374 research outputs found
Secrecy performance of TAS/SC-based multi-hop harvest-to-transmit cognitive WSNs under joint constraint of interference and hardware imperfection
In this paper, we evaluate the secrecy performance of multi-hop cognitive wireless sensor networks (WSNs). In the secondary network, a source transmits its data to a destination via the multi-hop relaying model using the transmit antenna selection (TAS)/selection combining (SC) technique at each hop, in the presence of an eavesdropper who wants to receive the data illegally. The secondary transmitters, including the source and intermediate relays, have to harvest energy from radio-frequency signals of a power beacon for transmitting the source data. Moreover, their transmit power must be adjusted to satisfy the quality of service (QoS) of the primary network. Under the joint impact of hardware imperfection and interference constraint, expressions for the transmit power for the secondary transmitters are derived. We also derive exact and asymptotic expressions of secrecy outage probability (SOP) and probability of non-zero secrecy capacity (PNSC) for the proposed protocol over Rayleigh fading channel. The derivations are then verified by Monte Carlo simulations.Web of Science195art. no. 116
A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead
Physical layer security which safeguards data confidentiality based on the
information-theoretic approaches has received significant research interest
recently. The key idea behind physical layer security is to utilize the
intrinsic randomness of the transmission channel to guarantee the security in
physical layer. The evolution towards 5G wireless communications poses new
challenges for physical layer security research. This paper provides a latest
survey of the physical layer security research on various promising 5G
technologies, including physical layer security coding, massive multiple-input
multiple-output, millimeter wave communications, heterogeneous networks,
non-orthogonal multiple access, full duplex technology, etc. Technical
challenges which remain unresolved at the time of writing are summarized and
the future trends of physical layer security in 5G and beyond are discussed.Comment: To appear in IEEE Journal on Selected Areas in Communication
Performance enhancement solutions in wireless communication networks
In this dissertation thesis, we study the new relaying protocols for different wireless network systems. We analyze and evaluate an efficiency of the transmission in terms of the outage probability over Rayleigh fading channels by mathematical analyses. The theoretical analyses are verified by performing Monte Carlo simulations.
First, we study the cooperative relaying in the Two-Way Decode-and-Forward (DF) and multi-relay DF scheme for a secondary system to obtain spectrum access along with a primary system. In particular, we proposed the Two-Way DF scheme with Energy Harvesting, and the Two-Way DF Non-orthogonal Multiple Access (NOMA) scheme with digital network coding. Besides, we also investigate the wireless systems with multi-relay; the best relay selection is presented to optimize the effect of the proposed scheme. The transmission protocols of the proposed schemes EHAF (Energy Harvesting Amplify and Forward) and EHDF (Energy Harvesting Decode and Forward) are compared together in the same environment and in term of outage probability. Hence, with the obtained results, we conclude that the proposed schemes improve the performance of the wireless cooperative relaying systems, particularly their throughput.
Second, we focus on investigating the NOMA technology and proposing the optimal solutions (protocols) to advance the data rate and to ensure the Quality of Service (QoS) for the users in the next generation of wireless communications. In this thesis, we propose a Two-Way DF NOMA scheme (called a TWNOMA protocol) in which an intermediate relay helps two source nodes to communicate with each other. Simulation and analysis results show that the proposed protocol TWNOMA is improving the data rate when comparing with a conventional Two-Way scheme using digital network coding (DNC) (called a TWDNC protocol), Two-Way scheme without using DNC (called a TWNDNC protocol) and Two-Way scheme in amplify-and-forward(AF) relay systems (called a TWANC protocol).
Finally, we considered the combination of the NOMA and physical layer security (PLS) in the Underlay Cooperative Cognitive Network (UCCN). The best relay selection strategy is investigated, which uses the NOMA and considers the PLS to enhance the transmission efficiency and secrecy of the new generation wireless networks.V této dizertační práci je provedena studie nových přenosových protokolů pro různé bezdrátové síťové systémy. S využitím matematické analýzy jsme analyzovali a vyhodnotili efektivitu přenosu z hlediska pravděpodobnosti výpadku přes Rayleighův kanál. Teoretické analýzy jsou ověřeny provedenými simulacemi metodou Monte Carlo.
