Artificial-noise strategy for single-antenna systems over multi-path fading channels

Author(s):  
Yuli Yang ◽  
Bingli Jiao
2019 ◽  
Author(s):  
Mounia Bouabdellah ◽  
Faissal El Bouanani ◽  
Mohamed-Slim Alouini

p.p1 {margin: 0.0px 0.0px 0.0px 0.0px; font: 9.0px Helvetica} span.s1 {font: 7.5px Helvetica} <p>xAbstract—In this paper, the physical layer security of a dualhop</p> <p>underlay uplink cognitive radio network is investigated over</p> <p>Nakagami-m fading channels. Specifically, multiple secondary</p> <p>sources are taking turns in accessing the licensed</p> <p>spectrum of the primary users and communicating with a multiantenna</p> <p>secondary base station (D) through the aid of a multiantenna</p> <p>relay R in the presence of M eavesdroppers </p> <p>that are also equipped with multiple antennas. Among the</p> <p>remaining nodes, one jammer is randomly selected to transmit</p> <p>an artificial noise to disrupt all the eavesdroppers that are</p> <p>attempting to intercept the communication of the legitimate links</p> <p>i.e., Si -R and R-D. The received signals at each node are combined</p> <p>using maximum-ratio combining. Secrecy analysis is provided by</p> <p>deriving closed-form and asymptotic expressions for the secrecy</p> <p>outage probability. The impact of several key parameters on the</p> <p>system’s secrecy e.g., transmit power of the sources, number of</p> <p>eavesdroppers, maximum tolerated interference power, and the</p> <p>number of diversity branches is investigated. Importantly, by</p> <p>considering two scenarios, namely (i) absence and (ii) presence</p> <p>of a friendly jammer, new insights are obtained for the considered</p> <p>communication system. Especially, we tend to answer to the</p> <p>following question: Can better secrecy be achieved without</p> <p>jamming by considering a single antenna at eavesdroppers</p> <p>and multiple-ones at the legitimate users (i.e., relay and enduser)</p> <p>rather than sending permanently an artificial noise and</p> <p>considering that both the relay and the destination are equipped</p> <p>with a single antenna, while multiple antennas are used by the</p> <p>eavesdroppers? The obtained results are corroborated through</p> <p>Monte Carlo simulation and show that the system’s security can</p> <p>be enhanced by adjusting the aforementioned parameters.</p>


2017 ◽  
Vol 66 (10) ◽  
pp. 9577-9581 ◽  
Author(s):  
Biao He ◽  
Yechao She ◽  
Vincent K. N. Lau

2019 ◽  
Author(s):  
Mounia Bouabdellah ◽  
Faissal El Bouanani ◽  
Mohamed-Slim Alouini

p.p1 {margin: 0.0px 0.0px 0.0px 0.0px; font: 9.0px Helvetica} span.s1 {font: 7.5px Helvetica} <p>xAbstract—In this paper, the physical layer security of a dualhop</p> <p>underlay uplink cognitive radio network is investigated over</p> <p>Nakagami-m fading channels. Specifically, multiple secondary</p> <p>sources are taking turns in accessing the licensed</p> <p>spectrum of the primary users and communicating with a multiantenna</p> <p>secondary base station (D) through the aid of a multiantenna</p> <p>relay R in the presence of M eavesdroppers </p> <p>that are also equipped with multiple antennas. Among the</p> <p>remaining nodes, one jammer is randomly selected to transmit</p> <p>an artificial noise to disrupt all the eavesdroppers that are</p> <p>attempting to intercept the communication of the legitimate links</p> <p>i.e., Si -R and R-D. The received signals at each node are combined</p> <p>using maximum-ratio combining. Secrecy analysis is provided by</p> <p>deriving closed-form and asymptotic expressions for the secrecy</p> <p>outage probability. The impact of several key parameters on the</p> <p>system’s secrecy e.g., transmit power of the sources, number of</p> <p>eavesdroppers, maximum tolerated interference power, and the</p> <p>number of diversity branches is investigated. Importantly, by</p> <p>considering two scenarios, namely (i) absence and (ii) presence</p> <p>of a friendly jammer, new insights are obtained for the considered</p> <p>communication system. Especially, we tend to answer to the</p> <p>following question: Can better secrecy be achieved without</p> <p>jamming by considering a single antenna at eavesdroppers</p> <p>and multiple-ones at the legitimate users (i.e., relay and enduser)</p> <p>rather than sending permanently an artificial noise and</p> <p>considering that both the relay and the destination are equipped</p> <p>with a single antenna, while multiple antennas are used by the</p> <p>eavesdroppers? The obtained results are corroborated through</p> <p>Monte Carlo simulation and show that the system’s security can</p> <p>be enhanced by adjusting the aforementioned parameters.</p>


