scholarly journals Reliability-Security Analysis for Harvest-to-Jam based Multi-hop Cluster MIMO Networks Using Cooperative Jamming Methods Under Impact of Hardware Impairments

Author(s):  
Ngo Anh ◽  
Nguyen Minh ◽  
Tran Duy ◽  
Tan Hanh ◽  
Hoang Hai
2018 ◽  
Vol 2018 ◽  
pp. 1-10 ◽  
Author(s):  
Hao Guo ◽  
Behrooz Makki ◽  
Tommy Svensson

Initial access (IA) is identified as a key challenge for the upcoming 5G mobile communication system operating at high carrier frequencies, and several techniques are currently being proposed. In this paper, we extend our previously proposed efficient genetic algorithm- (GA-) based beam refinement scheme to include beamforming at both the transmitter and the receiver and compare the performance with alternative approaches in the millimeter wave multiuser multiple-input-multiple-output (MU-MIMO) networks. Taking the millimeter wave communications characteristics and various metrics into account, we investigate the effect of different parameters such as the number of transmit antennas/users/per-user receive antennas, beamforming resolutions, and hardware impairments on the system performance employing different beam refinement algorithms. As shown, our proposed GA-based approach performs well in delay-constrained networks with multiantenna users. Compared to the considered state-of-the-art schemes, our method reaches the highest service outage-constrained end-to-end throughput with considerably less implementation complexity. Moreover, taking the users’ mobility into account, our GA-based approach can remarkably reduce the beam refinement delay at low/moderate speeds when the spatial correlation is taken into account. Finally, we compare the cases of collaborative users and noncollaborative users and evaluate their difference in system performance.


2020 ◽  
Vol 14 (2) ◽  
pp. 1909-1920 ◽  
Author(s):  
Xianyu Zhang ◽  
Daoxing Guo ◽  
Kang An ◽  
Bangning Zhang

2019 ◽  
Author(s):  
Mounia Bouabdellah ◽  
Faissal El Bouanani ◽  
Mohamed-Slim Alouini

p.p1 {margin: 0.0px 0.0px 0.0px 0.0px; font: 9.0px Helvetica} span.s1 {font: 7.5px Helvetica} <p>xAbstract—In this paper, the physical layer security of a dualhop</p> <p>underlay uplink cognitive radio network is investigated over</p> <p>Nakagami-m fading channels. Specifically, multiple secondary</p> <p>sources are taking turns in accessing the licensed</p> <p>spectrum of the primary users and communicating with a multiantenna</p> <p>secondary base station (D) through the aid of a multiantenna</p> <p>relay R in the presence of M eavesdroppers </p> <p>that are also equipped with multiple antennas. Among the</p> <p>remaining nodes, one jammer is randomly selected to transmit</p> <p>an artificial noise to disrupt all the eavesdroppers that are</p> <p>attempting to intercept the communication of the legitimate links</p> <p>i.e., Si -R and R-D. The received signals at each node are combined</p> <p>using maximum-ratio combining. Secrecy analysis is provided by</p> <p>deriving closed-form and asymptotic expressions for the secrecy</p> <p>outage probability. The impact of several key parameters on the</p> <p>system’s secrecy e.g., transmit power of the sources, number of</p> <p>eavesdroppers, maximum tolerated interference power, and the</p> <p>number of diversity branches is investigated. Importantly, by</p> <p>considering two scenarios, namely (i) absence and (ii) presence</p> <p>of a friendly jammer, new insights are obtained for the considered</p> <p>communication system. Especially, we tend to answer to the</p> <p>following question: Can better secrecy be achieved without</p> <p>jamming by considering a single antenna at eavesdroppers</p> <p>and multiple-ones at the legitimate users (i.e., relay and enduser)</p> <p>rather than sending permanently an artificial noise and</p> <p>considering that both the relay and the destination are equipped</p> <p>with a single antenna, while multiple antennas are used by the</p> <p>eavesdroppers? The obtained results are corroborated through</p> <p>Monte Carlo simulation and show that the system’s security can</p> <p>be enhanced by adjusting the aforementioned parameters.</p>


2021 ◽  
Author(s):  
Weidong Guo ◽  
Yuxi Liu

Abstract This paper investigates physical layer security analysis of cooperative non-orthogonal multiple access (NOMA) communication system. A virtual full-duplex (VFD) relaying scheme with an untrusted amplify-and-forward (AF) half-duplex (HD) relay and a trusted decode-and-forward (DF) HD relay is used in this system to improve the spectral efficiency. In order to prevent the untrusted relay from eavesdropping, a simple and practical cooperative jamming scheme is designed to confuse the untrusted relay. The exact expressions of effective secrecy throughput (EST) for NOMA users and approximate expression of EST for non-NOMA user are derived. All theoretical results are validated by numerical simulations which demonstrate that the proposed VFD-NOMA scheme is superior to existing HD-NOMA scheme in cooperative system and jamming plays an important role for obtaining acceptable EST. In addition, simulation results shows that the best secrecy performance highly depends on the system parameters such as transmit powers and jamming signal power.


2019 ◽  
Author(s):  
Mounia Bouabdellah ◽  
Faissal El Bouanani ◽  
Mohamed-Slim Alouini

p.p1 {margin: 0.0px 0.0px 0.0px 0.0px; font: 9.0px Helvetica} span.s1 {font: 7.5px Helvetica} <p>xAbstract—In this paper, the physical layer security of a dualhop</p> <p>underlay uplink cognitive radio network is investigated over</p> <p>Nakagami-m fading channels. Specifically, multiple secondary</p> <p>sources are taking turns in accessing the licensed</p> <p>spectrum of the primary users and communicating with a multiantenna</p> <p>secondary base station (D) through the aid of a multiantenna</p> <p>relay R in the presence of M eavesdroppers </p> <p>that are also equipped with multiple antennas. Among the</p> <p>remaining nodes, one jammer is randomly selected to transmit</p> <p>an artificial noise to disrupt all the eavesdroppers that are</p> <p>attempting to intercept the communication of the legitimate links</p> <p>i.e., Si -R and R-D. The received signals at each node are combined</p> <p>using maximum-ratio combining. Secrecy analysis is provided by</p> <p>deriving closed-form and asymptotic expressions for the secrecy</p> <p>outage probability. The impact of several key parameters on the</p> <p>system’s secrecy e.g., transmit power of the sources, number of</p> <p>eavesdroppers, maximum tolerated interference power, and the</p> <p>number of diversity branches is investigated. Importantly, by</p> <p>considering two scenarios, namely (i) absence and (ii) presence</p> <p>of a friendly jammer, new insights are obtained for the considered</p> <p>communication system. Especially, we tend to answer to the</p> <p>following question: Can better secrecy be achieved without</p> <p>jamming by considering a single antenna at eavesdroppers</p> <p>and multiple-ones at the legitimate users (i.e., relay and enduser)</p> <p>rather than sending permanently an artificial noise and</p> <p>considering that both the relay and the destination are equipped</p> <p>with a single antenna, while multiple antennas are used by the</p> <p>eavesdroppers? The obtained results are corroborated through</p> <p>Monte Carlo simulation and show that the system’s security can</p> <p>be enhanced by adjusting the aforementioned parameters.</p>


Sign in / Sign up

Export Citation Format

Share Document