{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:16:43Z","timestamp":1758845803570,"version":"3.37.3"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,2,15]],"date-time":"2021-02-15T00:00:00Z","timestamp":1613347200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,2,15]],"date-time":"2021-02-15T00:00:00Z","timestamp":1613347200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61971403"],"award-info":[{"award-number":["61971403"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Special Presidential Foundation of Technology and Engineering Center for Space Utilization of the Chinese Academy of Sciences","award":["CSU-QZKT-2018-16"],"award-info":[{"award-number":["CSU-QZKT-2018-16"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2021,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>In this paper, we investigate the secrecy performance of short-packet transmissions in ultra-reliable and low-latency communications (URLLC). We consider the scenario where a multi-antenna source communicates with a single-antenna legitimate receiver requiring ultra-high reliability and low latency, in the presence of a single-antenna eavesdropper. In order to safeguard URLLC, the source transmits the artificial noise (AN) signal together with the confidential signal to confuse the eavesdropper. We adopt a lower bound on the maximal secrecy rate as the secrecy performance metric for short-packet transmissions in URLLC, which takes the target decoding error probabilities at the legitimate receiver and the eavesdropper into account. Using this metric, we first derive a compact expression of the generalized secrecy outage probability (SOP). Then, we formally prove that the generalized SOP is a convex function with respect to the power allocation factor between the confidential signal and the AN signal. We further determine the optimal power allocation factor that minimizes the generalized SOP. The results presented in this work can be useful for designing new secure transmission schemes for URLLC.<\/jats:p>","DOI":"10.1186\/s13638-020-01862-7","type":"journal-article","created":{"date-parts":[[2021,2,17]],"date-time":"2021-02-17T14:09:28Z","timestamp":1613570968000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Secrecy analysis of short-packet transmissions in ultra-reliable and low-latency communications"],"prefix":"10.1186","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4988-8269","authenticated-orcid":false,"given":"Jianhua","family":"He","sequence":"first","affiliation":[]},{"given":"Guangheng","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Lu","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xue","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,15]]},"reference":[{"key":"1862_CR1","unstructured":"3GPP TR 38.913: study on scenarios and requirements for next generation access technologies. Technical report. Release 14. 3GPP (2016)"},{"key":"1862_CR2","unstructured":"C. Yang, C. Sun, Z. Gu, Y. Li, C. Yang, H.V. Poor, B. Vucetic, A tutorial of ultra-reliable and low-latency communications in 6G: integrating theoretical knowledge into deep learning. arXiv:2009.06010"},{"issue":"2","key":"1862_CR3","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/MWC.2016.1500157RP","volume":"24","author":"A Aijaz","year":"2017","unstructured":"A. Aijaz, M. Dohler, A.H. Aghvami, V. Friderikos, M. Frodigh, Realizing the tactile internet: haptic communications over next generation 5G cellular networks. IEEE Wirel. Commun. 24(2), 82\u201389 (2017)","journal-title":"IEEE Wirel. Commun."},{"issue":"2","key":"1862_CR4","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/MCOM.2017.1600435CM","volume":"55","author":"P Schulz","year":"2017","unstructured":"P. Schulz, M. Matth\u00e9, H. Klessig et al., Latency critical IoT applications in 5G: perspective on the design of radio interface and network architecture. IEEE Commun. Mag. 55(2), 70\u201378 (2017)","journal-title":"IEEE Commun. Mag."},{"issue":"9","key":"1862_CR5","doi-asserted-by":"publisher","first-page":"2057","DOI":"10.1109\/LCOMM.2017.2696958","volume":"21","author":"HVK Mendis","year":"2017","unstructured":"H.V.K. Mendis, F.Y. Li, Achieving ultra reliable communication in 5G networks: a dependability perspective availability analysis in the space domain. IEEE Commun. Lett. 21(9), 2057\u20132060 (2017)","journal-title":"IEEE Commun. Lett."},{"issue":"6","key":"1862_CR6","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/MCOM.2017.1601092","volume":"55","author":"C She","year":"2017","unstructured":"C. She, C. Yang, T.Q.S. Quek, Radio resource management for ultra-reliable and low-latency communications. IEEE Commun. Mag. 55(6), 72\u201378 (2017)","journal-title":"IEEE Commun. Mag."},{"issue":"1","key":"1862_CR7","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1109\/TWC.2017.2762684","volume":"17","author":"C She","year":"2018","unstructured":"C. She, C. Yang, T.Q.S. Quek, Cross-layer optimization for ultra-reliable and low-latency radio access networks. IEEE Trans. Wirel. Commun. 17(1), 127\u2013141 (2018)","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"5","key":"1862_CR8","doi-asserted-by":"publisher","first-page":"3768","DOI":"10.1109\/TCOMM.2019.2896184","volume":"67","author":"C She","year":"2019","unstructured":"C. She, C. Liu, T.Q.S. Quek, C. Yang, Y. Li, Ultra-reliable and low-latency communications in unmanned aerial vehicle communication systems. IEEE Trans. Commun. 