You are on page 1of 4

This article has been accepted for publication in a future issue of this journal, but has not been

fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/LWC.2018.2879842, IEEE Wireless
Communications Letters

Secure UAV-to-UAV Systems with Spatially Random UAVs


Jia Ye, Chao Zhang, Hongjiang Lei, Gaofeng Pan, M ember, IEEE , and Zhiguo Ding, SeniorM ember, IEEE
Abstract—In this letter, we investigate the secrecy performance eavesdropping and malicious jamming simultaneously. The
of an unmanned aerial vehicle (UAV)-to-UAV system, where tight lower-bound of ergodic capacity was obtained for UAV
a UAV acts as the source (S) transmitting information to aided cellular communications systems [14]. However, most of
a legitimate UAV receiver while a group of UAVs trying to
eavesdrop the information delivery between S and legitimate the existing works mainly focus on the UAV-to-ground systems
UAV receiver. The locations of the legitimate UAV receiver and in 2-dimensional (2D) space which only has one direction of
the eavesdropping UAVs are randomly distributed in the coverage communication model from the ground to the air. The security
space of S. We first characterize the statistical characteristics of of UAV-to-UAV (A2A) systems in 3-dimensional (3D) space
the signal-to-noise ratio over S to the legitimate UAV receiver will be more complicated since the receivers or eavesdrop-
links; and then the closed-form analytical expressions for secrecy
outage probability and the average secrecy capacity have also pers work in all directions, leading to the difficulties in the
been derived accordingly. Finally, Monte-Carlo simulations are mathematical derivations during the performance modeling,
carried out to verify our proposed analytical models. as shown in Section II, III and IV. It is obvious that the 3D
Index Terms—Average secrecy capacity, secrecy outage prob- security model has not been well investigated and understood,
ability, stochastic geometry, unmanned aerial vehicles. still leaving an open issue.
Furthermore, most of the researches only consider the fixed
I. I NTRODUCTION locations and fixed number of UAVs, while UAVs can move
Recently, unmanned aerial vehicles (UAVs) hook more and freely and flexibly in the 3D space. However, in practical sce-
more researchers’ interests as they have been regarded as narios, the positions of UAVs may vary due to the conditions
an effective complement to aerial communications, which of airspace or the scheduled tasks to the UAVs. Especially,
can provide robust and reliable communication networks [1]. the malicious UAVs, who want to eavesdrop the transmitted
UAVs could not only play a key role in both military and information, will always change their positions to cover up
civilian area [2], but also apply in wireless communications their eavesdropping behaviors. Thus, in this work we will
[3]. The authors of [4] analyzed the deployment of and UAV consider a general case with the randomness of the terminals’
as a flying base station in a given geographical communica- positions, as well as the random number of the eavesdropping
tion area. [5] studied the optimum relay UAV placement to UAVs. Moreover, Many previous works have considered 2D
maxmize reliability. The applicability of UAV networks was space and are not suitable for A2A systems, because UAVs
investigated in [6]. may be distributed anywhere in the airspace.
However, most of the existing literatures have not consid- Motivated by the above observations, in this letter we
ered the security of the confidential information transmitted investigate the secrecy performance of an A2A communication
from the transmitting UAV to a legitimate UAV. Actually, there system with a legitimate UAV and a group of eavesdropping
is a promising method, that is, physical-layer (PHY) security UAVs in the line of sight (LoS) 3D space. It is reasonable
which can prevent information delivery from eavesdropping to assume that channels mainly experience LoS fading in the
[7]- [8]. Several techniques have been investigated to achieve open space [15] because UAVs flying above buildings and
positive secrecy rates for UAV communication systems, such shadows are more likely to observe the radio path clearance
as artificial noise [9], power control [10], and so on. The from other UAVs in the surrounding areas. Also, in some
authors of [11] studied the maximum secrecy rate and the application scenarios that UAVs fly in stratosphere, there is
UAV’s optimizing trajectory considering transmit power over no reflected signal and LoS fading plays the main role during
a finite horizon. [12] discussed how spatial communication se- the transmissions [16]1 . We also consider the randomness of
curity was affected by the communication through theoretical the locations of all UAVs and the number of the eavesdropping
analysis and simulation results. In [13], hybrid outage proba- UAVs by using the stochastic geometry theory. The main
bility was derived to examine the security issue of UAV-aided contributions of this work are summarized as: 1) We charac-
communication systems while the eavesdropper performing terize the probability density function (PDF) and cumulative
distribution function (CDF) of the signal-to-noise-ratio (SNR)
Manuscript received Apr. 20, 2018; revised Aug. 17, 2018; accepted over the A2A links; 2) The closed-form analytical expressions
Nov. 2, 2018. This research was supported by the UK EPSRC under grant
number EP/P009719/2 and by H2020-MSCA-RISE-2015 under grant number for secrecy outage probability (SOP) and the average secrecy
690750. The work of H. Lei is supported by the Project of Fundamental capacity (ASC) have been derived.
Science and Frontier Technology Research Plan of Chongqing under Grant Notations: B (x, y) and f (x, y) denote Beta functions and
cstc2017jcyjAX0204. The associate editor coordinating the review of this pa-
per and approving it for publication was Pawel Dmochowski. (Corresponding joint PDF related x and y. 3 F2 (·) and 2 F1 (·) denote Gauss
author: Gaofeng Pan.) hypergeometric functions. ln (·) denote natural logarithms.
J. Ye, C. Zhang and G. Pan are with Chongqing Key Laboratory of Non- j (N −1)!
linear Circuits and Intelligent Information Processing, Southwest University,
CN −1 = j!(N −1−j) with N > 1.
Chongqing, 400715, China. e-mail: gfpan@swu.edu.cn.
H. Lei is with the Chongqing Key Lab of Mobile Communications Tech- 1 In Section V, we present some simulation results under case with both LoS
nology, Chongqing University of Posts and Telecommunications, Chongqing and Non-line-of-sight (NLoS, e.g., Nakagami-m fading) fading to show the
400065, China. impact of NLoS fading on the secrecy performance of the considered system.
Z. Ding is with School of Electrical and Electronic Engineering, The We leave the analysis of this case for future works due to its complexity and
University of Manchester, Manchester, M13 9PL, U.K. the page limitation.

