secrecy outage
Recently Published Documents


TOTAL DOCUMENTS

318
(FIVE YEARS 136)

H-INDEX

26
(FIVE YEARS 5)

Photonics ◽  
2022 ◽  
Vol 9 (1) ◽  
pp. 32
Author(s):  
Kehinde O. Odeyemi ◽  
Pius A. Owolawi

In this paper, the secrecy performance of a mixed free space optical (FSO)/radio frequency (RF) integrated satellite-high altitude platform (HAP) relaying networks for terrestrial multiusers with the existence of an eavesdropper is investigated. In this network, FSO is adopted to establish the link between the satellite and HAP for which it experiences Gamma-Gamma distributions under different detection schemes (i.e., heterodyne and intensity modulation direct detection). The transmission between the amplify-and-forward (AF) relaying HAP and terrestrial multiusers is through the RF and is modeled as shadowed-Rician fading distribution. Owning to broadcasting nature of RF link, it is assumed that an eavesdropper attempts to intercept the users’ confidential message, and the eavesdropper link is subjected to Rician distributions. Specifically, the closed-form expression for the system equivalent end-to-end cumulative distribution function is derived by exploiting the Meijer’s G and Fox’s H functions. Based on this expression, the exact closed-form expressions of the system connection outage probability, secrecy outage probability, and strictly positive secrecy capacity are obtained under the different detection schemes at HAP. Moreover, the asymptotic analyze of the system secrecy outage probability is provided to obtain more physical insights. Furthermore, the accuracy of all the derived analytical closed-form expressions is verified through the Monte-Carlo simulations. In addition, the impact of atmospheric turbulence, pointing errors, shadowing severity parameters, and Rician factor are thoroughly evaluated. Under the same system conditions, the results depict that heterodyne detection outperforms the intensity modulation direct detection.


Author(s):  
Soumya P. Dash ◽  
Sandeep Joshi ◽  
Suresh Chandra Satapathy ◽  
Shishir Kumar Shandilya ◽  
Ganapati Panda

2021 ◽  
Author(s):  
Shu Xu ◽  
Chen Liu ◽  
Hong Wang ◽  
Mujun Qian ◽  
Wenfeng Sun

Abstract Secure transmission is essential for future non-orthogonal multiple access (NOMA) system. This paper investigates relay-antenna selection (RAS) to enhance physical-layer security (PLS) of cooperative NOMA system in the presence of an eavesdropper, where multiple antennas are deployed at the relays, the users, and the eavesdropper. In order to reduce expense on radio frequency (RF) chains, selection combining (SC) is employed at both the relays and the users, whilst the eavesdropper employs either maximal-ratio combining (MRC) or selection combining (SC) to process the received signals. Under the condition that the channel state information (CSI) of the eavesdropping channel is available or unavailable, two e↵ective relay-antenna selection schemes are proposed. Additionally, the closed-form expressions of secrecy outage probability (SOP) are derived for the proposed relay-antenna selection schemes. In order to gain more deep insights on the derived results, the asymptotic performance of the derived SOP is analyzed. In simulations, it is demonstrated that the theoretical results match well with the simulation results and the SOP of the proposed schemes is less than that of the conventional orthogonal multiple access (OMA) scheme obviously.


2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Xuehua Li ◽  
Yingjie Pei ◽  
Huan Jiang ◽  
Xinwei Yue ◽  
Yafei Wang ◽  
...  

Mobile edge computing (MEC) is becoming more and more popular because of improving computing power in virtual reality, augmented reality, unmanned driving, and other fields. This paper investigates a nonorthogonal multiple access- (NOMA-) based MEC system, which is under imperfect channel state information (ipCSI). In this system model, a pair of users offloads their tasks to the MEC server with the existence of an eavesdropper (Eve). To evaluate the impact of Eve on the performance of the NOMA-MEC system, the secrecy outage probability (SOP) expressions for two users with the conditions of imperfect CSI and perfect channel state information (pCSI) are derived. In addition, both throughput and energy efficiency are discussed in the delay-limited transmission mode. Simulation results reveal that (1) due to the influence of channel estimation errors, the secrecy outage behaviors of two users under ipCSI conditions are worse than those of users with pCSI; (2) the secrecy performance of NOMA-MEC is superior to orthogonal multiple access- (OMA-) aided MEC systems; and (3) the NOMA-MEC systems have the ability to attain better system throughput and energy efficiency compared with OMA-MEC.


