scholarly journals Physical layer security in DF full-duplex relaying network: performance analysis

Author(s):  
Phu Tran Tin ◽  
Tan N. Nguyen ◽  
Van-Duc Phan ◽  
Minh Tran

In this letter, the system performance of the DF full-duplex (FD) Relaying communication network is investigated with Physical Layer Security (PLS). In this system model, the source (S) and the destination (D) communicate via a helping relay (R) in the presence of the Eavesdropper (E). From the system model, we derive the closed-form expressions for Intercept Probability (IP) and secrecy outage probability (SOP). For verifying the correctness of the analytical analysis, the Monte Carlo simulation is conducted. In addition, the influence of the main system parameter on the system performance is investigated. Finally, the results show that the analytical and the simulation values agree well with each other.

2021 ◽  
Vol 13 (8) ◽  
pp. 205
Author(s):  
Deemah Tashman ◽  
Walaa Hamouda

In this paper, the physical-layer security for a three-node wiretap system model is studied. Under the threat of multiple eavesdroppers, it is presumed that a transmitter is communicating with a legitimate receiver. The channels are assumed to be following cascaded κ-μ fading distributions. In addition, two scenarios for eavesdroppers’ interception and information-processing capabilities are investigated: colluding and non-colluding eavesdroppers. The positions of these eavesdroppers are assumed to be random in the non-colluding eavesdropping scenario, based on a homogeneous Poisson point process (HPPP). The security is examined in terms of the secrecy outage probability, the probability of non-zero secrecy capacity, and the intercept probability. The exact and asymptotic expressions for the secrecy outage probability and the probability of non-zero secrecy capacity are derived. The results demonstrate the effect of the cascade level on security. Additionally, the results indicate that as the number of eavesdroppers rises, the privacy of signals exchanged between legitimate ends deteriorates. Furthermore, in this paper, regarding the capabilities of tapping and processing the information, we provide a comparison between colluding and non-colluding eavesdropping.


Sensors ◽  
2021 ◽  
Vol 21 (17) ◽  
pp. 5692
Author(s):  
Van-Duc Phan ◽  
Tan N. Nguyen ◽  
Anh Vu Le ◽  
Miroslav Voznak

In this paper, we study the physical layer security for simultaneous wireless information and power transfer (SWIPT)-based half-duplex (HD) decode-and-forward relaying system. We consider a system model including one transmitter that tries to transmit information to one receiver under the help of multiple relay users and in the presence of one eavesdropper that attempts to overhear the confidential information. More specifically, to investigate the secrecy performance, we derive closed-form expressions of outage probability (OP) and secrecy outage probability for dynamic power splitting-based relaying (DPSBR) and static power splitting-based relaying (SPSBR) schemes. Moreover, the lower bound of secrecy outage probability is obtained when the source’s transmit power goes to infinity. The Monte Carlo simulations are given to corroborate the correctness of our mathematical analysis. It is observed from simulation results that the proposed DPSBR scheme outperforms the SPSBR-based schemes in terms of OP and SOP under the impact of different parameters on system performance.


2020 ◽  
Vol 16 (6) ◽  
pp. 155014772093346
Author(s):  
Xin Fan ◽  
Yan Huo

As Internet of Things (IoT) has boomed in recent years, many security issues have also been exposed. Focusing on physical layer security in wireless Internet of Things network communication, a series of security methods have been widely studied. Nevertheless, cooperative jamming methods in physical layer security to fight against collusive eavesdroppers have not been thoroughly studied yet. In this article, we study a cooperative-jamming-based physical layer secure transmission scheme for Internet of Things wireless networks in the presence of collusive eavesdroppers. We design a cooperative jamming strategy without knowing the channel state information of eavesdroppers. Considering the cooperation of multiple nodes with multiple antennas, this strategy can maximize the signal-to-interference-plus-noise ratio at an actuator (legitimate receiver). Meanwhile, the generated cooperative jamming signals can reduce the signal-to-interference-plus-noise ratio at eavesdroppers. To explore the theoretical security performance of our strategy, we perform a secrecy outage probability analysis and an asymptotic analysis. In the cases of cooperative jamming and without cooperative jamming, the closed-form expressions of the secrecy outage probability are deduced, and the influence of system parameters on the secrecy outage probability becomes more intuitive through a strict mathematical asymptotic behavior analysis. In addition, considering the energy limitation of Internet of Things devices, we propose a power allocation algorithm to minimize the total transmission power given the security requirements. The numerical results show the effectiveness of our schemes and are consistent with the theoretical analysis.