2162-2337 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/LWC.2018.2879842, IEEE Wireless
Communications Letters

γP
II. S YSTEM MODEL Lemma 1. The CDF of γi = d2
can be expressed as
i


 3
( γP ) γP
1− , x≥

3 D2
Fγi (x) = x 2 D3 . (1)
 0, γP
x< D2

3
Proof: Using fW (w) = 4πD 3
, we have the CDF of di as
Zx Zπ Z2π
3
Fdi (x) = sin φi d2i dθi dφi d (di )
4πD3
0 0 0

 0, x < D

= x3
D3
, 0≤x≤D . (2)

1, x > D

Fig. 1: System model
Therefore, we can achieve the CDF of γi as
In this work, we consider a A2A communication system, as ( r )
shown in Fig. 1, where a UAV with a single omni transmitting γP
Fγi (x) = Pr {γi ≤ x} = 1 − Pr di ≤ . (3)
antenna acts as the source (S) trying to transmit its information x
to a legitimate UAV2 . Furthermore, there are also a group of
UAVs distributed in the coverage space (in which the received Then, the proof is completed.
signal strength is equal or above the threshold at the receiver
Corollary 1. Accordingly, the PDF of γi can be expressed as
to demodulate and decode the received signal) of S trying

 3
to eavesdrop the information transmission between S and the  3( γP )
, x≥ γP
5 D2
legitimate UAV. For tractability purpose, in this work we treat fγi (x) = 2x 2 D3 . (4)
 0, γP
the coverage space of S as a sphere, V, with radius, D (D > 0) x< D2

m, where S is located at the center of the sphere. Without


of loss generality, we assume that the legitimate UAV and Proof: The PDF of γi is the derivative of (1).
N (N > 1) eavesdropping UAVs can be modeled as a set of Lemma 2. The CDF of γmax with N eavesdropping UAVs
independent and identical uniformly distributed points without can be derived as
cooperation with each other in the sphere V, denoted by W , in √ 3 N
  
( γP ) γP
1− , x≥

order to protect their eavesdropping activities. The number of FγNmax (x) = 3
x 2 D3
D2 . (5)
γP
the eavesdropping receivers is Poisson distributed with density

0, x< D2
3
λ, i.e., P {N = k} = µkV /k! exp (−µV ), where µV = 4πD 3
λ
is the mean measure. Proof: Using probability theory, we have Fz (z) =
In the following, we name the legitimate receiver as the Pr {max {x1 , x2 , ..., xM } ≤ z}, if x1 , x2 , ..., xM are M (M >
M
0th receiver to facilitate the following analysis. Therefore, 1) independent variables. Then, Fz (z) =
Q
Fxi (z), where
the distance between S and UAVs can be calculated from i=1

W , the PDF of which can be given by using Eq. (1) in Fxi (x) is the CDF of xi . As the eavesdropping channels are
[17] as fW (w) = 4πD 3 independent with each other, we can derive the CDF of γmax
3 . In this work, we assume that the

communication channels from S to UAVs are dominated as (5).


by LoS links rather than other channel impairments in the Corollary 2. Accordingly, the PDF of γmax with N eaves-
open airspace, such as shadowing or small-scale fading, as dropping UAVs can be expressed as
treated in [3]. Thus, the channel power gain from S to the   √
( γP )3
N −1 √
3( γP )
3
γP
N 1− 3 , x≥

ith (0 < i 6 N ) UAV follows the free-space path loss model, fγNmax (x) = x D 2
5
3
2x D 2 3 D2
which can be given by gi = βd−2 i , where β denotes the channel

0, x< D γP
2
power at the reference distance d = 1 m, whose value depends  √ 3 N −1 √ 3j
 N (3 γP ) P
(−1)j CNj ( γP ) γP
on the carrier frequency, antenna gain, etc., and di is the link 2D 3 −1 3 j+ 5 3j , x ≥ D 2
= j=0 x2 2D .
distance between S and the ith UAV. 
0, γP
x< D 2
Let P denote the transmit power at S. The received SNR (6)
at the ith UAV from S can be expressed as γi = Pδg2i = γP d2
,
i
2 β
Proof: The PDF of γmax is the derivative of (5).
where δ denotes the noise power, and γ = δ2 represents the
γP
reference SNR. In the following, we also denote vmin = D 2 ≤

γi ≤ vmax = ∞ for simplification, where vmin and vmax means III. T HE S ECRECY O UTAGE P ROBABILITY
the minimum and maximum values of γi respectively. In this letter, SOP is defined as the probability that the
2 In this work, we only consider omni transmitting antenna to introduce the instantaneous secrecy capacity is below a threshold secrecy
analysis method for A2A systems and the system with directional antenna is a rate, Cth (Cth ≥ 0). Therefore, the instantaneous secrecy
special case of the one with omni transmitting antenna: the coverage space of capacity from S to the legitimate UAV is
directional antenna is a part of the one of omni antenna, leading to a portion
of the sphere for eavesdroppers to distribute, as indicated in Fig. 1. CS (γ0 , γmax ) = max {log2 (1 + γ0 ) − log2 (1 + γmax ) , 0} , (7)

2162-2337 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/LWC.2018.2879842, IEEE Wireless
Communications Letters

N
where γmax = max {γi }. Thus, we can calculate C̄s1 as
i∈{1,...,N }
Then, let ν = 2 Cth
. SOP can be written as Z∞
N
  C̄s1 = ln (1 + x) f0 (x)
1 + γ0
Pr (Cth ) = Pr {Cs ≤ Cth } = Pr ≤ 2Cth vmin
1 + γmax
Zx √ 3 N −1 √ 3j
= Pr {γ0 ≤ νγmax + ν − 1} . (8) 3 γP X γP
× N (−1)j CN
j
−1 3 5 dydx
2D3 j=0 y 2 j+ 2 D3j
vmin
−1 √ 3j+6 Z∞
Theorem 1. Using the Corollary 1 and Corollary 2, we can N
X 9N (−1)j γP 5
express Pr (Cth ) as follows: = j
CN −1 3 3 x− 2 ln (1 + x)dx
√ 3j+6 j=0 2(3j + 3) vmin 2 j+ 2 D3j+6

