Secrecy Outage Performance for Underlay MIMO CRNs with Energy Harvesting and Transmit Antenna Selection

Author(s):  
Hongjiang Lei ◽  
Ming Xu ◽  
Huan Zhang ◽  
Gaofeng Pan ◽  
Imran Shafique Ansari ◽  
...  
Author(s):  
R. Rajesh ◽  
P. G. S. Velmurugan ◽  
S. J. Thiruvengadam ◽  
P. S. Mallick

In this paper, a bidirectional full-duplex amplify- and-forward (AF) relay network with multiple antennas at source nodes is proposed. Assuming that the channel state information is known at the source nodes, transmit antenna selection and maximal ratio combining (MRC) are employed when source nodes transmit information to the relay node and receive information from the relay node respectively, in order to improve the overall signal-to-interference plus noise ratio (SINR). Analytical expressions are derived for tight upper bound SINR at the relay node and source nodes upon reception. Further, losed form expressions are also derived for end-to-end outage probability of the proposed bidirectional full-duplex AF relay network in the Nakagami-m fading channel environment. Although self-interference at the relay node limits the performance of the full-duplex network, the outage performance of the proposed network is better than that of conventional bidirectional full-duplex and half-duplex AF relay networks, due to the selection diversity gain in TAS and diversity and array gain in MRC.


Sensors ◽  
2019 ◽  
Vol 19 (5) ◽  
pp. 1160 ◽  
Author(s):  
Phu Tin ◽  
Pham Minh Nam ◽  
Tran Trung Duy ◽  
Phuong Tran ◽  
Miroslav Voznak

In this paper, we evaluate the secrecy performance of multi-hop cognitive wireless sensor networks (WSNs). In the secondary network, a source transmits its data to a destination via the multi-hop relaying model using the transmit antenna selection (TAS)/selection combining (SC) technique at each hop, in the presence of an eavesdropper who wants to receive the data illegally. The secondary transmitters, including the source and intermediate relays, have to harvest energy from radio-frequency signals of a power beacon for transmitting the source data. Moreover, their transmit power must be adjusted to satisfy the quality of service (QoS) of the primary network. Under the joint impact of hardware imperfection and interference constraint, expressions for the transmit power for the secondary transmitters are derived. We also derive exact and asymptotic expressions of secrecy outage probability (SOP) and probability of non-zero secrecy capacity (PNSC) for the proposed protocol over Rayleigh fading channel. The derivations are then verified by Monte Carlo simulations.


2020 ◽  
Vol 69 (7) ◽  
pp. 7473-7482
Author(s):  
Peishun Yan ◽  
Jie Yang ◽  
Miao Liu ◽  
Jinlong Sun ◽  
Guan Gui

Sign in / Sign up

Export Citation Format

Share Document