9 research outputs found

    Physical security with power beacon assisted in half-duplex relaying networks over Rayleigh fading channel: performance analysis

    Get PDF
    In this research, we proposed and investigated physical security with power beacon assisted in half-duplex relaying networks over a Rayleigh fading channel. In this model, the source (S) node communicates with the destination (D) node via the helping of the intermediate relay (R) node. The D and R nodes harvest energy from the power beacon (PB) node in the presence of a passive eavesdropper (E) node. Then we derived the integral form of the system outage probability (OP) and closed form of the intercept probability (IP). The correctness of the analytical of the OP and IP is verified by the Monte Carlo simulation. The influence of the main system parameters on the OP and IP also is investigated. The research results indicated that the analytical results are the same as the simulation ones

    Secured green communication scheme for interference alignment based networks

    Get PDF
    In this paper, a new security and green communication scheme is proposed to the Interference-Alignment (IA) based networks. To achieve a secured communication, full-duplex receivers are utilized to transmit artificial noise (AN). Both the signals and the ANs are used to harvest energy to realize green communication. For these reasons, the feasible conditions of this scheme are analyzed first. Secondly, the average transmission rate, the secrecy performance and the harvested energy are investigated. Thirdly, an optimization scheme of simultaneous wireless information and power transfer (SWIPT) is given to optimize the information transmission and the energy harvesting efficiency. Meanwhile, an improved IA iteration algorithm is designed to eliminate both the AN and the interference. Furthermore, relay cooperation is considered and its system performance is analyzed. The simulations show that the target average transmission rate is not affected by AN, while the secrecy performance can be greatly improved. The energy harvesting efficiency is also better than the traditional schemes. As expected, the average transmission rate further is improved with the relay cooperation

    Optimization techniques for reliable data communication in multi-antenna wireless systems

    Get PDF
    This thesis looks at new methods of achieving reliable data communication in wireless communication systems using different antenna transmission optimization methods. In particular, the problems of exploitation of MIMO communication channel diversity, secure downlink beamforming techniques, adaptive beamforming techniques, resource allocation methods, simultaneous power and information transfer and energy harvesting within the context of multi-antenna wireless systems are addressed

    Physical layer security solutions against passive and colluding eavesdroppers in large wireless networks and impulsive noise environments

    Get PDF
    Wireless networks have experienced rapid evolutions toward sustainability, scalability and interoperability. The digital economy is driven by future networked societies to a more holistic community of intelligent infrastructures and connected services for a more sustainable and smarter society. Furthermore, an enormous amount of sensitive and confidential information, e.g., medical records, electronic media, financial data, and customer files, is transmitted via wireless channels. The implementation of higher layer key distribution and management was challenged by the emergence of these new advanced systems. In order to resist various malicious abuses and security attacks, physical layer security (PLS) has become an appealing alternative. The basic concept behind PLS is to exploit the characteristics of wireless channels for the confidentiality. Its target is to blind the eavesdroppers such that they cannot extract any confidential information from the received signals. This thesis presents solutions and analyses to improve the PLS in wireless networks. In the second chapter, we investigate the secrecy capacity performance of an amplify-andforward (AF) dual-hop network for both distributed beamforming (DBF) and opportunistic relaying (OR) techniques. We derive the capacity scaling for two large sets; trustworthy relays and untrustworthy aggressive relays cooperating together with a wire-tapper aiming to intercept the message. We show that the capacity scaling in the DBF is lower bounded by a value which depends on the ratio between the number of the trustworthy and the untrustworthy aggressive relays, whereas the capacity scaling of OR is upper bounded by a value depending on the number of relays as well as the signal to noise ratio (SNR). In the third chapter, we propose a new location-based multicasting technique, for dual phase AF large networks, aiming to improve the security in the presence of non-colluding passive eavesdroppers. We analytically demonstrate that the proposed technique increases the security by decreasing the probability of re-choosing a sector that has eavesdroppers, for each transmission time. Moreover, we also show that the secrecy capacity scaling of our technique is the same as for broadcasting. Hereafter, the lower and upper bounds of the secrecy outage probability are calculated, and it is shown that the security performance is remarkably enhanced, compared to the conventional multicasting technique. In the fourth chapter, we propose a new cooperative protocol, for dual phase amplify-andforward large wireless sensor networks, aiming to improve the transmission security while taking into account the limited capabilities of the sensor nodes. In such a network, a portion of the K relays can be potential passive eavesdroppers. To reduce the impact of these untrustworthy relays on the network security, we propose a new transmission protocol, where the source agrees to share with the destination a given channel state information (CSI) of source-trusted relay-destination link to encode the message. Then, the source will use this CSI again to map the right message to a certain sector while transmitting fake messages to the other sectors. Adopting such a security protocol is promising because of the availability of a high number of cheap electronic sensors with limited computational capabilities. For the proposed scheme, we derived the secrecy outage probability (SOP) and demonstrated that the probability of receiving the right encoded information by an untrustworthy relay is inversely proportional to the number of sectors. We also show that the aggressive behavior of cooperating untrusted relays is not effective compared to the case where each untrusted relay is trying to intercept the transmitted message individually. Fifth and last, we investigate the physical layer security performance over Rayleigh fading channels in the presence of impulsive noise, as encountered, for instance, in smart grid environments. For this scheme, secrecy performance metrics were considered with and without destination assisted jamming at the eavesdropper’s side. From the obtained results, it is verified that the SOP, without destination assisted jamming, is flooring at high signal-to-noise-ratio values and that it can be significantly improved with the use of jamming
    corecore