"N −1 vmin
X µV −µV X j j 3N γP √ 3j+6 Z∞
Pr (Cth )= e (−1) CN −1 3 j+3
N −1
9N (−1) γP j
N =1
N! j=0 (3j + 3) vmin 2 D3j+6 −
X j
CN
3
x− 2 j−4 ln (1 + x)dx.
−1
N −1 √ 3j+6 j=0
2(3j + 3) D3j+6
X 3N γP vmin
− (−1)j CN
j
−1 3 (13)
j=0 2ν 2 D3j+6
  In order to facilitate the analysis, we define a new function
B 2 j + 3, 1 2 F1 23 j + 52 , 1; 23 j + 23 ;
3 3

2vmin R∞ m
× q , g1 (m) = x ln (1 + x) dx. Using Eq. (2.6.10.47) in [19],
3 5
vmin 2 j+ 2 1 − ν1 + vmin vmin
we can easily calculate g1 (m) as
(9)
g1 (m) = vmin m+1 B (1, −m − 1) [ln (vmin ) + ψ (−m)
Proof: As the main and eavesdropping channels are
independent with each other, we can calculate Pr (Cth ) with −ψ (−m − 1)] + vmin m B (1, −m)
 
N eavesdropping UAVs as 1
× 3 F2 −m, 1, 1; 2, −m + 1; − . (14)
Z∞ νy+ν−1
Z vmin
PrN (Cth ) = fγ0 (x) fγmax (y) dxdy N
Then, using (14) in (13), we can easily derive C̄s1 as
vmin vmin
N −1 √ 3j+6
√ 3 9N (−1)j
 
Z∞ νy+ν−1
N
X j γP
5
3 γP C̄s1 = CN g −
Z
−1 3 3 1
= fγmax (y) 5 dxdy j=0 2(3j + 3) vmin 2 j+ 2 D3j+6 2
2x 2 D3 √
vmin vmin N −1 3j+6
9N (−1)j γP
  
Z∞ √ 3j+6
X j 3
N −1
3N γP − CN −1 g1 − j − 4 , (15)
X j j 2(3j + 3) D3j+6 2
= (−1) CN −1 3 3 5 dy. (10) j=0
j=0 2vmin 2 D3j+6 y 2 j+ 2
vmin R∞
where g1 (m) = xm ln (1 + x) dx.
vmin
Using Eq. (3.197.2) in [18] and taking the Poisson distribut- N
Similarly, we can also derive C̄s2 by using (14) as
ed number of eavesdroppers into consideration, Pr (Cth ) can
be obtained as (9). Z∞ vZ
max √ 3
N 3 γP
C̄s2 = ln (1 + y) fγmax (y) 5 dxdy
IV. T HE AVERAGE S ECRECY C APACITY 2x 2 D3
vmin y

In this work, ASC is defined the expected value of secrecy N −1 √ 3j+6 Z∞


X 3N γP 3
capacity as follows3 = (−1)j CN
j
−1 y − 2 j−4 ln (1 + y) dy
j=0
2D3j+6
C̄s (γ0 , γmax ) = E [Cs (γ0 , γmax )] vmin
N −1 √ 3j+6 
Z∞ Z∞

X 3N γP 3j
= Cs (γ0 , γmax ) f (γ0 , γmax ) dγ0 dγmax . (11) = (−1)j CN
j
−1 g1 − − 4 . (16)
j=0
2D3j+6 2
υmin υmin

