304 research outputs found

    A Study Of Cooperative Spectrum Sharing Schemes For Internet Of Things Systems

    Get PDF
    The Internet of Things (IoT) has gained much attention in recent years with the massive increase in the number of connected devices. Cognitive Machine-to-Machine (CM2M) communications is a hot research topic in which a cognitive dimension allows M2M networks to overcome the challenges of spectrum scarcity, interference, and green requirements. In this paper, we propose a Generalized Cooperative Spectrum Sharing (GCSS) scheme for M2M communication. Cooperation extends the coverage of wireless networks as well as increasing their throughput while reducing the energy consumption of the connected low power devices. We study the outage performance of the proposed GCSS scheme for M2M system and derive exact expressions for the outage probability. We also analyze the effect of varying transmission powers on the performance of the system

    Joint Relay Selection and Power Allocation in Large-Scale MIMO Systems with Untrusted Relays and Passive Eavesdroppers

    Full text link
    In this paper, a joint relay selection and power allocation (JRP) scheme is proposed to enhance the physical layer security of a cooperative network, where a multiple antennas source communicates with a single-antenna destination in presence of untrusted relays and passive eavesdroppers (Eves). The objective is to protect the data confidentially while concurrently relying on the untrusted relays as potential Eves to improve both the security and reliability of the network. To realize this objective, we consider cooperative jamming performed by the destination while JRP scheme is implemented. With the aim of maximizing the instantaneous secrecy rate, we derive a new closed-form solution for the optimal power allocation and propose a simple relay selection criterion under two scenarios of non-colluding Eves (NCE) and colluding Eves (CE). For the proposed scheme, a new closed-form expression is derived for the ergodic secrecy rate (ESR) and the secrecy outage probability as security metrics, and a new closed-form expression is presented for the average symbol error rate (SER) as a reliability measure over Rayleigh fading channels. We further explicitly characterize the high signal-to-noise ratio slope and power offset of the ESR to highlight the impacts of system parameters on the ESR. In addition, we examine the diversity order of the proposed scheme to reveal the achievable secrecy performance advantage. Finally, the secrecy and reliability diversity-multiplexing tradeoff of the optimized network are provided. Numerical results highlight that the ESR performance of the proposed JRP scheme for NCE and CE cases is increased with respect to the number of untrustworthy relays.Comment: 18 pages, 10 figures, IEEE Transactions on Information Forensics and Security (In press

    Secure Two-Way Transmission via Wireless-Powered Untrusted Relay and External Jammer

    Get PDF
    In this paper, we propose a two-way secure communication scheme where two transceivers exchange confidential messages via a wireless powered untrusted amplify-and-forward (AF) relay in the presence of an external jammer. We take into account both friendly jamming (FJ) and Gaussian noise jamming (GNJ) scenarios. Based on the time switching (TS) architecture at the relay, the data transmission is done in three phases. In the first phase, both the energy-starved nodes, the untrustworthy relay and the jammer, are charged by non-information radio frequency (RF) signals from the sources. In the second phase, the two sources send their information signals and concurrently, the jammer transmits artificial noise to confuse the curious relay. Finally, the third phase is dedicated to forward a scaled version of the received signal from the relay to the sources. For the proposed secure transmission schemes, we derive new closed-form lower-bound expressions for the ergodic secrecy sum rate (ESSR) in the high signal-to-noise ratio (SNR) regime. We further analyze the asymptotic ESSR to determine the key parameters; the high SNR slope and the high SNR power offset of the jamming based scenarios. To highlight the performance advantage of the proposed FJ, we also examine the scenario of without jamming (WoJ). Finally, numerical examples and discussions are provided to acquire some engineering insights, and to demonstrate the impacts of different system parameters on the secrecy performance of the considered communication scenarios. The numerical results illustrate that the proposed FJ significantly outperforms the traditional one-way communication and the Constellation rotation approach, as well as our proposed benchmarks, the two-way WoJ and GNJ scenarios.Comment: 14 pages, 6 figures, Submitted to IEEE Transactions on Vehicular Technolog

    Physical Layer Security in Wireless Networks: Design and Enhancement.

