scholarly journals Secure Transmission in Cognitive Wiretap Networks with Full-Duplex Receivers

2020 ◽  
Vol 10 (5) ◽  
pp. 1840 ◽  
Author(s):  
Zhihui Shang ◽  
Tao Zhang ◽  
Yueming Cai ◽  
Weiwei Yang ◽  
Hao Wu ◽  
...  

This paper studies the secure transmission in the dual-hop cognitive wiretap networks, where the secondary transmitter (Alice) aims to transmit confidential information to the secondary receiver (Bob) in the face of a multi-antenna relay (Relay), while the malicious eavesdropper (Eve) is used to eavesdrop the confidential information from Alice and Relay. To improve security, we design two transmission schemes, namely maximal-ratio combining/maximal-ratio transmission-selection combining (MRC/MRT-SC) with half-duplex (HD) receiver and maximal-ratio combining-zero forcing beamforming/maximal-ratio transmission-selection combining-zero forcing beamforming (MRC-ZFB/MRT-SC-ZFB) with full-duplex (FD) receiver. To evaluate the secrecy performance obtained from the proposed schemes comprehensively, the new closed-form and simple asymptotic expressions for the secrecy outage probability (SOP) and secrecy throughput (ST) of our considered networks with MRC-ZFB/MRT-SC-ZFB and MRC/MRT-SC schemes are derived, respectively. Thus, we explore the effect of various schemes on system secrecy performance in terms of SOP and ST. Analytical results and numerical simulations demonstrate that MRC-ZFB/MRT-SC-ZFB achieves better performance in the two proposed schemes. In particular, we show that the FD receiver plays a crucial role in designing the cognitive wiretap networks for protecting the legitimate link against attack from the malicious eavesdropping.

2021 ◽  
Author(s):  
Shu Xu ◽  
Chen Liu ◽  
Hong Wang ◽  
Mujun Qian ◽  
Wenfeng Sun

Abstract Secure transmission is essential for future non-orthogonal multiple access (NOMA) system. This paper investigates relay-antenna selection (RAS) to enhance physical-layer security (PLS) of cooperative NOMA system in the presence of an eavesdropper, where multiple antennas are deployed at the relays, the users, and the eavesdropper. In order to reduce expense on radio frequency (RF) chains, selection combining (SC) is employed at both the relays and the users, whilst the eavesdropper employs either maximal-ratio combining (MRC) or selection combining (SC) to process the received signals. Under the condition that the channel state information (CSI) of the eavesdropping channel is available or unavailable, two e↵ective relay-antenna selection schemes are proposed. Additionally, the closed-form expressions of secrecy outage probability (SOP) are derived for the proposed relay-antenna selection schemes. In order to gain more deep insights on the derived results, the asymptotic performance of the derived SOP is analyzed. In simulations, it is demonstrated that the theoretical results match well with the simulation results and the SOP of the proposed schemes is less than that of the conventional orthogonal multiple access (OMA) scheme obviously.


2020 ◽  
Author(s):  
Zhihui Shang ◽  
Tao Zhang ◽  
Hao Wu ◽  
Xiaoqiang Qiao ◽  
Liwei Tao

Abstract In this paper, we investigate the effects of the outdated channel state information (CSI) on the secrecy performance of an underlay spectrum sharing cognitive radio networks (CRNs) with full-duplex (FD) receivers. Legitimate destination node (Bob) acts as a FD node, transmitting interference signals to a passive eavesdropping node (Eve) while receiving signals. To exploit the benefits of collaborative zero-forcing beamforming and FD technologies, transmit antenna selection-maximal-ratio combining-zero forcing beamforming/maximal-ratio transmission-selection combining-zero forcing beamforming (TAS-MRC-ZFB/MRT-SC-ZFB) scheme is considered at the secondary user transmission link with the outdated CSI and collaborative ZFB is adopted at FD destination node, which tries to improve the transmission efficiency of our considered CRNs. Specifically, in order to evaluate the proposed scheme, the derivation of analytical expression in exact and the high asymptotic closed-form expressions of secrecy outage probability (SOP) are provided of the considered network with and without feedback delay of the CSI. Furthermore, the impact of delay on the second user transmission and interference links of the primary user (PU) node is investigated. The results reveal that outdated CSI of secondary user transmission and collaborative ZFB channels deteriorates the SOP, and the outdated CSI between PU and SU will affect the power margin factors for the secondary transmitter. Furthermore, we also study the effects of different system parameters on the secrecy diversity order and secrecy array gain. The proposed scheme is compared with the existing TAS-MRC/TAS-MRC scheme to verify the improvement of system performance. Finally, Monte Carlo simulations verify the correctness of our theoretical analysis.


