑡 < ∀𝑡 𝑠+1 ,
In case of complex or/and
(𝑠+1) (𝑠)
imaginary values40∫ such as X M ∫ = 𝑖, the principal eigenval-
𝑑𝑒 𝑓
(41)
𝓅𝑖 𝑗 = P𝓇 𝜁 𝑠𝑒𝑡 = 𝑗, 𝑡 𝑠+1 − 𝑡 𝑠 ≤ 𝑡|𝜁 𝑠𝑒𝑡 =𝑖 =
ues and the term M K𝑑S ∮𝑎𝑟1𝑒𝑎 + 𝜕M K𝑔 𝑑𝑠 expressed before
(𝑠+1) (𝑠)
P𝓇 𝜁 𝑠𝑒𝑡 = 𝑗 |𝜁 𝑠𝑒𝑡 = 𝑖 ,
have a structure such as 𝑥 𝑑𝑥 − something that may result
in creation of bifurcations in eigenvalues. while (·) 𝑠 stands for the 𝑠−th state.
R EMARK 6 − C ONFORMAL EQUIVALENCE FOR CURVA -
TURES 41 . Two metrics ℊ0 and ℊ𝜙 are conformally equivalent R EMARK 8 − A N OVERVIEW OVER THE POSSIBIL -
if ℊ𝜙 = 𝑒 2𝜙 ℊ0 holds while 𝑒 2𝜙 is called the conformal factor. ITY THEORY [63]-[67]. The following main rules hold in
Now, the following is satisfied for the relative curvatures [60]: the possibility-theory: (i) the normality axiom indicates that
K 𝜙 = 𝑒 2𝜙 K0 − Δ𝜙 while Δ𝜙 is the Laplacian on the relative 𝜐(𝑠) = 1, ∀𝑠 ∈ S holds; (ii) the non-negativity axiom indicates
surface. that 𝜐(∅) = 0; (iii) degree of possibility is derived by Υ(S) =
R EMARK 7 − DAVIS -K AHAN -T HEOREM42 . Assume Sup 𝜐(𝑠); (iv) degree of possibility is derived by Υ (𝑛𝑒𝑐) (S) =
𝑠 ∈S
M0 ⊂ M and M1 ⊂ M while M0 and M1 are not necessarily 1 − Inf 𝜐(𝑠); (v) the maxitivity axiom45 says that Υ(S1 ∪ S2 ) =
equal nor subsets of each other. There exists the following in 𝑠∉S
relation to the eigen-vectors 𝓋 of M0 and M1 𝑚𝑎𝑥 Υ(S1 ), Υ(S2 ) , ∀S1 , S2 ⊆ S; (vi) the
minitivity axiom
says that Υ(S1 ∩S2 ) = 𝑚𝑖𝑛 Υ(S1 ), Υ(S2 ) , ∀S1 , S2 ⊆ S. Fur-
2
𝑠𝑖𝑛] 𝓋𝑖 (M0 ), 𝓋𝑖 (M1 ) ≤ ||M0 − M1 ||, thermore, the following conditional properties are information-
𝛾𝑥 theoretically satisfied [67]
(40)
𝑑𝑒 𝑓
𝛾 𝑥 > 0 = Min |𝜁𝑖 (M1 ) − 𝜁 𝑗 (M0 )|, ( 𝑗) ( 𝑗)
𝑗≠𝑖 𝜐(𝑠1(𝑖) , 𝑠2 ) = 𝜐(𝑠2 |𝑠1(𝑖) )𝜐(𝑠1(𝑖) ),
while 𝛾 𝑥 > 0 is defined as the least separation distance of the 1 ( 𝑗)
𝜐(𝑠1(𝑖) ) = Max 𝜐(𝑠1(𝑖) , 𝑠2 ),
largest eigen-value(s) from the rest of the spectrum. 𝜛1 (𝑠1(𝑖) ) 𝑠2( 𝑗)
The proof is now completed. ( 𝑗) 1 ( 𝑗)
𝜐(𝑠2 ) = ( 𝑗)
Max 𝜐(𝑠1(𝑖) , 𝑠2 ),
(𝑖)
𝜛2 (𝑠2 ) 𝑠1
A PPENDIX H ( 𝑗)
𝜛1 (𝑠1(𝑖) ) = Max 𝜐(𝑠2 |𝑠1(𝑖) ) ≤ 1,
P ROOF OF P ROPOSITION 5 ( 𝑗)
𝑠2
( 𝑗) ( 𝑗) (42)
If the attack is a denial-of-service one and if it is perodic, as 𝜛2 (𝑠2 ) = Max 𝜐(𝑠1(𝑖) |𝑠2 ) ≤ 1,
(𝑖)
fully discussed e.g. in [61], there consequently exist two totally 𝑠1
i.i.d and separate scenraios in termf of two separately unstable 𝜐(𝑠1(𝑖) )𝜐(𝑠2 |𝑠1(𝑖) )