    Get PDF
    PhDSecurity and privacy have become increasingly significant concerns in wireless communication networks, due to the open nature of the wireless medium which makes the wireless transmission vulnerable to eavesdropping and inimical attacking. The emergence and development of decentralized and ad-hoc wireless networks pose great challenges to the implementation of higher-layer key distribution and management in practice. Against this background, physical layer security has emerged as an attractive approach for performing secure transmission in a low complexity manner. This thesis concentrates on physical layer security design and enhancement in wireless networks. First, this thesis presents a new unifying framework to analyze the average secrecy capacity and secrecy outage probability. Besides the exact average secrecy capacity and secrecy outage probability, a new approach for analyzing the asymptotic behavior is proposed to compute key performance parameters such as high signal-to-noise ratio slope, power offset, secrecy diversity order, and secrecy array gain. Typical fading environments such as two-wave with diffuse power and Nakagami-m are taken into account. Second, an analytical framework of using antenna selection schemes to achieve secrecy is provided. In particular, transmit antenna selection and generalized selection combining are considered including its special cases of selection combining and maximal-ratio combining. Third, the fundamental questions surrounding the joint impact of power constraints on the cognitive wiretap channel are addressed. Important design insights are revealed regarding the interplay between two power constraints, namely the maximum transmit at the secondary network and the peak interference power at the primary network. Fourth, secure single carrier transmission is considered in the two-hop decode-andi forward relay networks. A two-stage relay and destination selection is proposed to minimize the eavesdropping and maximize the signal power of the link between the relay and the destination. In two-hop amplify-and-forward untrusted relay networks, secrecy may not be guaranteed even in the absence of external eavesdroppers. As such, cooperative jamming with optimal power allocation is proposed to achieve non-zero secrecy rate. Fifth and last, physical layer security in large-scale wireless sensor networks is introduced. A stochastic geometry approach is adopted to model the positions of sensors, access points, sinks, and eavesdroppers. Two scenarios are considered: i) the active sensors transmit their sensing data to the access points, and ii) the active access points forward the data to the sinks. Important insights are concluded

    POWER ALLOCATION ALGORITHM FOR MIMO BASED MULTI-HOP COOPERATIVE SENSOR NETWORK

    Get PDF
    Cooperative transmission is a new breed of wireless communication systems that enables the cooperating node in a wireless sensor network to share their radio resources by employing a distributed transmission and processing operation. This new technique offers substantial spatial diversity gains as the cooperating nodes help one another to send data over several independent paths to the destination node. In recent times, an extensive effort has been made to incorporate these systems in the future wireless networks like LTE (Long Term Evolution), IEEE 802.16j (Mobile Multi-hop Relay (MMR) Networks) and IEEE 802.16m (Mobile WiMAX Release 2 or WirelessMAN-Advanced). But, there are few technical issues which need to be addressed before this promising technique is integrated into future wireless networks. Among them, managing transmission power is a critical issue, which needs to be resolved to fully exploit the benefits of cooperative relaying. Optimal Power Allocation, is one such technique that optimally distributes the total transmission power between the source and relaying nodes thus saving a lot of power while maintaining the link quality. In the first part of the thesis, mathematical expressions of the received signals have been derived for different phases of cooperative transmission. Average-Bit-error-rate (ABER), has been taken as a performance metric to show the efficiency of cooperative relaying protocols. In the second part of this Chapter, a multi-hop framework has been presented for the power allocation algorithm with Amplify-and-Forward relaying protocol. The efficiency of the power allocation algorithm has been discussed with different scenarios i.e. First for a three node (2-Hop) wireless network configuration and then for a four node (3-Hop) wireless network configuration. The transmission scenarios (2-Hop and 3-Hop) have been further categorized into multiple cases on the basis of channel quality between source-to-destination, source-to-relay, relay-to-relay and relay-to-destination links.fi=Opinnäytetyö kokotekstinä PDF-muodossa.|en=Thesis fulltext in PDF format.|sv=Lärdomsprov tillgängligt som fulltext i PDF-format

    Outage Probability of Multi-hop Networks with Amplify-and-Forward Full-duplex Relaying

    Get PDF
    abstract: Full-duplex communication has attracted significant attention as it promises to increase the spectral efficiency compared to half-duplex. Multi-hop full-duplex networks add new dimensions and capabilities to cooperative networks by facilitating simultaneous transmission and reception and improving data rates. When a relay in a multi-hop full-duplex system amplifies and forwards its received signals, due to the presence of self-interference, the input-output relationship is determined by recursive equations. This thesis introduces a signal flow graph approach to solve the problem of finding the input-output relationship of a multi-hop amplify-and-forward full-duplex relaying system using Mason's gain formula. Even when all links have flat fading channels, the residual self-interference component due to imperfect self-interference cancellation at the relays results in an end-to-end effective channel that is an all-pole frequency-selective channel. Also, by assuming the relay channels undergo frequency-selective fading, the outage probability analysis is performed and the performance is compared with the case when the relay channels undergo frequency-flat fading. The outage performance of this system is performed assuming that the destination employs an equalizer or a matched filter. For the case of a two-hop (single relay) full-duplex amplify-and-forward relaying system, the bounds on the outage probability are derived by assuming that the destination employs a matched filter or a minimum mean squared error decision feedback equalizer. For the case of a three-hop (two-relay) system with frequency-flat relay channels, the outage probability analysis is performed by considering the output SNR of different types of equalizers and matched filter at the destination. Also, the closed-form upper bounds on the output SNR are derived when the destination employs a minimum mean squared error decision feedback equalizer which is used in outage probability analysis. It is seen that for sufficiently high target rates, full-duplex relaying with equalizers is always better than half-duplex relaying in terms of achieving lower outage probability, despite the higher RSI. In contrast, since full-duplex relaying with MF is sensitive to RSI, it is outperformed by half-duplex relaying under strong RSI.Dissertation/ThesisMasters Thesis Electrical Engineering 201
    • …
    corecore