scholarly journals Rateless Codes-Based Secure Communication Employing Transmit Antenna Selection and Harvest-To-Jam under Joint Effect of Interference and Hardware Impairments

Entropy ◽  
2019 ◽  
Vol 21 (7) ◽  
pp. 700 ◽  
Author(s):  
Phu Tran Tin ◽  
Tan Nguyen ◽  
Nguyen Sang ◽  
Tran Trung Duy ◽  
Phuong Tran ◽  
...  

In this paper, we propose a rateless codes-based communication protocol to provide security for wireless systems. In the proposed protocol, a source uses the transmit antenna selection (TAS) technique to transmit Fountain-encoded packets to a destination in presence of an eavesdropper. Moreover, a cooperative jammer node harvests energy from radio frequency (RF) signals of the source and the interference sources to generate jamming noises on the eavesdropper. The data transmission terminates as soon as the destination can receive a sufficient number of the encoded packets for decoding the original data of the source. To obtain secure communication, the destination must receive sufficient encoded packets before the eavesdropper. The combination of the TAS and harvest-to-jam techniques obtains the security and efficient energy via reducing the number of the data transmission, increasing the quality of the data channel, decreasing the quality of the eavesdropping channel, and supporting the energy for the jammer. The main contribution of this paper is to derive exact closed-form expressions of outage probability (OP), probability of successful and secure communication (SS), intercept probability (IP) and average number of time slots used by the source over Rayleigh fading channel under the joint impact of co-channel interference and hardware impairments. Then, Monte Carlo simulations are presented to verify the theoretical results.

Massive MIMO Technology showed its unique characteristics and capabilities for future wireless communications where high data transmission rates are desired for fast growing 5G applications. High data transmission rates need more number of antennas at base station which comprised of increased system complexity and hardware cost. A proven method for reducing number of RF (radio frequency) chains at base station is Transmit Antenna Selection algorithm. In this paper an effective approach for TAS and optimizing the number of antennas at base station for desired data rates have been proposed and a Tradeoff between SE (Spectral Efficiency), EE (energy Efficiency) are discussed. MVGSA (modified velocity Gravitational Search algorithm) discussed for optimization of Transmit Antennas along with Improved SE and EE other effective algorithms are compared with multi objectives and data transmission rates. MVGSA proved with Improved SE and EE with Effective TAS.


2020 ◽  
Vol 9 (2) ◽  
pp. 1044-1048

Secure data transmission over the unsecured internet is an important aspect in communication. In recent times, data piracy, unauthorized access, loss of crucial information has been one of the important concern in secure communication of data. To provide security over data transmission, multiple techniques are provided each having its own benefits such as cryptography, steganography and watermarking. Cryptography is the technique for modification of data for secured transmission in an unreadable format. Steganography is the process of hiding the cover file with another file and transmitting the cover file without knowing the existence of hidden message. Watermarking is protection technique used to shield the information from intruders. Various combinations of cryptography and steganography is used to make data more secure. Such techniques differ in various aspects which are load capacity, security, efficiency, simplicity, and much more. Watermarking is the most used technique used for copyright protection in media files in recent times while cryptography and steganography are used to protect the data during communication so that the original data cannot be altered. In this paper, various techniques of cryptography and steganography are discussed which are used in the project.


Electronics ◽  
2019 ◽  
Vol 8 (3) ◽  
pp. 328 ◽  
Author(s):  
Chi-Bao Le ◽  
Dinh-Thuan Do ◽  
Miroslav Voznak

In this paper, we study two transmission scenarios for the base station (BS) in cellular networks to serve the far user, who is located at the cell-edge area in such a network. In particular, we show that wireless-powered non-orthogonal multiple access (NOMA) and the cell-center user in such a model can harvest energy from the BS. To overcome disadvantages of the cell-edge user due to its weak received signal, we fabricate a far NOMA user with multiple antennas to achieve performance improvement. In addition, the first scenario only considers a relay link deployed to forward signals to a far NOMA user, while both direct links and relay links are generally enabled to serve a far user in the second scenario. These situations, together with their outage performance, are analyzed and compared to provide insights in the design of a real-multiple-antenna NOMA network, in which the BS is also required to equip multiple antennas for robust quality of transmission. Higher complexity in computations is already known in consideration of outage metrics with respect to performance analysis, since the system model employs multiple antennas. To this end, we employ a transmit antenna selection (TAS) policy to formulate closed-form expressions of outage probability that satisfies the quality-of-service (QoS) requirements in the NOMA network. Our simulation results reveal that the performance of the considered system will be improved in cases of higher quantity of transmit antennas in dedicated devices. Finally, the proposed design in such a NOMA system cannot only ensure a downlink with higher quality to serve a far NOMA user, but also provide significant system performance improvement compared to a traditional NOMA networks using a single antenna.


2018 ◽  
Vol 35 (1) ◽  
pp. 47-60
Author(s):  
VIKASH SACHAN ◽  
INDRAJEET KUMAR ◽  
Ravi SHANKAR ◽  
RITESH KUMAR MISHRA

2020 ◽  
Vol 18 ◽  
Author(s):  
Humberto Guanche Garcell ◽  
Juan José Pisonero Socias ◽  
Gilberto Pardo Gómez

Background: During the last 30 years an antimicrobial stewardship program (ASP) was implemented in a facility with periods of weakness. We aim to describe the history of the sustainability failure in the local ASP. Methods: A historical review was conducted using original data from the facility library and papers published. An analysis of factors related to the failure was conducted based on the Doyle approach. Results: The first ASP was implemented from 1989 to 1996 based on the international experiences and contributes to the improvement in the quality of prescription, reduction of 52% in cost and in the incidence of nosocomial infection. The second program restarts in 2008 and decline in 2015, while the third program was guided by the Pan-American Health Organization from 2019. This program, in progress, is more comprehensive than previous ones and introduced as a novel measure the monitoring of antibiotic prophylaxis in surgery. The factors related to the sustainability were considered including the availability of antimicrobials, the leader´s support, safety culture, and infrastructure. Conclusions: The history behind thirty years of experiences in antimicrobial stewardship programs has allowed us to identify the gaps that require proactive strategies and actions to achieve sustainability and continuous quality improvement.


Sign in / Sign up

Export Citation Format

Share Document