Data-Oriented Transmission Under Jamming Attack

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

As wireless systems move toward 6G, ensuring ultra-reliable low-latency communication (URLLC) securely is a key design challenge. Addressing the strict latency and reliability demands requires a shift in performance evaluation. The delay-outage rate (DOR) has recently emerged as a data-oriented metric that captures the probability of transmission time exceeding a threshold under ideal conditions. This work extends the data-oriented framework to include physical layer security, focusing on jamming and eavesdropping threats. We analyze how constant and random jamming affect DOR in the multi-antenna systems, highlighting the role of spatial and spectral resources in mitigation. Our analysis, supported by empirical simulations, offers new insights for designing secure, low-latency systems resilient to jamming - supporting robust ultra- or hyper-reliable low-latency communications in future 6G networks.

Original languageEnglish
Title of host publication2025 IEEE 36th International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2025
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9798350363234
DOIs
Publication statusPublished - 2025
Event36th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2025 - Istanbul, Turkey
Duration: 1 Sept 20254 Sept 2025

Publication series

NameIEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC
ISSN (Print)2166-9570
ISSN (Electronic)2166-9589

Conference

Conference36th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2025
Country/TerritoryTurkey
CityIstanbul
Period1/09/254/09/25

Bibliographical note

Publisher Copyright:
© 2025 IEEE.

Keywords

  • data-oriented transmission
  • Delay-outage rate
  • HRLLC
  • jamming
  • URLLC

Fingerprint

Dive into the research topics of 'Data-Oriented Transmission Under Jamming Attack'. Together they form a unique fingerprint.

Cite this