As the main and eavesdropping channels are independent Finally, ASC can be obtained by substituting (15) and (16)
with each other, we can rewrite ASC as into (12).
X∞
µV V. N UMERICAL RESULTS
N N
C̄s (γ0 , γmax ) = exp (−µV )(C̄s1 − C̄s2 )/ ln 2, (12)
N ! In this section, Monte Carlo simulations are carried out
N =1
to validate our proposed analytical expressions for SOP and
N
R∞ Rx
where C̄s1 = ln(1 + x)fγ0 (x) fγmax (y) dydx and ASC under dominated LoS fading channels and Nakagami-m
υmin υmin
R∞ R∞ fading. The main adopted parameters are set as γ = 80 dB
N
C̄s2 = ln(1 + y)fγmax (y) fγ0 (x)dxdy . [11], P = 10 dBW, Cth = 1 bits/s/Hz and the expectation of
υmin y
channel power gain of the Nakagami-m fading channel is 1
3 The ergodic secrecy capacity aims at a case that the source can gain the dB. Moreover, the coverage distance of the source UAV is set
channel state information (CSI) of the eavesdropping link and transmits the from hundreds of meters to tens of km to reflect the practical
information only when the legitimate channel outperforms the eavesdropping scenarios of UAVs in civil and military applications.
channel. Therefore, the ergodic secrecy capacity is a special case of ASC, as
ASC is calculated for the case that no matter the CSI of the eavesdropping Fig. 2(a) shows the SOP versus λ for various Cth with
channel is available or not at the source. D = 500 m. Since a high threshold secrecy rate means the

2162-2337 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/LWC.2018.2879842, IEEE Wireless
Communications Letters

10 0 10 0
only experiencing LoS fading serves as the lower bound of
the ASC.
10 -1
Finally, we can also clearly see from Figs. 2-3 that simu-
lation and analysis results match very well with each other,
SOP

SOP
10 -2

which can verify the correctness of our proposed analysis


10 -1

10 -3
models.
VI. C ONCLUSION
-100 -98 -96 -94 -92 -90 -88 -86 -84 -82 -80
10 -4
1000 2000 3000 4000 5000 6000 7000 8000 9000 10000 In this letter, we have studied the secrecy performance of
a A2A communication system and derived the closed-form
(a) SOP versus λ (b) SOP versus D analytical expressions for SOP and ASC. We consider the
Fig. 2: SOP randomness of the number and the positions of all UAVs to
10 0
make our system more practical. From the numerical results,
we can obtain that the density of the eavesdropping UAVs and
the radius of the coverage space of S exhibit a negative impact
10 -1
on SOP. However, the ASC can be improved by increasing the
radius of the coverage space of the source UAV.
ASC

