scholarly journals Security-Reliability Tradeoff Analysis in Multisource Multirelay Cooperative Networks with Multiple Cochannel Interferers

2018 ◽  
Vol 2018 ◽  
pp. 1-12
Author(s):  
Weilong Hu ◽  
Jiangbo Si ◽  
Hongyan Li

Cooperative relaying communication is one of the green communication technologies since it shortens the communication distance and saves the transmit power. In this paper, the physical-layer security (PLS) of a multisource multirelay cooperative relaying communication network is investigated by considering the influence of cochannel interference from a security-reliability tradeoff (SRT) perspective. First, the SRT performance is characterized by the outage probability (OP) and the intercept probability (IP). In particular, the IP encountered at the eavesdropper is used to evaluate the security performance, while the reliability performance is analyzed in terms of the OP experienced at the destination. Then, under the impact of multiple cochannel interferers, the intercept probabilities and the outage probabilities of both the conventional direct transmission (DT) strategy and relay selection (RS) strategy are derived in closed-form expressions over Rayleigh fading channels, respectively. Simulation results are provided to validate the theoretical analysis. It is shown that when the OP (reliability) requirement is relaxed, the IP (security) performance improves and vice versa. It confirms that there is an SRT existing between the OP and the IP. Meanwhile, a better SRT performance can be achieved by increasing the number of sources, relays, and cochannel interferers. In addition, it is also shown that the RS strategy generally outperforms the conventional DT strategy in terms of the product of the IP and the OP.

2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Khuong Ho-Van ◽  
Thiem Do-Dac

In an UAV- (unmanned aerial vehicle-) aided relaying system, the transmitted signal is exposed to free space in two transmission hops which may be overheard by eavesdroppers. Accordingly, physical layer security should be exploited to improve information security. This paper analyzes both (security and reliability) performance aspects of such a system where only one UAV among multiple UAVs, all capable of harvesting energy from radio frequency signals, is adopted. Towards this end, the tight approximated and exact closed-form expressions of the outage probability at the legitimate destination and the intercept probability at the eavesdropper are first derived. Then, Monte-Carlo simulations are conducted to verify the derived expressions. Based on these expressions, the protected zone of the selected UAV is also proposed through an exhaustive search. Finally, various results are provided to illustrate the impact of key operation parameters on the system performance and the efficacy of the UAV selection.


2016 ◽  
Vol 15 (5) ◽  
pp. 6749-6756
Author(s):  
Ali Abdulwahhab Mohammed ◽  
Li Yu ◽  
Li Yu ◽  
Manar Al-Kali ◽  
Manar Al-Kali ◽  
...  

In this paper investigates the performance, analysis of amplify and forward (AF) cooperative networks with the relay selection over  Nakagami-m and Rayleigh fading channels and  M-ary phase shift keying (MPSK) modulations. New closed form expressions are derived for the general cases of Rayleigh and Nakagami-m fading channels. cumulative density function (CDF), probability density function (PDF) of the end –to - end signal –to – nois ratio (SNR) of a dual-hop opportunistic AF relaying system, moment generating function (MGF), symbol error rate (SER) and outage probability (Pout). and the first  closed-form study for opportunistic AF relaying system where the best node is selected from a number of candidate intermediate nodes to relay the data signal between the source and the destination. Simulation results reveal that the PDF , CDF, Pout and SER performance downgrades either the m parameter or the number of relays increases. Our simulations compared between Rayleigh and Nakagami-m links for a different number of relays. In addition, different modulation techniques are examined to show the effect of the modulation scheme which was used over Rayleigh and Nakagami-m fading channels on the cooperative networks. The obtained results proved the impact of m parameters, relay selection and modulation index on the pout and SER performance.


