secrecy rate
Recently Published Documents


TOTAL DOCUMENTS

407
(FIVE YEARS 164)

H-INDEX

28
(FIVE YEARS 7)

2022 ◽  
Vol 22 (3) ◽  
pp. 1-17
Author(s):  
Guihong Chen ◽  
Xi Liu ◽  
Mohammad Shorfuzzaman ◽  
Ali Karime ◽  
Yonghua Wang ◽  
...  

Wireless body area network (WBAN) suffers secure challenges, especially the eavesdropping attack, due to constraint resources. In this article, deep reinforcement learning (DRL) and mobile edge computing (MEC) technology are adopted to formulate a DRL-MEC-based jamming-aided anti-eavesdropping (DMEC-JAE) scheme to resist the eavesdropping attack without considering the channel state information. In this scheme, a MEC sensor is chosen to send artificial jamming signals to improve the secrecy rate of the system. Power control technique is utilized to optimize the transmission power of both the source sensor and the MEC sensor to save energy. The remaining energy of the MEC sensor is concerned to ensure routine data transmission and jamming signal transmission. Additionally, the DMEC-JAE scheme integrates with transfer learning for a higher learning rate. The performance bounds of the scheme concerning the secrecy rate, energy consumption, and the utility are evaluated. Simulation results show that the DMEC-JAE scheme can approach the performance bounds with high learning speed, which outperforms the benchmark schemes.


Entropy ◽  
2022 ◽  
Vol 24 (1) ◽  
pp. 99
Author(s):  
Eduard Jorswieck ◽  
Pin-Hsun Lin ◽  
Karl-Ludwig Besser

It is known that for a slow fading Gaussian wiretap channel without channel state information at the transmitter and with statistically independent fading channels, the outage probability of any given target secrecy rate is non-zero, in general. This implies that the so-called zero-outage secrecy capacity (ZOSC) is zero and we cannot transmit at any positive data rate reliably and confidentially. When the fading legitimate and eavesdropper channels are statistically dependent, this conclusion changes significantly. Our work shows that there exist dependency structures for which positive zero-outage secrecy rates (ZOSR) are achievable. In this paper, we are interested in the characterization of these dependency structures and we study the system parameters in terms of the number of observations at legitimate receiver and eavesdropper as well as average channel gains for which positive ZOSR are achieved. First, we consider the setting that there are two paths from the transmitter to the legitimate receiver and one path to the eavesdropper. We show that by introducing a proper dependence structure among the fading gains of the three paths, we can achieve a zero secrecy outage probability (SOP) for some positive secrecy rate. In this way, we can achieve a non-zero ZOSR. We conjecture that the proposed dependency structure achieves maximum ZOSR. To better understand the underlying dependence structure, we further consider the case where the channel gains are from finite alphabets and systematically and globally solve the ZOSC. In addition, we apply the rearrangement algorithm to solve the ZOSR for continuous channel gains. The results indicate that the legitimate link must have an advantage in terms of the number of antennas and average channel gains to obtain positive ZOSR. The results motivate further studies into the optimal dependency structures.


Electronics ◽  
2021 ◽  
Vol 11 (1) ◽  
pp. 40
Author(s):  
Nabila Sehito ◽  
Shouyi Yang ◽  
Esraa Mousa Ali ◽  
Muhammad Abbas Khan ◽  
Raja Sohail Ahmed Larik ◽  
...  

In this article, we investigated the secrecy performance of a three-hop relay network system with Power Splitting (PS) and Energy Harvesting (EH). In the presence of one eavesdropper, a signal is transferred from source to destination with the help of a relay. The source signal transmits in full-duplex (FD) mood, jamming the relay transfer signals to the destination. The relay and source employ Time Switching (TS) and Energy Harvesting (EH) techniques to obtain the power from the power beacon. In this study, we compared the Secrecy Rate of two Cooperative Schemes, Amplify and Forward (AF) and Decode and Forward (DF), for both designed systems with the established EH and PS system. The Secrecy Rate was improved by 50.5% in the AF scheme and by 44.2% in the DF scheme between the relay and eavesdropper at 40 m apart for the proposed system in EH and PS. This simulation was performed using the Monto Carlo method in MATLAB.


