1,962 research outputs found
A New Secure Transmission Scheme With Outdated Antenna Selection
We propose a new secure transmission scheme in
the multi-input multi-output multi-eavesdropper wiretap channel.
In this channel, the NA-antenna transmitter adopts transmit
antenna selection (TAS) to choose the antenna that maximizes
the instantaneous signal-to-noise ratio (SNR) at the receiver to
transmit, while the NB-antenna receiver and the NE-antenna
eavesdropper adopt maximal-ratio combining (MRC) to combine
the received signals. We focus on the practical scenario where
the channel state information (CSI) during the TAS process is
outdated. In this scenario, we propose a new transmission scheme
to prevent the detrimental effect of the outdated CSI on the
wiretap codes design at the transmitter. To thoroughly assess
the secrecy performance achieved by the proposed scheme, we
derive new closed-form expressions for the exact secrecy outage
probability and the probability of non-zero secrecy capacity for
arbitrary SNRs. We also derive new compact expressions for the
asymptotic secrecy outage probability at high SNRs. Notably,
in the analysis we take spatial correlation at the receiver into
consideration. Apart from the advantage of our scheme over
the conventional TAS/MRC scheme, we demonstrate that the
outdated TAS reduces the secrecy diversity order from NANB
to NB. We also demonstrate that antenna correlation improves
the secrecy performance at low SNR but deteriorates the secrecy
performance at medium and high SNRs, by affecting the secrecy
array gain only.ARC Discovery Projects Grant DP150103905
Rateless codes-based secure communication employing transmit antenna selection and harvest-to-jam under joint effect of interference and hardware impairments
In this paper, we propose a rateless codes-based communication protocol to provide security for wireless systems. In the proposed protocol, a source uses the transmit antenna selection (TAS) technique to transmit Fountain-encoded packets to a destination in presence of an eavesdropper. Moreover, a cooperative jammer node harvests energy from radio frequency (RF) signals of the source and the interference sources to generate jamming noises on the eavesdropper. The data transmission terminates as soon as the destination can receive a sufficient number of the encoded packets for decoding the original data of the source. To obtain secure communication, the destination must receive sufficient encoded packets before the eavesdropper. The combination of the TAS and harvest-to-jam techniques obtains the security and efficient energy via reducing the number of the data transmission, increasing the quality of the data channel, decreasing the quality of the eavesdropping channel, and supporting the energy for the jammer. The main contribution of this paper is to derive exact closed-form expressions of outage probability (OP), probability of successful and secure communication (SS), intercept probability (IP) and average number of time slots used by the source over Rayleigh fading channel under the joint impact of co-channel interference and hardware impairments. Then, Monte Carlo simulations are presented to verify the theoretical results.Web of Science217art. no. 70
- …