31 research outputs found
A New Secure Transmission Scheme With Outdated Antenna Selection
We propose a new secure transmission scheme in
the multi-input multi-output multi-eavesdropper wiretap channel.
In this channel, the NA-antenna transmitter adopts transmit
antenna selection (TAS) to choose the antenna that maximizes
the instantaneous signal-to-noise ratio (SNR) at the receiver to
transmit, while the NB-antenna receiver and the NE-antenna
eavesdropper adopt maximal-ratio combining (MRC) to combine
the received signals. We focus on the practical scenario where
the channel state information (CSI) during the TAS process is
outdated. In this scenario, we propose a new transmission scheme
to prevent the detrimental effect of the outdated CSI on the
wiretap codes design at the transmitter. To thoroughly assess
the secrecy performance achieved by the proposed scheme, we
derive new closed-form expressions for the exact secrecy outage
probability and the probability of non-zero secrecy capacity for
arbitrary SNRs. We also derive new compact expressions for the
asymptotic secrecy outage probability at high SNRs. Notably,
in the analysis we take spatial correlation at the receiver into
consideration. Apart from the advantage of our scheme over
the conventional TAS/MRC scheme, we demonstrate that the
outdated TAS reduces the secrecy diversity order from NANB
to NB. We also demonstrate that antenna correlation improves
the secrecy performance at low SNR but deteriorates the secrecy
performance at medium and high SNRs, by affecting the secrecy
array gain only.ARC Discovery Projects Grant DP150103905
Secrecy of WSN Data Over Nakagami m Fading Channels with Selection Combining Diversity
We consider the security of wireless sensor network (WSN) data over Nakagami – m fading channels at the physical layer. A WSN in which the fusion center performs selection diversity has been considered for better quality reception. The links between the WSN node and fusion center are assumed to follow Nakagami-m fading distribution. Closed-form expressions for secrecy outage probability (SOP) are derived, and it is established that SOP analysis also leads to the analysis of the existence of secrecy as a special case of SOP. The analytical expressions have been validated through results from simulations. The analysis is valid for all positive real values of the fading parameter, m. The limits on the signal-to-noise ratio can be obtained to secure the transmitted data against eavesdropping with the required SOP and secrecy rate using the analysis presented in this paper
Impact of Correlation and Pointing Error on Secure Outage Performance over Arbitrary Correlated Nakagami Turbulent Fading Mixed RF-FSO Channel
Funding Information: Manuscript received September 8, 2020; revised February 11, 2021; accepted February 14, 2021. Date of publication February 16, 2021; date of current version March 10, 2021. This research was supported in part by the National Research Foundation of Korea grant funded by the Korean government (Ministry of Science and ICT; 2019R1A2C1083988), in part by the Ministry of Science and ICT, Korea, under the Information Technology Research Center support program (IITP-2020-2016-0-00313) supervised by the Institute for Information & Communications Technology Planning & Evaluation, and in part by Sejong University through its faculty research program (20212023). (Sheikh Habibul Islam, A. S. M. Badrud-duza, and S. M. R. Islam contributed equally to this work and co-first authors.) Corresponding authors: A. S. M. Badrudduza; Heejung Yu (e-mail: [email protected]; [email protected]).)Peer reviewedPublisher PD
Joint Spatial and Spectrum Cooperation in Wireless Network.
PhDThe sky-rocketing growth of multimedia infotainment applications and broadband-hungry
mobile devices exacerbate the stringent demand for ultra high data rate and more spectrum resources. Along with it, the unbalanced temporal and geographical variations
of spectrum usage further inspires those spectral-efficient networks, namely, cognitive
radio and heterogeneous cellular networks (HCNs). This thesis focuses on the system
design and performance enhancement of cognitive radio (CR) and HCNs. Three different
aspects of performance improvement are considered, including link reliability of cognitive
radio networks (CNs), security enhancement of CNs, and energy efficiency improvement
of CNs and HCNs.
First, generalized selection combining (GSC) is proposed as an effective receiver design
for interference reduction and reliability improvement of CNs with outdated CSI. A uni-
ed way for deriving the distribution of received signal-to-noise ratio (SNR) is developed
in underlay spectrum sharing networks subject to interference from the primary trans-
mitter (PU-Tx) to the secondary receiver (SU-Rx), maximum transmit power constraint
at the secondary transmitter (SU-Tx), and peak interference power constraint at the
PU receiver (PU-Rx), is developed. Second, transmit antenna selection with receive
generalized selection combining (TAS/GSC) in multi-antenna relay-aided communica-
tion is introduced in CNs under Rayleigh fading and Nakagami-m fading. Based on
newly derived complex statistical properties of channel power gain of TAS/GSC, exact
ergodic capacity and high SNR ergodic capacity are derived over Nakagami-m fading.