2021 ◽  
Author(s):  
Saeid Pakravan ◽  
Ghosheh Abed Hodtani

Abstract In this paper, a discrete memoryless wiretap channel with non-causal side information known at the encoder is considered. We (i) characterize capacity region for the Gaussian version of this channel by considering correlation between channel input and side information available at the transmitter; (ii) analyze the impact of correlation on the performance of physical layer security in a Rayleigh fading wiretap channel by deriving closed-form expressions on the average secrecy capacity (ASC) and secrecy outage probability (SOP). Further, to more show the impact of side information, asymptotic behavior of SOP is studied. Numerical evaluation of theoretical results is done finally.


2018 ◽  
Vol 2018 ◽  
pp. 1-6 ◽  
Author(s):  
Yue Tian ◽  
Xianling Wang ◽  
Zhanwei Wang

The conventional nonorthogonal multiple access (NOMA) strategy has secrecy challenge in coordinated multipoint (CoMP) networks. Under the secrecy considerations, this paper focuses on the security-based NOMA system, which aims to improve the physical layer security issues of conventional NOMA in the coordinated multipoint (NOMA-CoMP) networks. The secrecy performance of S-NOMA in CoMP, that is, the secrecy sum-rate and the secrecy outage probability, is analysed. In contrast to the conventional NOMA (C-NOMA), the results show that the proposed S-NOMA outperforms C-NOMA in terms of the secrecy outage probability and security-based effective sum-rate.


2021 ◽  
Vol 17 (12) ◽  
pp. 155014772110590
Author(s):  
Zhihui Shang ◽  
Tao Zhang ◽  
Liwei Tao ◽  
Zhongwu Xiang ◽  
Weiwei Yang

This article studies the physical layer security in a downlink full-duplex cognitive non-orthogonal multiple access sensor networks (FD-C-NOMA). Compared with the existing works, this article proposes a FD-C-NOMA transmission scheme with a primary user (PU) and secondary user (SU) sensor nodes in the presence of an eavesdropper. The zero-forcing beamforming design problems of FD operation are investigated subject to the practical secrecy rate and the quality of services of PU. To characterize the security reliability trade-off of the FD-C-NOMA scheme, we first derive the closed-form expressions of connection outage probability (COP), the secrecy outage probability (SOP), and effective secrecy throughput (EST) of each SU in the NOMA networks. Then the impacts of the system parameters on the COP, SOP, and EST are investigated to evaluate the security and reliability in the FD-C-NOMA networks. Furthermore, in order to further verify the security and reliability of our considered network, an OMA scheme of FD operation is provided in the simulation for the purpose of comparison. Results demonstrate that the NOMA-based cognitive sensor networks of FD operation outperforms the OMA system in terms of EST. Finally, simulations are performed to validate the accuracy of our analysis results of the proposed scheme.


2018 ◽  
Vol 2018 ◽  
pp. 1-13 ◽  
Author(s):  
Guilherme Oliveira ◽  
Evelio Fernández ◽  
Samuel Mafra ◽  
Samuel Montejo-Sánchez ◽  
César Azurdia-Meza

The next generations of wireless communications are expected to have great demand for security and spectrum efficiency, and the current secrecy solutions may not be enough. In this paper we propose an optimization framework to address the physical layer security in cognitive radio networks when the secondary users employ improper Gaussian signaling. We resort to genetic algorithms to find optimal values of the secondary transmit power and the degree of impropriety, simultaneously. Then, two different problems regarding the system performance are solved: minimizing the secrecy outage probability and maximizing the secondary achievable rate. In both problems we evaluate, besides the secrecy outage probability, the effective secure throughput and the secure energy efficiency of the system as well. The results show that the secondary network using improper signaling outperforms conventional proper signaling in terms of secrecy outage probability and the effective secure throughput, while in terms of the secure energy efficiency, adopting proper signals attains better performance than improper ones.


Electronics ◽  
2020 ◽  
Vol 9 (3) ◽  
pp. 428
Author(s):  
Ngo Hoang An ◽  
Minh Tran ◽  
Tan N. Nguyen ◽  
Duy-Hung Ha

In this paper, the system performance of a hybrid time–power splitting relaying (TPSR) two-way half-duplex (HD) relaying network over a Rayleigh fading channel is investigated in terms of the outage probability (OP) and intercept probability (IP). The proposed model has two sources, A and B, which communicate with each other with the help of an intermediate relay (R) under the presence of an eavesdropper (E). The physical layer security (PLS) was considered in this case. Firstly, we derived the closed-form expressions of the exact and asymptotic IP in two cases, using MRC (maximal ratio combining) and SC (selection combining) techniques. The closed-form expressions of the system OP was then analyzed and derived. All the analytical expressions of the OP and IP of the system model were verified by a Monte Carlo simulation in connection with all the main system parameters. In the research results, the analytical and simulation values were in total agreement, demonstrating the correctness of the system performance analysis.


Sign in / Sign up

Export Citation Format

Share Document