67(5), 3768\u20133781 (2019)","journal-title":"IEEE Trans. Commun."},{"key":"1862_CR9","unstructured":"P. Popovski, et al. Deliverable d6.3 intermediate system evaluation results. ICT-317669-METIS\/D6.3 (2014)"},{"key":"1862_CR10","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.1900630","author":"C She","year":"2020","unstructured":"C. She et al., Deep learning for ultra-reliable and low-latency communications in 6G networks. IEEE Netw. (2020). https:\/\/doi.org\/10.1109\/MNET.011.1900630","journal-title":"IEEE Netw."},{"issue":"4","key":"1862_CR11","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MCOM.2015.7081071","volume":"53","author":"N Yang","year":"2015","unstructured":"N. Yang, L. Wang, G. Geraci, M. Elkashlan, J. Yuan, M.D. Renzo, Safeguarding 5G wireless communication networks using physical layer security. IEEE Commun. Mag. 53(4), 20\u201327 (2015)","journal-title":"IEEE Commun. Mag."},{"issue":"3","key":"1862_CR12","doi-asserted-by":"publisher","first-page":"1550","DOI":"10.1109\/SURV.2014.012314.00178","volume":"16","author":"A Mukherjee","year":"2014","unstructured":"A. Mukherjee, S.A.A. Fakoorian, J. Huang, A.L. Swindlehurst, Principles of physical layer security in multiuser wireless networks: a survey. IEEE Commun. Surv. Tutor. 16(3), 1550\u20131573 (2014)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"1862_CR13","unstructured":"L. Senigagliesi, M. Baldi, S. Tomasin, Resource allocation for secure Gaussian parallel relay channels with finite-length coding and discrete constellations. arxiv:1807.06448"},{"issue":"5","key":"1862_CR14","doi-asserted-by":"publisher","first-page":"2565","DOI":"10.1109\/TWC.2019.2904968","volume":"18","author":"H-M Wang","year":"2019","unstructured":"H.-M. Wang, Q. Yang, Z. Ding, H.V. Poor, Secure short-packet communications for mission-critical IoT applications. IEEE Trans. Wirel. Commun. 18(5), 2565\u20132578 (2019)","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"1862_CR15","doi-asserted-by":"crossref","unstructured":"W. Yang, R.F. Schaefer, H.V. Poor, Finite-blocklength bounds for wiretap channels, in Proceedings of IEEE International Symposium on Information Theory (ISIT). Barcelona, Spain, pp. 3087\u20133091 (2016)","DOI":"10.1109\/ISIT.2016.7541867"},{"key":"1862_CR16","unstructured":"W. Yang, R.F. Schaefer, H.V. Poor, Wiretap channels: nonasymptotic fundamental limits. arxiv.org\/pdf\/1706.03866v1"},{"issue":"7","key":"1862_CR17","doi-asserted-by":"publisher","first-page":"4232","DOI":"10.1109\/TIT.2014.2318726","volume":"60","author":"W Yang","year":"2014","unstructured":"W. Yang, G. Durisi, T. Koch, Y. Polyanskiy, Quasi-static multiple-antenna fading channels at finite blocklength. IEEE Trans. Inf. Theory 60(7), 4232\u20134264 (2014)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"8","key":"1862_CR18","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","volume":"54","author":"AD Wyner","year":"1975","unstructured":"A.D. Wyner, The wire-tap channel. Bell Syst. Tech. J. 54(8), 1355\u20131387 (1975)","journal-title":"Bell Syst. Tech. J."},{"key":"1862_CR19","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511977985","volume-title":"Physical-Layer Security. From Information Theory to Security Engineering","author":"M Bloch","year":"2011","unstructured":"M. Bloch, J. Barros, Physical-Layer Security. From Information Theory to Security Engineering (Cambridge University Press, Cambridge, 2011)"},{"issue":"7","key":"1862_CR20","doi-asserted-by":"publisher","first-page":"1458","DOI":"10.1109\/JSAC.2015.2430211","volume":"33","author":"C Liu","year":"2015","unstructured":"C. Liu, N. Yang, J. Yuan, R. Malaney, Location-based secure transmission for wiretap channels. IEEE J. Sel. Areas Commun. 33(7), 1458\u20131470 (2015)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"6","key":"1862_CR21","doi-asserted-by":"publisher","first-page":"2919","DOI":"10.1109\/TWC.2019.2906177","volume":"18","author":"C Liu","year":"2019","unstructured":"C. Liu, J. Lee, T.Q.S. Quek, Safeguarding UAV communications against full-duplex active eavesdropper. IEEE Trans. Wirel. Commun. 18(6), 2919\u20132931 (2019)","journal-title":"IEEE Trans. Wirel. Commun."}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-020-01862-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13638-020-01862-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-020-01862-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,17]],"date-time":"2021-02-17T14:10:52Z","timestamp":1613571052000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-020-01862-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,15]]},"references-count":21,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["1862"],"URL":"https:\/\/doi.org\/10.1186\/s13638-020-01862-7","relation":{},"ISSN":["1687-1499"],"issn-type":[{"type":"electronic","value":"1687-1499"}],"subject":[],"published":{"date-parts":[[2021,2,15]]},"assertion":[{"value":"2 September 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 November 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 February 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"29"}}