ASC

10 -1
R EFERENCES
[1] S. Hayat, E. Yanmaz, and R. Muzaffar, “Survey on unmanned aerial
vehicle networks for civil applications: A communications viewpoint,”
0.5 0.6 0.7 0.8 0.9 1 1.1 1.2 1.3 1.4 1.5
10 -2
70 71 72 73 74 75 76 77 78 79 80 IEEE Commun. Surveys Tuts., vol. 18, no. 4, pp. 2624-2661, 4th Quart.,
10 4
2016.
[2] M. Erdelj, E. Natalizio, K. R. Chowdhury, and I. F. Akyildiz, “Help from
(a) ASC versus D (b) ASC versus γ the sky: Leveraging UAVs for disaster management,” IEEE Pervasive
Comput., vol. 16, no. 1, pp. 24-32, Jan. 2017.
Fig. 3: ASC [3] Y. Zeng, R. Zhang, and T. J. Lim, “Wireless communications with
system requires a large channel secrecy rate, we can see that unmanned aerial vehicles: Opportunities and challenges,” IEEE Commun.
Mag., vol. 54, no. 5, pp. 36-42, May 2016.
the systems with a small Cth outperforms the one with a [4] M. Mozaffari, W. Saad, M. Bennis and M. Debbah, “Unmanned aerial
large Cth . Fig. 2(b) shows the SOP versus D for various λ. vehicle with underlaid device-to-device communications: Performance
Clearly, there are more eavesdropping UAVs when λ and/or and tradeoffs,” IEEE Trans. Wireless Commun., vol. 15, no. 6, pp. 3949-
3963, Jun. 2016.
D increase, resulting in degraded SOP. Because the diversity [5] Y. Chen, W. Feng and G. Zheng, “Optimum placement of UAV as relays,”
gain of the information eavesdropping will increase, while the IEEE Commun. Lett., vol. 22, no. 2, pp. 248-251, Feb. 2018.
number of eavesdropping UAVs enlarging. [6] T. Andre et al., “Application-driven design of aerial communication
networks,” IEEE Commun. Mag., vol. 52, no. 5, pp. 129-137, May 2014.
Fig. 3(a) presents the ASC versus D for various λ, in which [7] G. Pan, J. Ye, Z. Ding, “On secure VLC systems with spatially random
one can see that ASC can be improved in the low λ region and terminals,” IEEE Commun. Lett., vol. 21, no. 3, pp. 492-495, Mar. 2017.
degrades in large λ region when λ decreases or D increases. [8] G. Pan, J. Ye, Z. Ding, “Secure hybrid VLC-RF systems with light energy
harvesting,” IEEE Trans. Commun., vol. 65, no. 10, pp. 4348-4359, Oct.
Because low λ and large D can improve the probability that 2017.
the distance between S and the legitimate UAV is shorter than [9] S. Goel and R. Negi, “Guaranteeing secrecy using artificial noise,” IEEE
the ones among S and the eavesdropping UAVs. Then, the Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, Jun. 2008.
[10] P. K. Gopala, L. Lai, and H. E. Gamal, “On the secrecy capacity of
legitimate UAV will suffer weaker eavesdropping, compared fading channels,” IEEE Trans. Inf. Theory., vol. 54, no. 10, pp. 4687-
to the case with high λ and small D. However, it is exactly 4698, Oct. 2008.
opposite for ASC in the high λ and/or low D regions, since [11] G. Zhang, Q. Wu, M. Cui and R. Zhang, “Securing UAV communica-
tions via trajectory optimization,” in Proc. GLOBECOM 2017, Singapore,
there will be more eavesdropping UAVs, leading to poorer 2017, pp. 1-6.
secrecy performance. As shown in Fig. 3(b) with λ = −130 [12] S. W. Kim and S. W. Seo, “Cooperative unmanned autonomous vehicle
dB, we can also see that the reference SNR γ cannot play control for spatially secure group communications,” IEEE J. Sel. Areas
Commun., vol. 30, no. 5, pp. 870-882, June 2012.
a positive role significantly, since the received SNR over the [13] C. Liu, T. Q. S. Quek and J. Lee, “Secure UAV communication in the
eavesdropping links will also be improved when γ increases. presence of active eavesdropper,” in Proc. WCSP 2017, Nanjing, 2017,
Moreover, while suffering both LoS and Nakagami-m fad- pp. 1-6.
[14] H. Sha, F. Jose, R. Fredrik, E. Ove, “Unmanned aerial vehicle assisted
ing, we also present the SOP performance with m = 2 cellular communication,” arXiv:1803.05763, 2018.
and m √ = 3 in Fig.√2(a) and Fig. 2(b), and the ASC with [15] K.Welch, “Evolving cellular technologies for safer drone operation,”
m = 6 and m = 2 in Fig. 3(a) and Fig. 3(b), separately. Qualcomm 5G White Paper Present., San Diego, CA, USA, Tech. Rep.,
Oct. 2016.
One can see that the SOP and ASC suffering both LoS [16] Iskandar, Wireless channel characteristic and its performance for strato-
propagation and Nakagami-m fading outperforms the ones spheric platform communication, doctoral dissertation, Waseda Universi-
only experiencing LoS propagation. This observation can be ty, Tokyo, Japan, 2007.
[17] G. Pan, H. Lei, Z. Ding and Q. Ni, “On 3-D hybrid VLC-RF systems
explained by the fact: Benefiting from the diversity gain of with light energy harvesting and OMA scheme over RF links,” in Proc.
multiple eavesdropping UAVs, the equivalent received SNR at GLOBECOM 2017, Singapore, 2017, pp. 1-6.
eavesdroppers, γmax , will degrade slower compared with the [18] I.S. Gradshteyn and I.M. Ryzhik, Table of integrals, Series and Products,
7 Ed. San Diego: Academic Press, 2007.
received SNR at the legitimated UAV, γ0 , when the channels [19] A. P. Prudnikov, Yu. A. Brychkov, and O. I. Marichev, Integrals and
get worse. Therefore, we can see that the SOP only suffering Series: vol. 1, Elementary Functions, 3rd Ed., New York: Gordon &
LoS fading acts as the upper bound of the SOP, and the ASC Breach Sci. Publ., 1992.

2162-2337 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

You might also like