2021 ◽  
Vol 2021 ◽  
pp. 1-16
Author(s):  
Xiao Jiang ◽  
Peng Li ◽  
Bin Li ◽  
Yulong Zou ◽  
Ruchuan Wang

In this paper, we investigate the physical-layer security in an energy-harvesting (EH) multiuser network with the help of a friendly jammer (J), where multiple eavesdroppers are considered to tap the information transmission from users (Us) to base station (BS). In this system, a power beacon (PB) transmits radio frequency (RF) signals to Us for charging. In order to enhance the security of wireless transmission, we propose non-energy-aware multiuser scheduling (NEAMUS) scheme and energy-aware multiuser scheduling (EAMUS) scheme. For the purpose of comparison, we introduce conventional round robin multiuser scheduling (CRRMUS) scheme. The closed-form outage probability (OP) and intercept probability (IP) expressions of NEAMUS, EAMUS, and CRRMUS schemes are derived over Rayleigh fading channels. Additionally, we analyze the security-reliability tradeoff (SRT) of NEAMUS, EAMUS, and CRRMUS schemes in terms of OP and IP. Numerical results show that the proposed EAMUS scheme is superior to the CRRMUS scheme and NEAMUS scheme in terms of SRT, demonstrating the advantage of the proposed EAMUS scheme in improving the physical-layer security and reliability. Moreover, SRT performance of NEAMUS and EAMUS schemes can also be improved by increasing the number of users.


Electronics ◽  
2019 ◽  
Vol 8 (11) ◽  
pp. 1327 ◽  
Author(s):  
Xingwang Li ◽  
Mengle Zhao ◽  
Changsen Zhang ◽  
Wali Ullah Khan ◽  
Jun Wu ◽  
...  

This paper investigates the reliability and security performance of the downlink non-orthogonal multiple access (NOMA) networks over Nakagami-m fading channels, where the base station (BS) aims to communicate with multi-antenna NOMA users in the presence of a multi-antenna eavesdropper. To be more practical, a detrimental factor at both transmitter and receiver is considered, namely in-phase and quadrature-phase imbalance (IQI). To further improve the reliability and security of the considered networks, the selection combining (SC) algorithm at the receiver is taken into account. More specifically, the exact analytical expressions for the outage probability (OP) and the intercept probability (IP) are derived in closed-form. To obtain a better understanding of the influence for the IQI parameters on the system performance, the asymptotic behaviors for the outage probabilities (OPs) in the high signal-to-noise ratio (SNR) region are analyzed. Based on the asymptotic results, the diversity order of the considered system are obtained and discussed. The numerical results are presented to verify the validity of the theoretical analysis.


Electronics ◽  
2021 ◽  
Vol 10 (12) ◽  
pp. 1368
Author(s):  
Srđan Maričić ◽  
Nenad Milošević ◽  
Dejan Drajić ◽  
Dejan Milić ◽  
Jelena Anastasov

In this paper, we analyze the physical layer security (PLS) of an arbitrarily dimensioned wireless sensor network (WSN) in the presence of an unauthorized attacker. Various scheduling schemes have been exploited in order to enhance the secure transmission of reliable links impaired by Fisher–Snedecor F fading. The path loss among active nodes is also considered. The exact intercept probability expressions are derived recalling an optimal scheduling scheme (OS), a scheduling policy based on a specific cumulative distribution function (CS), and round-robin scheduling as a baseline. The asymptotic behavior of the intercept metric is also presented in a simpler form with acceptable accuracy. The secrecy diversity orders are defined and the security–reliability tradeoff of WSN is specified. Numerical results are provided to demonstrate the interplay of various main/wiretap channel conditions, the distances among nodes, the number of active sensors, and the average main-to-eavesdropper’s signal ratio in order to upgrade the quality of the WSN secrecy performance. Additionally, the impact of the outage probability on the intercept probability is defined for a variety of scenarios under which either the CS or OS scheme could be selected as suitable for PLS enhancement. The obtained results are verified by independent Monte Carlo simulations.


Author(s):  
Hoang Thien Van ◽  
Hoang-Phuong Van ◽  
Danh Hong Le ◽  
Ma Quoc Phu ◽  
Hoang-Sy Nguyen

Employing simultaneous information and power transfer (SWIPT) technology in cooperative relaying networks has drawn considerable attention from the research community. We can find several studies that focus on Rayleigh and Nakagami-m fading channels, which are used to model outdoor scenarios. Differing itself from several existing studies, this study is conducted in the context of indoor scenario modelled by log-normal fading channels. Specifically, we investigate a so-called hybrid time switching relaying (TSR)-power splitting relaying (PSR) protocol in an energy-constrained cooperative amplify-and-forward (AF) relaying network. We evaluate the system performance with outage probability (OP) by analytically expressing and simulating it with Monte Carlo method. The impact of power-splitting (PS), time-switching (TS) and signal-to-noise ratio (SNR) on the OP was as well investigated. Subsequently, the system performance of TSR, PSR and hybrid TSR-PSR schemes were compared. The simulation results are relatively accurate because they align well with the theory.


2020 ◽  
Vol 19 (1) ◽  
pp. 001
Author(s):  
Ivica Marjanović ◽  
Dejan Milić ◽  
Jelena Anastasov ◽  
Aleksandra Cvetković

In this paper, a physical layer security analysis of wireless sensor network in the presence of an attacker, employing opportunistic scheduling approach, is presented. The intended as well as unintended transmission paths experience the Weibull fading. A novel analytical expression for the intercept probability is derived. In order to emphasize the advantages of the opportunistic scheduling approach, a comparative analysis with round-robin and optimal scheduling schemes is also given. The impact of a number of active sensors and the impact of fading channel conditions over main and wiretap channels on the intercept probabilities is obtained. The accuracy of theoretical results is confirmed by independent Monte Carlo simulation results.


2018 ◽  
Vol 7 (4) ◽  
pp. 606-609 ◽  
Author(s):  
Ling Wu ◽  
Liang Yang ◽  
Jianchao Chen ◽  
Mohamed-Slim Alouini

Sensors ◽  
2020 ◽  
Vol 20 (12) ◽  
pp. 3447
Author(s):  
Dinh-Thuan Do ◽  
Thanh-Luan Nguyen ◽  
Byung Moo Lee

This study presents ambient backscatter communication (AmBC) network as a concept of "modulation in the air" that has drawn growing interest by both academia and industry recently. In particular, we investigate and analyze an AmBC system relying on cognitive radio, where the primary destination is equipped with multiple antennas and maximum ratio combining (MRC). A wireless powered relay is necessary to serve both primary and secondary destinations. Benefiting from the surrounding radio frequency (RF) source, the relay can support the backscattering signal. To facilitate the performance analysis of received nodes, this study presents exact closed-form expressions of the outage probability. For comparison, the outage and throughput performance of these nodes are considered in numerical simulation. Taking advantage of the AmBC technology, the impact of the backscatter ratio on system performance is carefully studied considering various other parameters. Simulation results demonstrate the exactness of the derived outage probabilities and show that the optimal throughput performance can be achieved at specific parameters.


2021 ◽  
Vol 13 (8) ◽  
pp. 205
Author(s):  
Deemah Tashman ◽  
Walaa Hamouda

In this paper, the physical-layer security for a three-node wiretap system model is studied. Under the threat of multiple eavesdroppers, it is presumed that a transmitter is communicating with a legitimate receiver. The channels are assumed to be following cascaded κ-μ fading distributions. In addition, two scenarios for eavesdroppers’ interception and information-processing capabilities are investigated: colluding and non-colluding eavesdroppers. The positions of these eavesdroppers are assumed to be random in the non-colluding eavesdropping scenario, based on a homogeneous Poisson point process (HPPP). The security is examined in terms of the secrecy outage probability, the probability of non-zero secrecy capacity, and the intercept probability. The exact and asymptotic expressions for the secrecy outage probability and the probability of non-zero secrecy capacity are derived. The results demonstrate the effect of the cascade level on security. Additionally, the results indicate that as the number of eavesdroppers rises, the privacy of signals exchanged between legitimate ends deteriorates. Furthermore, in this paper, regarding the capabilities of tapping and processing the information, we provide a comparison between colluding and non-colluding eavesdropping.


Sign in / Sign up

Export Citation Format

Share Document