Secrecy Capacity of Diffusive Molecular Communication Under Different Deployments

S. Pratap Singh, Suman Yadav, Rajneesh Kumar Singh, Vineet Kansal, Ghanshyam Singh

Research output: Contribution to journalArticlepeer-review

7 Citations (Scopus)


Currently, the physical layer security is considered as one of the most suitable security techniques in Diffusive Molecular Communication (DMC) because of ease to implement. A recent piece of literature has presented the Secrecy Capacity (SC) of DMC system under the rectangular deployment. To evaluate the information capacity (IC) and thereby SC using the Concentration Greens Function (CGF) in the molecular communication depends on the biological structures of tissues. In this paper, we have investigated the analytical expressions of IC under both the Biological Cylindrical Deployment (BCD) and Biological Spherical Deployment (BSD). Therefore, the analytical expressions of IC have been employed to derive the mathematical expressions of SC under the BCD and BSD environment. Further, the SC is analyzed as a function of distance/radius considering the power and/or bandwidth as the parameter. In addition, the effect of distance of authentic receiver on SC is also explored. It is observed that irrespective of the deployments, the distance of the authentic receiver illustrates predominant effect on the value of SC. The proposed analysis is useful in the implementation of DMC under different tissues structures. The numerically simulated results show close agreement with the theoretical background.

Original languageEnglish
Pages (from-to)21670-21683
Number of pages14
JournalIEEE Access
Publication statusPublished - 2022


  • Secrecy capacity
  • biological cylindrical deployment
  • biological spherical deployment
  • concentration greens function
  • molecular communication

ASJC Scopus subject areas

  • General Computer Science
  • General Materials Science
  • General Engineering


Dive into the research topics of 'Secrecy Capacity of Diffusive Molecular Communication Under Different Deployments'. Together they form a unique fingerprint.

Cite this