( 𝑗)
( 𝑗)
and stable sub-systems between which there is a switching 𝜐(𝑠1(𝑖) |𝑠2 ) = ( 𝑗)
case. Now regarding the facts that: 𝜐(𝑠2 )
( 𝑗) ( 𝑗)
• (i) the switching case theoretically entails a semi-Markov 𝜛2 (𝑠2 )𝜐(𝑠1(𝑖) )𝜐(𝑠2 |𝑠1(𝑖) )
model43 ; and = ( 𝑗) ,
Max 𝜐(𝑠1(𝑘) )𝜐(𝑠2 |𝑠1(𝑘) )
• (ii) the frequency of the occurrence in relation to our 𝑠1
(𝑘)
40 See e.g. [57], [58], [59] to understand what they technically are. See also
Caldero-Chapoton function.
41 See e.g. [60].
42 See e.g. Theorem 4.5.5. in [42].
43 See e.g. [62] to understand the randomness of the time transitions and 45 For example, if a person is a 50-year-old one, if with the confidence of
the necessity of semi-Markov modeling. 1 we say he/she is an ”aged” person, 0.5 a ”middle-aged” person, and 0 a
44 See e.g. [63], [64], [65], [66] to understand the differences between ”young” one, with the confidence of 1 we can undoubtedly declare that he/she
possibility-theory and probability-theory. is ”adult”.
IEEE, VOL. XX, NO. XX, X 2021 11
and [67] [9] K. Guo, K. An, F. Zhou, T. A. Tsiftsis, G. Zheng, ”On the Secrecy Per-
formance of NOMA-Based Integrated Satellite Multiple-Terrestrial Relay
( 𝑗)
Max 𝜐(𝑠3(𝑘) , 𝑠2 |𝑠1(𝑖) ) = Networks With Hardware Impairments,” IEEE Trans. Vehicular Technol.,
( 𝑗) Vol. 70, no. 4, pp. 3661-3676, 2021.
𝑠2
( 𝑗) ( 𝑗)
[10] X. Lai, L. Fan, X. Lei, Y. Deng, G. K. Karagiannidis, ”Secure Mobile
Max 𝜐(𝑠3(𝑘) |𝑠2 , 𝑠1(𝑖) )𝜐(𝑠2 |𝑠1(𝑖) ) = (44) Edge Computing Networks in the Presence of Multiple Eavesdroppers,”
( 𝑗)
𝑠2 IEEE Trans. Commun., Vol. pp, no. 99, pp. 1-1, 2022.
( 𝑗) ( 𝑗) [11] G. Sharma, N. Pandey, A. Singh, R. K. Mallik, ”Secrecy Optimization
Max 𝜐(𝑠3(𝑘) |𝑠2 )𝜐(𝑠2 |𝑠1(𝑖) ), for Diffusion-Based Molecular Timing Channels, ” IEEE Trans. Molecular,
( 𝑗)
𝑠2 Bio. Multi. Commun., Vol. 7, no. 4, pp. 253-261, 2021.
[12] Y. Lou, R. Sun, J. Cheng, D. Nie, G. Qiao, ”Secrecy Outage Analysis
which is also equal to [67] of Two-Hop Decode-and-Forward Mixed RF/UWOC Systems,” IEEE
Commun. Letters, Vol. pp, no. 9, pp. 1-1, 2022.
( 𝑗)
Max 𝜐(𝑠2 |𝑠3(𝑘) , 𝑠1(𝑖) )𝜐(𝑠3(𝑘) |𝑠1(𝑖) ) = [13] T. Lu, L. Chen, J. Zhang, K. Cao, ”Reconfigurable Intelligent Surface
( 𝑗)
𝑠2 Assisted Secret Key Generation in Quasi-Static Environments,” IEEE
( 𝑗) Commun. Letters, Vol. 26, no. 2, pp. 244-248, 2022.