Sensors ◽  
2021 ◽  
Vol 21 (24) ◽  
pp. 8198
Author(s):  
Juan Sun ◽  
Shubin Zhang ◽  
Kaikai Chi

This paper investigates the secrecy communication in an underlay cognitive radio (CR) networks with one primary user (PU) as well as multiple PUs, where the radio frequency (RF) energy-harvesting secondary user (SU) transmits the confidential information to the destination in the presence of a potential eavesdropper. We introduce a RF energy-harvesting secondary jammer (SJ) to secure the SU transmissions. The system works in time slots, where each time slot is divided into the energy transfer (ET) phase and the information transfer (IT) phase. In ET phase, the SU and SJ capture energy from the PU transmissions; in the IT phase, the SU uses the harvested energy to transmit information to the destination without causing the harmful interference to the PU transmissions, while the SJ utilizes the captured energy to generate jamming signals to the eavesdropper to secure the SU transmissions. We aim to maximize the secrecy rate for SU transmissionsby jointly optimizing the time allocation between ET phase and IT phase and the transmit power allocation at the SU and SJ. We first formulate the secrecy rate maximization as non-convex optimization problems. Then, we propose efficient nested form algorithms for the non-convex problems. In the outer layer, we obtain the optimal time allocation by the one dimension search method. In the inner layer, we obtain the optimal transmit power allocation by the DC programming, where the Lagrange duality method is employed to solve the convex approximation problem. Simulation results verify that the proposed schemes essentially improve the secrecy rate of the secondary network as compared to the benchmark schemes.


2021 ◽  
Vol 17 (12) ◽  
pp. 155014772110590
Author(s):  
Zhihui Shang ◽  
Tao Zhang ◽  
Liwei Tao ◽  
Zhongwu Xiang ◽  
Weiwei Yang

This article studies the physical layer security in a downlink full-duplex cognitive non-orthogonal multiple access sensor networks (FD-C-NOMA). Compared with the existing works, this article proposes a FD-C-NOMA transmission scheme with a primary user (PU) and secondary user (SU) sensor nodes in the presence of an eavesdropper. The zero-forcing beamforming design problems of FD operation are investigated subject to the practical secrecy rate and the quality of services of PU. To characterize the security reliability trade-off of the FD-C-NOMA scheme, we first derive the closed-form expressions of connection outage probability (COP), the secrecy outage probability (SOP), and effective secrecy throughput (EST) of each SU in the NOMA networks. Then the impacts of the system parameters on the COP, SOP, and EST are investigated to evaluate the security and reliability in the FD-C-NOMA networks. Furthermore, in order to further verify the security and reliability of our considered network, an OMA scheme of FD operation is provided in the simulation for the purpose of comparison. Results demonstrate that the NOMA-based cognitive sensor networks of FD operation outperforms the OMA system in terms of EST. Finally, simulations are performed to validate the accuracy of our analysis results of the proposed scheme.


Sensors ◽  
2021 ◽  
Vol 21 (23) ◽  
pp. 7837
Author(s):  
Kisong Lee

In this study, wireless-powered cognitive radio networks (WPCRNs) are considered, in which N sets of transmitters, receivers and energy-harvesting (EH) nodes in secondary networks share the same spectrum with primary users (PUs) and none of the EH nodes is allowed to decode information but can harvest energy from the signals. Given that the EH nodes are untrusted nodes from the point of view of information transfer, the eavesdropping of secret information can occur if they decide to eavesdrop on information instead of harvesting energy from the signals transmitted by secondary users (SUs). For secure communications in WPCRNs, we aim to find the optimal transmit powers of SUs that maximize the average secrecy rate of SUs while maintaining the interference to PUs below an allowable level, while guaranteeing the minimum EH requirement for each EH node. First, we derive an analytical expression for the transmit power via dual decomposition and propose a suboptimal transmit power control algorithm, which is implemented in an iterative manner with low complexity. The simulation results confirm that the proposed scheme outperforms the conventional distributed schemes by more than 10% in terms of the average secrecy rate and outage probability and can also considerably reduce the computation time compared with the optimal scheme.


Author(s):  
Fatemeh Bahadori ◽  
Seyed Mohammad Sajad Sadough ◽  
Zabih Ghassemlooy
Keyword(s):  

2021 ◽  
Vol 2021 ◽  
pp. 1-7
Author(s):  
Jinxin Zhu ◽  
Jun Shao

This paper investigates a joint robust scheme in a secrecy relay network where distributed relays perform cooperative beamforming and a friendly jammer transmits jamming signal to enhance the information security. Specifically, we consider the outage constraint secrecy rate maximization design with imperfect channel state information. Through semidefinite relaxation and one-dimensional search, we propose a two-layer optimization method to solve the nonconvex problem. In addition, the Bernstein-type inequality and large deviation inequality are utilized to convert the probabilistic constraint. Simulation results demonstrate the performance of the proposed design.


Sign in / Sign up

Export Citation Format

Share Document