Nejprve došlo ke studii kooperativního přenosu ve dvoucestném dekóduj-a-předej (Two-Way Decode-and-Forward–TWDF) a vícecestném DF schématu s větším počtem přenosových uzlů pro sekundární systém, kdy takto byl získán přístup ke spektru spolu s primárním systémem. Konkrétně jsme navrhli dvoucestné DF schéma se získáváním energie a dvoucestné DF neortogonální schéma s mnohonásobným přístupem (Non-orthogonal Multiple Access–NOMA) s digitálním síťovým kódováním. Kromě toho rovněž zkoumáme bezdrátové systémy s větším počtem přenosových uzlů, kde je přítomen výběr nejlepšího přenosového uzlu pro optimalizaci efektivnosti navrženého schématu. Přenosové protokoly navržených schémat EHAF (Energy Harvesting Amplify and Forward) a EHDF(Energy Harvesting Decode and Forward) jsou společně porovnány v identickém prostředí z pohledu pravděpodobnosti výpadku. Následně, na základě získaných výsledků, jsme dospěli k závěru, že navržená schémata vylepšují výkonnost bezdrátových kooperativních systémů, konkrétně jejich propustnost.
Dále jsme se zaměřili na zkoumání NOMA technologie a navrhli optimální řešení (protokoly) pro urychlení datového přenosu a zajištění QoS v další generaci bezdrátových komunikací. V této práci jsme navrhli dvoucestné DF NOMA schéma (nazýváno jako TWNOMA protokol), ve kterém mezilehlý přenosový uzel napomáhá dvěma zdrojovým uzlům komunikovat mezi sebou. Výsledky simulace a analýzy ukazují, že navržený protokol TWNOMA vylepšuje dosaženou přenosovou rychlost v porovnání s konvenčním dvoucestným schématem používajícím DNC (TWDNC protokol), dvoucestným schématem bez použití DNC (TWNDNC protokol) a dvoucestným schématem v zesil-a-předej (amplify-and-forward) přenosových systémech (TWANC protokol).
Nakonec jsme zvážili využití kombinace NOMA a zabezpečení fyzické vrstvy (Physical Layer Security–PLS) v podpůrné kooperativní kognitivní síti (Underlay Cooperative Cognitive Network–UCCN). Zde je zde zkoumán výběr nejlepšího přenosového uzlu, který užívá NOMA a bere v úvahu PLS pro efektivnější přenos a zabezpečení nové generace bezdrátových sítí.440 - Katedra telekomunikační technikyvyhově
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
Power Efficient and Secure Full-Duplex Wireless Communication Systems
In this paper, we study resource allocation for a full-duplex (FD) radio base
station serving multiple half-duplex (HD) downlink and uplink users
simultaneously. The considered resource allocation algorithm design is
formulated as a non-convex optimization problem taking into account minimum
required receive signal-to-interference-plus-noise ratios (SINRs) for downlink
and uplink communication and maximum tolerable SINRs at potential
eavesdroppers. The proposed optimization framework enables secure downlink and
uplink communication via artificial noise generation in the downlink for
interfering the potential eavesdroppers. We minimize the weighted sum of the
total downlink and uplink transmit power by jointly optimizing the downlink
beamformer, the artificial noise covariance matrix, and the uplink transmit
power. We adopt a semidefinite programming (SDP) relaxation approach to obtain
a tractable solution for the considered problem. The tightness of the SDP
relaxation is revealed by examining a sufficient condition for the global
optimality of the solution. Simulation results demonstrate the excellent
performance achieved by the proposed scheme and the significant transmit power
savings enabled optimization of the artificial noise covariance matrix.Comment: 6 pages, invited paper, IEEE Conference on Communications and Network
Security (CNS) 2015 in Florence, Italy, on September 30, 201
On secure system performance over SISO, MISO and MIMO-NOMA wireless networks equipped a multiple antenna based on TAS protocol
This study examined how to improve system performance by equipping multiple antennae at a base station (BS) and all terminal users/mobile devices instead of a single antenna as in previous studies. Experimental investigations based on three NOMA down-link models involved (1) a single-input-single-output (SISO) scenario in which a single antenna was equipped at a BS and for all users, (2) a multi-input-single-output (MISO) scenario in which multiple transmitter antennae were equipped at a BS and a single receiver antenna for all users and (3) a multi-input-multi-output (MIMO) scenario in which multiple transmitter antennae were equipped at a BS and multiple receiver antenna for all users. This study investigated and compared the outage probability (OP) and system throughput assuming all users were over Rayleigh fading channels. The individual scenarios also each had an eavesdropper. Secure system performance of the individual scenarios was therefore also investigated. In order to detect data from superimposed signals, successive interference cancellation (SIC) was deployed for users, taking into account perfect, imperfect and fully imperfect SICs. The results of analysis of users in these three scenarios were obtained in an approximate closed form by using the Gaussian-Chebyshev quadrature method. However, the clearly and accurately presented results obtained using Monte Carlo simulations prove and verify that the MIMO-NOMA scenario equipped with multiple antennae significantly improved system performance.Web of Science20201art. no. 1
- …