scholarly journals A Mixed FSO/RF Integrated Satellite-High Altitude Platform Relaying Networks for Multiple Terrestrial Users with Presence of Eavesdropper: A Secrecy Performance

Photonics ◽  
2022 ◽  
Vol 9 (1) ◽  
pp. 32
Author(s):  
Kehinde O. Odeyemi ◽  
Pius A. Owolawi

In this paper, the secrecy performance of a mixed free space optical (FSO)/radio frequency (RF) integrated satellite-high altitude platform (HAP) relaying networks for terrestrial multiusers with the existence of an eavesdropper is investigated. In this network, FSO is adopted to establish the link between the satellite and HAP for which it experiences Gamma-Gamma distributions under different detection schemes (i.e., heterodyne and intensity modulation direct detection). The transmission between the amplify-and-forward (AF) relaying HAP and terrestrial multiusers is through the RF and is modeled as shadowed-Rician fading distribution. Owning to broadcasting nature of RF link, it is assumed that an eavesdropper attempts to intercept the users’ confidential message, and the eavesdropper link is subjected to Rician distributions. Specifically, the closed-form expression for the system equivalent end-to-end cumulative distribution function is derived by exploiting the Meijer’s G and Fox’s H functions. Based on this expression, the exact closed-form expressions of the system connection outage probability, secrecy outage probability, and strictly positive secrecy capacity are obtained under the different detection schemes at HAP. Moreover, the asymptotic analyze of the system secrecy outage probability is provided to obtain more physical insights. Furthermore, the accuracy of all the derived analytical closed-form expressions is verified through the Monte-Carlo simulations. In addition, the impact of atmospheric turbulence, pointing errors, shadowing severity parameters, and Rician factor are thoroughly evaluated. Under the same system conditions, the results depict that heterodyne detection outperforms the intensity modulation direct detection.

2018 ◽  
Vol 2018 ◽  
pp. 1-12 ◽  
Author(s):  
Kyusung Shim ◽  
Beongku An

In this paper, we address the opportunistic scheduling in multitwo user NOMA system consisting of one base station, multinear user, multifar user, and one eavesdropper. To improve the secrecy performance, we propose the users selection scheme, called best-secure-near-user best-secure-far-user (BSNBSF) scheme. The BSNBSF scheme aims to select the best near-far user pair, whose data transmission is the most robust against the overhearing of an eavesdropper. In order to facilitate the performance analysis of the BSNBSF scheme in terms of secrecy outage performance, we derive the exact closed-form expression for secrecy outage probability (SOP) of the selected near user and the tight approximated closed-form expression for SOP of the selected far user, respectively. Additionally, we propose the descent-based search method to find the optimal values of the power allocation coefficients that can minimize the total secrecy outage probability (TSOP). The developed analyses are corroborated through Monte Carlo simulation. Comparisons with the random-near-user random-far-user (RNRF) scheme are performed and show that the proposed scheme significantly improves the secrecy performance.


Author(s):  
Phu Tran Tin ◽  
Duy-Hung Ha ◽  
Minh Tran ◽  
Tran Thanh Trang

In this paper, we have investigated the Half-Duplex (HD) Energy Harvesting (EH) Cooperative Relaying Networks with one source node, one destination node, one intermediate relay and in the presence of the Jammer Against Eavesdropper. We have analyzed the system performance in terms of the integral form expression of secrecy outage probability. In addition, we have investigated the effect of source rate, time switching factor, energy coefficient, and the ratio Ps/N0 on the system performance. Finally, all the mathematical, analytical expressions are verified by Monte Carlo simulation, and the analytical results match well with the simulation ones to convince the correctness of the analytical expression.


2021 ◽  
Vol 2021 ◽  
pp. 1-18
Author(s):  
Jinglan Ou ◽  
Hangchuan Shi ◽  
Liubin Wang ◽  
Rui Ma ◽  
Haowei Wu

Simultaneous wireless information and power transfer (SWIPT) is a major breakthrough in the field of low-power wireless information transmissions. In this paper, the secrecy performance of the SWIPT-enabled relay network with full-duplex destination-aided jamming is assessed, where both the power-splitting (PS) and time-switching (TS) schemes at the relay are considered with the linear and nonlinear energy harvesting models. The relay harvests energy from the confidential signal and artificial noise sent by the source and destination, respectively, and forwards the amplified signal to the destination, in the presence of an eavesdropper. The analytical closed-form expressions of the connection outage probability (COP), secrecy outage probability (SOP), and transmission outage probability (TOP) for PS- and TS-based schemes are derived, and the closed-form expression of the lower bound of ergodic secrecy capacity (ESC) is calculated. The asymptotic-form expressions of the COP, SOP, TOP, and ESC are further analyzed to capture the valuable information in the high SNR regime. Numerical results verify the correctness of analytical results, reveal the effects of the PS/TS ratio, and transmit the signal-to-noise ratio on secrecy performance.


2021 ◽  
Author(s):  
Shu Xu ◽  
Chen Liu ◽  
Hong Wang ◽  
Mujun Qian ◽  
Wenfeng Sun

Abstract Secure transmission is essential for future non-orthogonal multiple access (NOMA) system. This paper investigates relay-antenna selection (RAS) to enhance physical-layer security (PLS) of cooperative NOMA system in the presence of an eavesdropper, where multiple antennas are deployed at the relays, the users, and the eavesdropper. In order to reduce expense on radio frequency (RF) chains, selection combining (SC) is employed at both the relays and the users, whilst the eavesdropper employs either maximal-ratio combining (MRC) or selection combining (SC) to process the received signals. Under the condition that the channel state information (CSI) of the eavesdropping channel is available or unavailable, two e↵ective relay-antenna selection schemes are proposed. Additionally, the closed-form expressions of secrecy outage probability (SOP) are derived for the proposed relay-antenna selection schemes. In order to gain more deep insights on the derived results, the asymptotic performance of the derived SOP is analyzed. In simulations, it is demonstrated that the theoretical results match well with the simulation results and the SOP of the proposed schemes is less than that of the conventional orthogonal multiple access (OMA) scheme obviously.


Sign in / Sign up

Export Citation Format

Share Document