2021 ◽  
Vol 10 (6) ◽  
pp. 3274-3281
Author(s):  
Dinh-Thuan Do ◽  
Minh-Sang Van Nguyen

In this paper, we study uplink-downlink non-orthogonal multiple access (NOMA) systems by considering the secure performance at the physical layer. In the considered system model, the base station acts a relay to allow two users at the left side communicate with two users at the right side. By considering imperfect channel state information (CSI), the secure performance need be studied since an eavesdropper wants to overhear signals processed at the downlink. To provide secure performance metric, we derive exact expressions of secrecy outage probability (SOP) and and evaluating the impacts of main parameters on SOP metric. The important finding is that we can achieve the higher secrecy performance at high signal to noise ratio (SNR). Moreover, the numerical results demonstrate that the SOP tends to a constant at high SNR. Finally, our results show that the power allocation factors, target rates are main factors affecting to the secrecy performance of considered uplink-downlink NOMA systems.


2021 ◽  
Author(s):  
Wided Hadj Alouane

Abstract In this paper, we investigate physical layer security of multi-relay non-orthogonal multiple access (NOMA) networks with partial relay selection considering decode-and-forward (DF) and amplify-and-forward (AF) protocols. We propose a partial relay scheme aiming to select the best relay based on the highest signal-to-noise-ratio (SNR) of the first link. We derive new exact and asymptotic expressions for strictly positive secrecy capacity (SPSC) and secrecy outage probability (SOP) considering Rayleigh fading channels. Numerical results demonstrate that AF and DF provide almost a similar secrecy performance. Moreover, they prove that partial relay selection improves SPSC and reduces SOP when the relay-cluster is closer to the legitimate receiver.


2021 ◽  
Author(s):  
Sajad Hatamnia ◽  
Mahdi Morafah ◽  
Bill Lin

<div> <div> <div> <p>In the last decade, multi-hop cooperation has evolved bringing several advantages including coverage improvement, more reliability of wireless links, and power consumption reduction. Still, its application has raised several challenges, such as the need for secure transmission at each hop, algorithms to perform relay selection and the accurate models to facilitate performance analysis. This paper addresses the problem of physical layer (PHY) security in a multi-hop wireless cooperative network, where communication at each hop is assisted by multiple relays forming a cluster, each cluster being surrounded by multiple eavesdroppers which together may tap transmissions from both the source and the relays. The main focus of the study is on analyzing the benefits of various relay selection schemes for protecting the source-destination transmission against the eavesdroppers, which can collude and combine information via diversity combining techniques. To be specific, four relay selection schemes, which differ in the way they employ available measures link quality, are considered to deliver the source information to the destination via a decode-and-forward (DF) strategy. To evaluate the security performance of the multi-hop cooperative link in the presence of colluding eavesdroppers, we derive novel closed-form analytical expressions for the secrecy outage probability (SOP) with consideration of special cases of practical interest. </p> </div> </div> </div>


2021 ◽  
Author(s):  
Sajad Hatamnia ◽  
Mahdi Morafah ◽  
Bill Lin

<div> <div> <div> <p>In the last decade, multi-hop cooperation has evolved bringing several advantages including coverage improvement, more reliability of wireless links, and power consumption reduction. Still, its application has raised several challenges, such as the need for secure transmission at each hop, algorithms to perform relay selection and the accurate models to facilitate performance analysis. This paper addresses the problem of physical layer (PHY) security in a multi-hop wireless cooperative network, where communication at each hop is assisted by multiple relays forming a cluster, each cluster being surrounded by multiple eavesdroppers which together may tap transmissions from both the source and the relays. The main focus of the study is on analyzing the benefits of various relay selection schemes for protecting the source-destination transmission against the eavesdroppers, which can collude and combine information via diversity combining techniques. To be specific, four relay selection schemes, which differ in the way they employ available measures link quality, are considered to deliver the source information to the destination via a decode-and-forward (DF) strategy. To evaluate the security performance of the multi-hop cooperative link in the presence of colluding eavesdroppers, we derive novel closed-form analytical expressions for the secrecy outage probability (SOP) with consideration of special cases of practical interest. </p> </div> </div> </div>


Sign in / Sign up

Export Citation Format

Share Document