A nonadaptive transmission scheme in slow fading wiretap channels with adjustable transmit power under secrecy outage constraint

Author(s):  
Zongze Li ◽  
Pengcheng Mu ◽  
Bo Wang ◽  
Hui-Ming Wang ◽  
Weile Zhang ◽  
...  
2020 ◽  
Vol 2020 ◽  
pp. 1-14 ◽  
Author(s):  
Xujun Shen ◽  
Qingchun Chen ◽  
Yulong Nie ◽  
Keming Gan

The MIMO transmission against a smart attacker has recently been formulated as a noncollaborative game, in which both the MIMO transmitter and the malicious attacker try to maximize their predefined utilities. In this paper, by carefully analyzing the Nash Equilibrium (NE), we focus on the conditions, in which the gaming results incline to the malicious attacker instead of the MIMO transmitter. In this adverse case, it is highly desirable to develop an effective mechanism to suppress the attack intention by the attacker for better secure communication. Motivated by this, an adaptive secure MIMO transmission scheme was proposed to make the MIMO transmitter better resist malicious attackers in adverse channel conditions. Compared with the existing gaming-based strategy, not only the transmit power of the MIMO transmitter but also the transmission probability will be adjusted in the proposed adaptive secure transmission scheme. Our analysis results show that the proposed scheme can be regarded as a generalized adaptive transmission one, i.e., when the adaptive transmit power policy is enough to suppress the attack motivation, the proposed scheme will be reduced to the adaptive power control scheme; otherwise, both the adaptive transmit power and the adaptive probabilistic transmission can be employed to suppress the attack motivation. The analysis results confirm us that the proposed adaptive transmission scheme provides us a choice to enhance the secure MIMO transmission performance in adverse conditions.


Sensors ◽  
2019 ◽  
Vol 19 (5) ◽  
pp. 1160 ◽  
Author(s):  
Phu Tin ◽  
Pham Minh Nam ◽  
Tran Trung Duy ◽  
Phuong Tran ◽  
Miroslav Voznak

In this paper, we evaluate the secrecy performance of multi-hop cognitive wireless sensor networks (WSNs). In the secondary network, a source transmits its data to a destination via the multi-hop relaying model using the transmit antenna selection (TAS)/selection combining (SC) technique at each hop, in the presence of an eavesdropper who wants to receive the data illegally. The secondary transmitters, including the source and intermediate relays, have to harvest energy from radio-frequency signals of a power beacon for transmitting the source data. Moreover, their transmit power must be adjusted to satisfy the quality of service (QoS) of the primary network. Under the joint impact of hardware imperfection and interference constraint, expressions for the transmit power for the secondary transmitters are derived. We also derive exact and asymptotic expressions of secrecy outage probability (SOP) and probability of non-zero secrecy capacity (PNSC) for the proposed protocol over Rayleigh fading channel. The derivations are then verified by Monte Carlo simulations.


2015 ◽  
Author(s):  
Daniel Costa ◽  
Nuwan Ferdinand ◽  
Ugo Dias ◽  
R Jr. ◽  
Matti Latva-aho

2017 ◽  
Vol 28 (11) ◽  
pp. e3191 ◽  
Author(s):  
Yosbel R. Ortega ◽  
Prabhat K. Upadhyay ◽  
Daniel Benevides da Costa ◽  
Petros S. Bithas ◽  
Athanasios G. Kanatas ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document