Abstract
As wireless systems move toward 6G, ensuring ultra-reliable low-latency communication (URLLC) securely is a key design challenge. Addressing the strict latency and reliability demands requires a shift in performance evaluation. The delay-outage rate (DOR) has recently emerged as a data-oriented metric that captures the probability of transmission time exceeding a threshold under ideal conditions. This work extends the data-oriented framework to include physical layer security, focusing on jamming and eavesdropping threats. We analyze how constant and random jamming affect DOR in the multi-antenna systems, highlighting the role of spatial and spectral resources in mitigation. Our analysis, supported by empirical simulations, offers new insights for designing secure, low-latency systems resilient to jamming - supporting robust ultra- or hyper-reliable low-latency communications in future 6G networks.
| Original language | English |
|---|---|
| Title of host publication | 2025 IEEE 36th International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2025 |
| Publisher | Institute of Electrical and Electronics Engineers Inc. |
| ISBN (Electronic) | 9798350363234 |
| DOIs | |
| Publication status | Published - 2025 |
| Event | 36th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2025 - Istanbul, Turkey Duration: 1 Sept 2025 → 4 Sept 2025 |
Publication series
| Name | IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC |
|---|---|
| ISSN (Print) | 2166-9570 |
| ISSN (Electronic) | 2166-9589 |
Conference
| Conference | 36th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2025 |
|---|---|
| Country/Territory | Turkey |
| City | Istanbul |
| Period | 1/09/25 → 4/09/25 |
Bibliographical note
Publisher Copyright:© 2025 IEEE.
Keywords
- data-oriented transmission
- Delay-outage rate
- HRLLC
- jamming
- URLLC
Fingerprint
Dive into the research topics of 'Data-Oriented Transmission Under Jamming Attack'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver