scholarly journals Secrecy Performance Analysis of Hybrid RF/VLC Dual-Hop Relaying Systems

2021 ◽  
Vol 9 ◽  
Author(s):  
Jiaoli Liu ◽  
Jinyuan Wang ◽  
Bingyuan Zhang ◽  
Qinglin Wang

In this article, the secrecy performance of a hybrid radio frequency (RF)/visible light communication (VLC) system is studied. In this hybrid system, the source node (i.e., Alice) transmits information to the relay node via the outdoor RF link. Nakagami-m fading and path loss are considered for the RF link. The relay node includes an outdoor component and an indoor component, which are connected by using a wired medium. The outdoor component receives and recovers information by using the decode-and-forward (DF) relaying scheme and then transmits it to the indoor component. The indoor component then converts the received electrical signal into an optical signal by using a light-emitting diode. A legitimate receiver (i.e., Bob) deployed on the floor receives the optical signal. An eavesdropper (i.e., Eve) deployed in the RF or VLC link wiretaps the confidential information. In this study, we use the secrecy outage probability (SOP) and the probability of strictly positive secrecy capacity (SPSC) to evaluate the system performance. We then obtain the closed-form expression for a lower bound on the SOP and an exact closed-form expression for the probability of SPSC when the RF and VLC links are wiretapped, respectively. Numerical results are presented to validate the accuracy of our derivations. We further discuss the effects of the noise standard deviation, the equivalent threshold of the signal-to-noise ratio, and the floor radius on the system secrecy performance when the VLC link is eavesdropped upon. For the case when the RF link is eavesdropped upon, the impacts of the distance between Alice and the relay, the path loss exponent, the fading factor, and the distance between Alice and Eve on secrecy performance are also provided.

Author(s):  
Hoang Van Toan ◽  
Vo Nguyen Quoc Bao

A cognitive underlay two-way relay network taking into account interference links from primary transmitter to secondary receivers over Nakagami-m fading channels is analyzed in this article. In this model, a secondary system including two terminal nodes exchanges data through a decode-and-forward (DF) relay node. Under the underlay approach, all secondary transmitter must adjust transmit power to protect the primary communications. We derive the exact and asymptotic closed-form expression for the secondary system outage probability over Nakagami-m fading channels showing the system diversity. Monte-Carlo simulation are performed to verify the analysis results as well as to show the system characteristics


2018 ◽  
Vol 2018 ◽  
pp. 1-12 ◽  
Author(s):  
Kyusung Shim ◽  
Beongku An

In this paper, we address the opportunistic scheduling in multitwo user NOMA system consisting of one base station, multinear user, multifar user, and one eavesdropper. To improve the secrecy performance, we propose the users selection scheme, called best-secure-near-user best-secure-far-user (BSNBSF) scheme. The BSNBSF scheme aims to select the best near-far user pair, whose data transmission is the most robust against the overhearing of an eavesdropper. In order to facilitate the performance analysis of the BSNBSF scheme in terms of secrecy outage performance, we derive the exact closed-form expression for secrecy outage probability (SOP) of the selected near user and the tight approximated closed-form expression for SOP of the selected far user, respectively. Additionally, we propose the descent-based search method to find the optimal values of the power allocation coefficients that can minimize the total secrecy outage probability (TSOP). The developed analyses are corroborated through Monte Carlo simulation. Comparisons with the random-near-user random-far-user (RNRF) scheme are performed and show that the proposed scheme significantly improves the secrecy performance.


2019 ◽  
Vol 0 (0) ◽  
Author(s):  
Rashi Jain ◽  
Sakshi Dhiman ◽  
Rahul Kaushik

AbstractIn this paper, the performance of a mixed dual hop asymmetric radio frequency andfree space optical (RF-FSO) communication link is investigated. A closed form analytical expression for evaluating outage probability of mixed RF-FSO link is obtained. The source to relay link is RF link modelled using Nakagami-m fading. The relay to destination link is an FSO link subjected to atmospheric turbulence, modelled using K-distribution. Decode-and-Forward (DF) relaying protocol is used. Further, the effect of pointing error on the performance of the link is analysed using obtained closed form expression. It has been observed that increase in the pointing error leads to reduction in outage performance of the link.


IEEE Access ◽  
2021 ◽  
pp. 1-1
Author(s):  
Yassine Zouaoui ◽  
Larbi Talbi ◽  
Khelifa Hettak ◽  
Naresh K. Darimireddy

2021 ◽  
Vol 48 (3) ◽  
pp. 91-96
Author(s):  
Shigeo Shioda

The consensus achieved in the consensus-forming algorithm is not generally a constant but rather a random variable, even if the initial opinions are the same. In the present paper, we investigate the statistical properties of the consensus in a broadcasting-based consensus-forming algorithm. We focus on two extreme cases: consensus forming by two agents and consensus forming by an infinite number of agents. In the two-agent case, we derive several properties of the distribution function of the consensus. In the infinite-numberof- agents case, we show that if the initial opinions follow a stable distribution, then the consensus also follows a stable distribution. In addition, we derive a closed-form expression of the probability density function of the consensus when the initial opinions follow a Gaussian distribution, a Cauchy distribution, or a L´evy distribution.


2021 ◽  
Vol 2021 (6) ◽  
Author(s):  
Vivek Kumar Singh ◽  
Rama Mishra ◽  
P. Ramadevi

Abstract Weaving knots W(p, n) of type (p, n) denote an infinite family of hyperbolic knots which have not been addressed by the knot theorists as yet. Unlike the well known (p, n) torus knots, we do not have a closed-form expression for HOMFLY-PT and the colored HOMFLY-PT for W(p, n). In this paper, we confine to a hybrid generalization of W(3, n) which we denote as $$ {\hat{W}}_3 $$ W ̂ 3 (m, n) and obtain closed form expression for HOMFLY-PT using the Reshitikhin and Turaev method involving $$ \mathrm{\mathcal{R}} $$ ℛ -matrices. Further, we also compute [r]-colored HOMFLY-PT for W(3, n). Surprisingly, we observe that trace of the product of two dimensional $$ \hat{\mathrm{\mathcal{R}}} $$ ℛ ̂ -matrices can be written in terms of infinite family of Laurent polynomials $$ {\mathcal{V}}_{n,t}\left[q\right] $$ V n , t q whose absolute coefficients has interesting relation to the Fibonacci numbers $$ {\mathrm{\mathcal{F}}}_n $$ ℱ n . We also computed reformulated invariants and the BPS integers in the context of topological strings. From our analysis, we propose that certain refined BPS integers for weaving knot W(3, n) can be explicitly derived from the coefficients of Chebyshev polynomials of first kind.


Sign in / Sign up

Export Citation Format

Share Document