A new scheme to improve the secrecy throughput under the constraints of secrecy outage probability and average transmit power

Author(s):  
Pengcheng Mu ◽  
Peizhi Yang ◽  
Bo Wang ◽  
Hui-Ming Wang ◽  
Qinye Yin
2019 ◽  
Vol 2019 ◽  
pp. 1-13 ◽  
Author(s):  
Khuong Ho-Van ◽  
Thiem Do-Dac

This paper exploits a self-powered secondary relay to not only maintain but also secure communications between a secondary source and a secondary destination in cognitive radio networks when source-destination channel is unavailable. The relay scavenges energy from radio frequency (RF) signals of the primary transmitter and the secondary source and consumes the scavenged energy for its relaying activity. Under the maximum transmit power constraint, Rayleigh fading, the primary outage constraint, and the interference from the primary transmitter, this paper suggests an accurate closed-form expression of the secrecy outage probability to promptly assess the security performance of relaying communications in energy scavenging cognitive networks. The validity of the proposed expression is verified by computer simulations. Numerous results demonstrate the security performance saturation in the range of large maximum transmit power or high required outage probability of primary users. Moreover, the security performance is a function of several system parameters among which the relay’s position, the power splitting factor, and the time splitting factor can be optimized to achieve the minimum secrecy outage probability.


2021 ◽  
Author(s):  
Shu Xu ◽  
Chen Liu ◽  
Hong Wang ◽  
Mujun Qian ◽  
Wenfeng Sun

Abstract Secure transmission is essential for future non-orthogonal multiple access (NOMA) system. This paper investigates relay-antenna selection (RAS) to enhance physical-layer security (PLS) of cooperative NOMA system in the presence of an eavesdropper, where multiple antennas are deployed at the relays, the users, and the eavesdropper. In order to reduce expense on radio frequency (RF) chains, selection combining (SC) is employed at both the relays and the users, whilst the eavesdropper employs either maximal-ratio combining (MRC) or selection combining (SC) to process the received signals. Under the condition that the channel state information (CSI) of the eavesdropping channel is available or unavailable, two e↵ective relay-antenna selection schemes are proposed. Additionally, the closed-form expressions of secrecy outage probability (SOP) are derived for the proposed relay-antenna selection schemes. In order to gain more deep insights on the derived results, the asymptotic performance of the derived SOP is analyzed. In simulations, it is demonstrated that the theoretical results match well with the simulation results and the SOP of the proposed schemes is less than that of the conventional orthogonal multiple access (OMA) scheme obviously.


IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 79637-79649
Author(s):  
Tung Pham Huu ◽  
Tam Ninh Thi-Thanh ◽  
Chi Nguyen-Yen ◽  
Hung Tran ◽  
Viet Nguyen Dinh ◽  
...  

Sensors ◽  
2019 ◽  
Vol 19 (5) ◽  
pp. 1160 ◽  
Author(s):  
Phu Tin ◽  
Pham Minh Nam ◽  
Tran Trung Duy ◽  
Phuong Tran ◽  
Miroslav Voznak

In this paper, we evaluate the secrecy performance of multi-hop cognitive wireless sensor networks (WSNs). In the secondary network, a source transmits its data to a destination via the multi-hop relaying model using the transmit antenna selection (TAS)/selection combining (SC) technique at each hop, in the presence of an eavesdropper who wants to receive the data illegally. The secondary transmitters, including the source and intermediate relays, have to harvest energy from radio-frequency signals of a power beacon for transmitting the source data. Moreover, their transmit power must be adjusted to satisfy the quality of service (QoS) of the primary network. Under the joint impact of hardware imperfection and interference constraint, expressions for the transmit power for the secondary transmitters are derived. We also derive exact and asymptotic expressions of secrecy outage probability (SOP) and probability of non-zero secrecy capacity (PNSC) for the proposed protocol over Rayleigh fading channel. The derivations are then verified by Monte Carlo simulations.


Sign in / Sign up

Export Citation Format

Share Document