Third, beamforming and arti cial noise generation (BF&AN) is introduced as a robust
scheme to enhance the secure transmission of large-scale spectrum sharing networks
with multiple randomly located eavesdroppers (Eves) modeled as homogeneous Poisson
Point Process (PPP). Stochastic geometry is applied to model and analyze the impact of
i
BF&AN on this complex network. Optimal power allocation factor for BF&AN which
maximizes the average secrecy rate is further studied under the outage probability con-
straint of primary network. Fourth, a new wireless energy harvesting protocol is proposed
for underlay cognitive relay networks with the energy-constrained SU-Txs. Exact and
asymptotic outage probability, delay-sensitive throughput, and delay-tolerant through-
put are derived to explore the tradeoff between the energy harvested from the PU-Txs
and the interference caused by the PU-Txs. Fifth, a harvest-then-transmit protocol is
proposed in K-tier HCNs with randomly located multiple-antenna base stations (BSs)
and single antenna mobile terminals (MTs) modeled as homogeneous PPP. The average
received power at MT, the uplink (UL) outage probability, and the UL average ergodic
rate are derived to demonstrate the intrinsic relationship between the energy harvested
from BSs in the downlink (DL) and the MT performance in the UL. Throughout the
thesis, it is shown that link reliability, secrecy performance, and energy efficiency of
CNs and HCNs can be signi cantly leveraged by taking advantage of multiple antennas,
relays, and wireless energy harvesting
Physical Layer Security in Wireless Networks: Design and Enhancement.
PhDSecurity and privacy have become increasingly significant concerns in wireless communication
networks, due to the open nature of the wireless medium which makes the wireless
transmission vulnerable to eavesdropping and inimical attacking. The emergence and
development of decentralized and ad-hoc wireless networks pose great challenges to the
implementation of higher-layer key distribution and management in practice. Against
this background, physical layer security has emerged as an attractive approach for performing
secure transmission in a low complexity manner. This thesis concentrates on
physical layer security design and enhancement in wireless networks.
First, this thesis presents a new unifying framework to analyze the average secrecy
capacity and secrecy outage probability. Besides the exact average secrecy capacity
and secrecy outage probability, a new approach for analyzing the asymptotic behavior is
proposed to compute key performance parameters such as high signal-to-noise ratio slope,
power offset, secrecy diversity order, and secrecy array gain. Typical fading environments
such as two-wave with diffuse power and Nakagami-m are taken into account.
Second, an analytical framework of using antenna selection schemes to achieve secrecy
is provided. In particular, transmit antenna selection and generalized selection combining
are considered including its special cases of selection combining and maximal-ratio
combining.
Third, the fundamental questions surrounding the joint impact of power constraints on
the cognitive wiretap channel are addressed. Important design insights are revealed
regarding the interplay between two power constraints, namely the maximum transmit
at the secondary network and the peak interference power at the primary network.
Fourth, secure single carrier transmission is considered in the two-hop decode-andi
forward relay networks. A two-stage relay and destination selection is proposed to minimize
the eavesdropping and maximize the signal power of the link between the relay and
the destination. In two-hop amplify-and-forward untrusted relay networks, secrecy may
not be guaranteed even in the absence of external eavesdroppers. As such, cooperative
jamming with optimal power allocation is proposed to achieve non-zero secrecy rate.
Fifth and last, physical layer security in large-scale wireless sensor networks is introduced.
A stochastic geometry approach is adopted to model the positions of sensors, access
points, sinks, and eavesdroppers. Two scenarios are considered: i) the active sensors
transmit their sensing data to the access points, and ii) the active access points forward
the data to the sinks. Important insights are concluded
On the Intercept Probability and Secure Outage Analysis of Mixed (α-κ-μ)-Shadowed and Málaga Turbulent Models
This work was supported in part by the National Research Foundation of Korea-Grant funded by the Korean Government (Ministry of Science and ICT) under Grant NRF 2020R1A2B5B02002478, and in part by Sejong University through its Faculty Research Program under Grant 20212023Peer reviewedPublisher PD