Max 𝜐(𝑠2 |𝑠1(𝑖) )𝜐(𝑠3(𝑘) |𝑠1(𝑖) ) = (45) [14] M. Zamanipour, "A Novelty in Blahut-Arimoto Type Algorithms: Opti-
( 𝑗)
𝑠2 mal Control over Noisy Communication Channels," IEEE Trans. Vehicular
Technol. Vol. 69, no. 6, pp. 6348-6358, 2020.
𝜛3 (𝑠1(𝑖) )𝜐(𝑠3(𝑘) |𝑠1(𝑖) ). [15] P. Algoet, T. Cover, ”A Sandwich Proof of the Shannon-McMillan-
Breiman Theorem,” The Annals of Probability. Vol. 16, no. 2, pp. 899-909,
In addition, the following equations are also added [68], 1988.
[69] [16] S. Verdu, T. Han, ”The Role of the Asymptotic Equipartition Property
( in Noiseless Source Coding,” IEEE Trans. Info. Theory, Vol. 43, no. 3, pp.
𝜐 (𝑠1 , ··· ,𝑠 𝑁 ) 847-857, 1997.
, 𝜐(𝑠2 , · · · , 𝑠 𝑁 ) ≠ 0,
𝜐(𝑠1 |𝑠2 · · · , 𝑠 𝑁 ) = 𝜐 (𝑠2 , ··· ,𝑠𝑁 ) (46) [17] J. Wang, Z. Xie, G. Yu, ”Decay of scalar curvature on uni-
1, 𝜐(𝑠2 , · · · , 𝑠 𝑁 ) = 0, formly contractible manifolds with finite asymptotic dimension,”
https://arxiv.org/abs/2101.11584, 2021.
as well as [18] B. Tosun, ”Stein domains in C2 with prescribed boundary,” Adv. Geom.,
Ö Vol. 22, no. 1, pp. 9-22, 2022.
𝜐(𝑠1 , · · · , 𝑠 𝑁 ) = 𝜐 𝑠𝑖 |𝒫𝒶𝓇(𝑠𝑖 ) , (47) [19] J. M. Lee, ”Introduction to smooth manifolds,” G. Texts. Math., 2012.
𝑖 [20] G. Naber, ”Topological methods in Euclidean spaces,” Dover, 2000.
[21] A. Tsiamis, K. Gatsis, G. J. Pappas, ”State-Secrecy Codes for Networked
while the parent elements46 𝒫𝒶𝓇(𝑠𝑖 ) are the ones defined by Linear Systems,” IEEE Trans. Auto. Control, Vol. 65, no. 5, pp. 2001-2015,
the Cartesian poruct of the main set’s domain, aacording to 2020.
[22] B. Anderson, J. Moore, ”Optimal filtering,” Prentice-Hall, 1979.
the following definition for the possibilistic graphs. [23] H. Sun, Z. Wang, ”Minimal Euler Characteristics of 4-manifolds with
D EFINITION 5: P OSSIBILISTIC GRAPH [68], [69]. A 3-manifold groups,” https://arxiv.org/abs/2103.10273, 2021.
possibilistic casual network is defined in terms of the graph [24] R. Caniato, T. Riviere, ”The Unique Tangent Cone Property
𝑑𝑒 𝑓
for Weakly Holomorphic Maps into Projective Algebraic Varieties,”
𝒢𝓅ℴ𝓈𝓈 = 𝑠, 𝒫𝒶𝓇(𝑠), 𝛼𝓅ℴ𝓈𝓈 : 𝜐 𝑠|𝒫𝒶𝓇(𝑠) = 𝛼𝓅ℴ𝓈𝓈 ≠ https://arxiv.org/abs/2108.10371, 2021.
[25] G. Olikier, P. Absil, ”On the continuity of the tangent cone to the
determinantal variety,” https://arxiv.org/abs/2201.03979, 2022.
1 . [26] F. Fillastre, ”Gauss images of hyperbolic cusps with convex polyhedral
boundary,” Trans. American Math., Vol. 363, no. 10, pp. 5481-5536, 2011.
The proof is now completed. [27] B. Anderson, M. Ye, ”Exterma without convexity and stability without
Lyapunov,” Com. Info. Sys., Vol. 20, no. 3, 2020.
[28] C. Byrnes, ”On brockett’s necessary condition for stabilizability and the
R EFERENCES topology of Lyapunov functions on R𝑛 ,” Com. Info. Sys., Vol. 8, no. 4,
pp. 333-352, 2008.