Sensors ◽  
2019 ◽  
Vol 19 (5) ◽  
pp. 1160 ◽  
Author(s):  
Phu Tin ◽  
Pham Minh Nam ◽  
Tran Trung Duy ◽  
Phuong Tran ◽  
Miroslav Voznak

In this paper, we evaluate the secrecy performance of multi-hop cognitive wireless sensor networks (WSNs). In the secondary network, a source transmits its data to a destination via the multi-hop relaying model using the transmit antenna selection (TAS)/selection combining (SC) technique at each hop, in the presence of an eavesdropper who wants to receive the data illegally. The secondary transmitters, including the source and intermediate relays, have to harvest energy from radio-frequency signals of a power beacon for transmitting the source data. Moreover, their transmit power must be adjusted to satisfy the quality of service (QoS) of the primary network. Under the joint impact of hardware imperfection and interference constraint, expressions for the transmit power for the secondary transmitters are derived. We also derive exact and asymptotic expressions of secrecy outage probability (SOP) and probability of non-zero secrecy capacity (PNSC) for the proposed protocol over Rayleigh fading channel. The derivations are then verified by Monte Carlo simulations.


2018 ◽  
Vol 2018 ◽  
pp. 1-11 ◽  
Author(s):  
Dan Deng ◽  
Chao Li ◽  
Lisheng Fan ◽  
Xin Liu ◽  
Fasheng Zhou

This paper studies the impacts of antenna selection algorithms in decode-and-forward (DF) cooperative nonorthogonal multiple access (NOMA) networks, where the secure information from the relay can be overheard by an eavesdropper in the networks. In order to ensure the secure transmission, an optimal antenna selection algorithm is proposed to choose one best relay’s antenna to assist the secure transmission. We study the impact of antenna selection on the system secure communication through deriving the analytical expression of the secrecy outage probability along with the asymptotic expression in the high regime of signal-to-noise ratio (SNR) and main-to-eavesdropper ratio (MER). From the analytical and asymptotic expressions, we find that the system secure performance is highly dependent on the system parameters such as the number of antennas at the relay, SNR, and MER. In particular, the secrecy diversity order of the system is equal to the antenna number, when the interference from the second user is limited.


2020 ◽  
Vol 16 (6) ◽  
pp. 155014772093346
Author(s):  
Xin Fan ◽  
Yan Huo

As Internet of Things (IoT) has boomed in recent years, many security issues have also been exposed. Focusing on physical layer security in wireless Internet of Things network communication, a series of security methods have been widely studied. Nevertheless, cooperative jamming methods in physical layer security to fight against collusive eavesdroppers have not been thoroughly studied yet. In this article, we study a cooperative-jamming-based physical layer secure transmission scheme for Internet of Things wireless networks in the presence of collusive eavesdroppers. We design a cooperative jamming strategy without knowing the channel state information of eavesdroppers. Considering the cooperation of multiple nodes with multiple antennas, this strategy can maximize the signal-to-interference-plus-noise ratio at an actuator (legitimate receiver). Meanwhile, the generated cooperative jamming signals can reduce the signal-to-interference-plus-noise ratio at eavesdroppers. To explore the theoretical security performance of our strategy, we perform a secrecy outage probability analysis and an asymptotic analysis. In the cases of cooperative jamming and without cooperative jamming, the closed-form expressions of the secrecy outage probability are deduced, and the influence of system parameters on the secrecy outage probability becomes more intuitive through a strict mathematical asymptotic behavior analysis. In addition, considering the energy limitation of Internet of Things devices, we propose a power allocation algorithm to minimize the total transmission power given the security requirements. The numerical results show the effectiveness of our schemes and are consistent with the theoretical analysis.


2019 ◽  
Vol 9 (21) ◽  
pp. 4506
Author(s):  
Chen Wei ◽  
Wendong Yang ◽  
Yueming Cai

This paper investigates the secure transmission for buffer-aided relay networks in the Internet of Things (IoT) in the presence of multiple passive eavesdroppers. For security enhancement, we adopt the max-link relay selection policy and propose three secure transmission schemes: (1) non-jamming (NJ); (2) source cooperative jamming (SCJ); and (3) source cooperative jamming with optimal power allocation (SCJ-OPA). Moreover, to analyze the secrecy performance comprehensively, two eavesdropping scenarios, i.e., non-colluding eavesdroppers (NCE) and colluding eavesdroppers (CE) are considered. Based on this, by modeling the dynamic buffer state transition as a Markov chain, we derive the exact closed-form expressions of the secrecy outage probability, the average secrecy throughput, and the end-to-end delay for each schemes. The analytical analysis and simulation shows that the SCJ-OPA scheme achieves similar performance as the NJ scheme when the total transmit power is small. On the other hand, when the transmit power is high, the performance achieved by SCJ-OPA is similar to that of SCJ. Thereby, the SCJ-OPA scheme can achieve better performance across the entire total transmit power, which makes up the defects of NJ and SCJ exactly.


