scholarly journals Secrecy Performance of TAS/SC-Based Multi-Hop Harvest-to-Transmit Cognitive WSNs Under Joint Constraint of Interference and Hardware Imperfection

Sensors ◽  
2019 ◽  
Vol 19 (5) ◽  
pp. 1160 ◽  
Author(s):  
Phu Tin ◽  
Pham Minh Nam ◽  
Tran Trung Duy ◽  
Phuong Tran ◽  
Miroslav Voznak

In this paper, we evaluate the secrecy performance of multi-hop cognitive wireless sensor networks (WSNs). In the secondary network, a source transmits its data to a destination via the multi-hop relaying model using the transmit antenna selection (TAS)/selection combining (SC) technique at each hop, in the presence of an eavesdropper who wants to receive the data illegally. The secondary transmitters, including the source and intermediate relays, have to harvest energy from radio-frequency signals of a power beacon for transmitting the source data. Moreover, their transmit power must be adjusted to satisfy the quality of service (QoS) of the primary network. Under the joint impact of hardware imperfection and interference constraint, expressions for the transmit power for the secondary transmitters are derived. We also derive exact and asymptotic expressions of secrecy outage probability (SOP) and probability of non-zero secrecy capacity (PNSC) for the proposed protocol over Rayleigh fading channel. The derivations are then verified by Monte Carlo simulations.

2021 ◽  
Author(s):  
Shu Xu ◽  
Chen Liu ◽  
Hong Wang ◽  
Mujun Qian ◽  
Wenfeng Sun

Abstract Secure transmission is essential for future non-orthogonal multiple access (NOMA) system. This paper investigates relay-antenna selection (RAS) to enhance physical-layer security (PLS) of cooperative NOMA system in the presence of an eavesdropper, where multiple antennas are deployed at the relays, the users, and the eavesdropper. In order to reduce expense on radio frequency (RF) chains, selection combining (SC) is employed at both the relays and the users, whilst the eavesdropper employs either maximal-ratio combining (MRC) or selection combining (SC) to process the received signals. Under the condition that the channel state information (CSI) of the eavesdropping channel is available or unavailable, two e↵ective relay-antenna selection schemes are proposed. Additionally, the closed-form expressions of secrecy outage probability (SOP) are derived for the proposed relay-antenna selection schemes. In order to gain more deep insights on the derived results, the asymptotic performance of the derived SOP is analyzed. In simulations, it is demonstrated that the theoretical results match well with the simulation results and the SOP of the proposed schemes is less than that of the conventional orthogonal multiple access (OMA) scheme obviously.


Frequenz ◽  
2015 ◽  
Vol 69 (7-8) ◽  
Author(s):  
Yajun Zhang ◽  
Tao Liang ◽  
Aiwei Sun

AbstractIn this paper, we propose a hybrid scheme called transmit antenna selection and receiver’s artificial noise (TAS–rAN) for security enhancement in multiple-input single-output (MISO) wiretap channels. In this scheme, by using TAS protocol, the transmitter selects a single antenna that maximizes the instantaneous signal-to-noise ratio (SNR) at the full-duplex receiver. While the transmitter uses this antenna to transmit secrecy data, the full-duplex receiver would send artificial noise (AN) to confuse the potential eavesdropper. For the proposed protocol, we consider Rayleigh fading channels with different parameters for the main channel and the eavesdropper’s channel, and derive new closed-form expressions for the exact secrecy outage probability and the asymptotic secrecy outage probability. We demonstrate that the proposed TAS–


2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Tran Trung Duy ◽  
Pham Thi Dan Ngoc ◽  
Phuong T. Tran

In this paper, we propose and evaluate performance of multihop multipath underlay cognitive radio networks. In a primary network, an uplink nonorthogonal multiple access method is employed to allow primary transmitters to simultaneously transmit their data to a primary receiver. Using an underlay spectrum-sharing method, secondary source and secondary relays must adjust their transmit power to guarantee quality of service of the primary network. Under the limited transmit power, cochannel interference from the primary transmitters, and hardware noises caused by impairments, we propose best-path selection methods to improve the end-to-end performance for the secondary network. Moreover, both multihop decode-and-forward and amplify-and-forward relaying protocols are considered in this paper. We derive expressions of outage probability for the primary and secondary networks and propose an efficient method to calculate the transmit power of the secondary transmitters. Then, computer simulations employing the Monte-Carlo approach are realized to validate the derivations.


2018 ◽  
Vol 2018 ◽  
pp. 1-11 ◽  
Author(s):  
Dan Deng ◽  
Chao Li ◽  
Lisheng Fan ◽  
Xin Liu ◽  
Fasheng Zhou

This paper studies the impacts of antenna selection algorithms in decode-and-forward (DF) cooperative nonorthogonal multiple access (NOMA) networks, where the secure information from the relay can be overheard by an eavesdropper in the networks. In order to ensure the secure transmission, an optimal antenna selection algorithm is proposed to choose one best relay’s antenna to assist the secure transmission. We study the impact of antenna selection on the system secure communication through deriving the analytical expression of the secrecy outage probability along with the asymptotic expression in the high regime of signal-to-noise ratio (SNR) and main-to-eavesdropper ratio (MER). From the analytical and asymptotic expressions, we find that the system secure performance is highly dependent on the system parameters such as the number of antennas at the relay, SNR, and MER. In particular, the secrecy diversity order of the system is equal to the antenna number, when the interference from the second user is limited.


2020 ◽  
Vol 69 (7) ◽  
pp. 7473-7482
Author(s):  
Peishun Yan ◽  
Jie Yang ◽  
Miao Liu ◽  
Jinlong Sun ◽  
Guan Gui

2019 ◽  
Vol 9 (21) ◽  
pp. 4506
Author(s):  
Chen Wei ◽  
Wendong Yang ◽  
Yueming Cai

This paper investigates the secure transmission for buffer-aided relay networks in the Internet of Things (IoT) in the presence of multiple passive eavesdroppers. For security enhancement, we adopt the max-link relay selection policy and propose three secure transmission schemes: (1) non-jamming (NJ); (2) source cooperative jamming (SCJ); and (3) source cooperative jamming with optimal power allocation (SCJ-OPA). Moreover, to analyze the secrecy performance comprehensively, two eavesdropping scenarios, i.e., non-colluding eavesdroppers (NCE) and colluding eavesdroppers (CE) are considered. Based on this, by modeling the dynamic buffer state transition as a Markov chain, we derive the exact closed-form expressions of the secrecy outage probability, the average secrecy throughput, and the end-to-end delay for each schemes. The analytical analysis and simulation shows that the SCJ-OPA scheme achieves similar performance as the NJ scheme when the total transmit power is small. On the other hand, when the transmit power is high, the performance achieved by SCJ-OPA is similar to that of SCJ. Thereby, the SCJ-OPA scheme can achieve better performance across the entire total transmit power, which makes up the defects of NJ and SCJ exactly.


Sign in / Sign up

Export Citation Format

Share Document