[1] Y. Ai, A. Mathur, L. Kong, ”Secure Outage Analysis of FSO Communi- [29] R. A. Vitale, ”The Brunn-Minkowski inequality for random sets,” J.
cations Over Arbitrarily Correlated Málaga Turbulence Channels,” IEEE Multivariate Anal., Vol. 33, no. 2, pp. 286-293, 1990.
Trans. Vehicular Technol., Vol. 70, no. 4, pp. 3961-3965, 2021. [30] S. Boyd, S. P. Boyd, and L. Vandenberghe, ”Convex Optimization.”
[2] Y. Ai, F. A. P. deFigueiredo, L. Kong, ”Secure Vehicular Communica- Cambridge University Press, 2004
tions Through Reconfigurable Intelligent Surfaces,” IEEE Trans. Vehicular [31] W. Liu, ”Decay rates of energy of the 1D damped original nonlinear
Technol., Vol. 70, no. 4, pp. 7272-7276, 2021. wave equation,” Nonlinear Anal. Real W. Apps., Vol. 63, pp. 103-412,
[3] L. Yang, J. Yang, W. Xie, ”Secrecy Performance Analysis of RIS-Aided 2022.
Wireless Communication Systems,” IEEE Trans. Vehicular Technol., Vol. [32] H. J. van Waarde, M. K. Camlibel, ”A Matrix Finsler’s Lemma with
69, no. 10, pp. 12296-12300, 2020. Applications to Data-Driven Control,” https://arxiv.org/abs/2103.13461,
[4] I. Trigui, W. Ajib, W. Zhu, ”Secrecy Outage Probability and Average Rate 2021.
of RIS-Aided Communications Using Quantized Phases,” IEEE Commun. [33] T. S. Blyth, E. F. Robertson, Basic Linear Algebra, 2nd ed., Springer,
Letters, Vol. 25, no. 6, pp. 1820-1824, 2021. 1998.
[5] S. Kavaiya, D. K. Patel, Z. Ding, Y. L. Guan, ”Physical Layer Security [34] L. V. Ahlfors, Complex Analysis, 2nd ed., New York: McGraw-Hill,
in Cognitive Vehicular Networks,” IEEE Trans. Commun., Vol. 69, no. 4, 1970.
pp. 2557-2569, 2021. [35] K. Petersen, M. Pedersen, The Matrix Cookbook,
[6] K. Lee, J. Bang, H. Choi, ”Secrecy Outage Minimization for Wireless- http://matrixcookbook.com, 2012.
Powered Relay Networks With Destination-Assisted Cooperative Jam- [36] Y. Li, G. Geng, Q. Jiang, ”A Parallelized Contour Integral Rayleigh–Ritz
ming,” IEEE IoT. J., Vol. 8, no. 3, pp. 1467-1476, 2021. Method for Computing Critical Eigenvalues of Large-Scale Power Sys-
[7] R. K. Ahiadormey, P. Anokye, H. Jo, C. Song, ”Secrecy Outage Analysis tems,” IEEE Trans. Smart Grid, Vol. 9, no. 4, pp. 3573-3581, 2018.
in NOMA Power Line Communications,” IEEE Commun. Letters, Vol. 25, [37] T. Ikegami, T. Sakurai, “Contour Integral Eigensolver for Non-Hermitian
no. 5, pp. 1448-1452, 2021. Systems: a Rayleigh-Ritz-type Approach,” Taiwanese J. Math., vol. 14, no.
[8] R. Ruby, Q. Pham, K. Wu, A. A. Heidari, H. Chen, ”Enhancing Se- 3A, pp. 825-837, 2010.
crecy Performance of Cooperative NOMA-based IoT Networks via Multi- [38] Y. Li, G. Geng, Q. Jiang, ”A Parallel Contour Integral Method for
Antenna Aided Artificial Noise,” IEEE IoT. J., Vol. pp, no. 99, pp. 1-1, Eigenvalue Analysis of Power Systems,” IEEE Trans. Power Sys., Vol.
2022. 32, no. 1, pp. 624 - 632, 2017.
[39] Alon, Noga, Spencer, Joel H. The Probabilistic Method 2nd ed. John
46 Casual prior samples. Wiley & Sons, Inc., 2000.
IEEE, VOL. XX, NO. XX, X 2021 12