Frequenz ◽  
2015 ◽  
Vol 69 (7-8) ◽  
Author(s):  
Yajun Zhang ◽  
Tao Liang ◽  
Aiwei Sun

AbstractIn this paper, we propose a hybrid scheme called transmit antenna selection and receiver’s artificial noise (TAS–rAN) for security enhancement in multiple-input single-output (MISO) wiretap channels. In this scheme, by using TAS protocol, the transmitter selects a single antenna that maximizes the instantaneous signal-to-noise ratio (SNR) at the full-duplex receiver. While the transmitter uses this antenna to transmit secrecy data, the full-duplex receiver would send artificial noise (AN) to confuse the potential eavesdropper. For the proposed protocol, we consider Rayleigh fading channels with different parameters for the main channel and the eavesdropper’s channel, and derive new closed-form expressions for the exact secrecy outage probability and the asymptotic secrecy outage probability. We demonstrate that the proposed TAS–


Author(s):  
Jianhua He ◽  
Guangheng Zhao ◽  
Lu Wang ◽  
Xue Sun ◽  
Lei Yang

AbstractIn this paper, we investigate the secrecy performance of short-packet transmissions in ultra-reliable and low-latency communications (URLLC). We consider the scenario where a multi-antenna source communicates with a single-antenna legitimate receiver requiring ultra-high reliability and low latency, in the presence of a single-antenna eavesdropper. In order to safeguard URLLC, the source transmits the artificial noise (AN) signal together with the confidential signal to confuse the eavesdropper. We adopt a lower bound on the maximal secrecy rate as the secrecy performance metric for short-packet transmissions in URLLC, which takes the target decoding error probabilities at the legitimate receiver and the eavesdropper into account. Using this metric, we first derive a compact expression of the generalized secrecy outage probability (SOP). Then, we formally prove that the generalized SOP is a convex function with respect to the power allocation factor between the confidential signal and the AN signal. We further determine the optimal power allocation factor that minimizes the generalized SOP. The results presented in this work can be useful for designing new secure transmission schemes for URLLC.


2014 ◽  
Vol 519-520 ◽  
pp. 929-933 ◽  
Author(s):  
Zhe Ji ◽  
You Zheng Wang ◽  
Jian Hua Lu

In this paper, we study the effective capacity (EC) which was proposed to measure the quality of service (QoS) for fading channels. A unified expression for the effective capacity based on the method of moment generating function (MGF) is proposed. The unified expression applies to various fading channels and is derived for both single antenna and multiple antenna diversity system. The mathematical expression is illustrated with Nakagami-m fading channels and closed form expressions are derived in this case. The simulation results verify the consistence of the closed-form expressions with numerical evaluations.


2018 ◽  
Vol 2018 ◽  
pp. 1-13 ◽  
Author(s):  
Weili Ge ◽  
Zhengyu Zhu ◽  
Zhongyong Wang ◽  
Zhengdao Yuan

We investigate multiple-input single-output secured cognitive radio networks relying on simultaneous wireless information and power transfer (SWIPT), where a multiantenna secondary transmitter sends confidential information to multiple single-antenna secondary users (SUs) in the presence of multiple single-antenna primary users (PUs) and multiple energy-harvesting receivers (ERs). In order to improve the security of secondary networks, we use the artificial noise (AN) to mask the transmit beamforming. Optimization design of AN-aided transmit beamforming is studied, where the transmit power of the information signal is minimized subject to the secrecy rate constraint, the harvested energy constraint, and the total transmit power. Based on a successive convex approximation (SCA) method, we propose an iterative algorithm which reformulates the original problem as a convex problem under the perfect channel state information (CSI) case. Also, we give the convergence of the SCA-based iterative algorithm. In addition, we extend the original problem to the imperfect CSI case with deterministic channel uncertainties. Then, we study the robust design problem for the case with norm-bounded channel errors. Also, a robust SCA-based iterative algorithm is proposed by adopting the S-Procedure. Simulation results are presented to validate the performance of the proposed algorithms.


Sign in / Sign up

Export Citation Format

Share Document