Sensors ◽  
2021 ◽  
Vol 21 (11) ◽  
pp. 3847
Author(s):  
Phu Tran Tin ◽  
Tan N. Nguyen ◽  
Dinh-Hieu Tran ◽  
Miroslav Voznak ◽  
Van-Duc Phan ◽  
...  

Full-duplex (FD) with simultaneous wireless information and power transfer (SWIPT) in wireless ad hoc networks has received increased attention as a technology for improving spectrum and energy efficiency. This paper studies the outage performance for a SWIPT-based decode-and-forward (DF) FD relaying network consisting of a single-antenna source S, a two-antenna relay R, and a multi-antenna destination D. Specifically, we propose four protocols, namely static time-switching factor with selection combining (STSF-SC), static time-switching factor with maximal ratio combining (STSF-MRC), optimal dynamic time-switching factor with selection combining (ODTSF-SC), and optimal dynamic time-switching factor with maximal ratio combining (ODTSF-MRC) to fully investigate the outage performance of the proposed system. In particular, the optimal time-switching factor from the ODTSF-SC and ODTSF-MRC methods is designed to maximize the total received data at the destination. In this context, we derive exact closed-formed expressions for all schemes in terms of the outage probability (OP). Finally, the Monte Carlo simulations are conducted to corroborate the theoretical analysis’s correctness and the proposed schemes’ effectiveness.


2021 ◽  
Author(s):  
Nesrine Zaghdoud ◽  
Adel Ben Mnaouer ◽  
Hatem Boujemaa ◽  
Farid Touati

Abstract Although the progress in understanding 5G and beyond techniques such as Non-Orthogonal Multiple Access (NOMA) and full-duplex techniques has been overwhelming, still analyzing the security aspects of such systems under different scenarios and settings is an important concern that needs further exploration. In particular, when considering fading in wiretap channels and scenarios, achieving secrecy has posed many challenges. In this context, we propose to study the physical layer security (PLS) of cooperative NOMA (C-NOMA) system using the general fading distribution κ - μ. This distribution facilitates mainly the effect of light-of-sight as well as multipath fading. It also includes multiple distributions as special cases like: Rayleigh, Rice, Nakagami-m which help to understand the comportment of C-NOMA systems under different fading parameters. The use of Half-Duplex and Full-Duplex communication is also investigated for both Amplify-and-forward (AF) and Decode-and-Forward (DF) relaying protocols. To characterize the secrecy performance of the proposed C-NOMA systems, closed form expressions of the Secrecy Outage Probability (SOP) and the Strictly Positive Secrcey Capacity (SPSC) metrics for the strong and weak users are given for high signal-to-noise ratio (SNR) due to the intractable nature of the exact expressions. Based on the analytical analysis, numerical and simulation results are given under different network parameters.


2020 ◽  
Vol 2020 ◽  
pp. 1-13
Author(s):  
Shaddrack Yaw Nusenu

In multicast communication scenario, the desired users are decomposed into M groups to receive private M useful data from the transmitter, while eavesdroppers (Eves) group tries to intercept. Since wireless security system consists of authentication and secure transmission, we propose directional modulation (DM) artificial noise (AN) matrix-aided Costas sequence (CS) matrix frequency diverse array (FDA) in multicast precoding systems in this paper. Specifically, we utilize the CS matrix for desired groups authentication (i.e., group identity), and it is shared via a low-speed forward link in advance. Next, we design AN matrix-aided FDA to offer robust antieavesdropping method based on leakage concept. Furthermore, we devise secrecy metrics, namely, secrecy outage probability (SOP), asymptotic Eve’s detectability error probability, and average useful data leakage rate, based on the scenario where Eve’s instantaneous channel state information (CSI) is unavailable. In addition, we numerically analyze the proposed energy beamforming focusing and evaluate the secrecy energy efficiency. Via simulation results, the proposed scheme gives important insights into how to design and measure secrecy performances in multicast scenarios.


Sign in / Sign up

Export Citation Format

Share Document