29 research outputs found

    Impact of Correlation and Pointing Error on Secure Outage Performance over Arbitrary Correlated Nakagami Turbulent Fading Mixed RF-FSO Channel

    Get PDF
    Funding Information: Manuscript received September 8, 2020; revised February 11, 2021; accepted February 14, 2021. Date of publication February 16, 2021; date of current version March 10, 2021. This research was supported in part by the National Research Foundation of Korea grant funded by the Korean government (Ministry of Science and ICT; 2019R1A2C1083988), in part by the Ministry of Science and ICT, Korea, under the Information Technology Research Center support program (IITP-2020-2016-0-00313) supervised by the Institute for Information & Communications Technology Planning & Evaluation, and in part by Sejong University through its faculty research program (20212023). (Sheikh Habibul Islam, A. S. M. Badrud-duza, and S. M. R. Islam contributed equally to this work and co-first authors.) Corresponding authors: A. S. M. Badrudduza; Heejung Yu (e-mail: [email protected]; [email protected]).)Peer reviewedPublisher PD

    On the Intercept Probability and Secure Outage Analysis of Mixed (α-κ-μ)-Shadowed and Málaga Turbulent Models

    Get PDF
    This work was supported in part by the National Research Foundation of Korea-Grant funded by the Korean Government (Ministry of Science and ICT) under Grant NRF 2020R1A2B5B02002478, and in part by Sejong University through its Faculty Research Program under Grant 20212023Peer reviewedPublisher PD

    Determination of optically stimulated luminescence dosimetric characteristics and suitability for entrance surface dose assessement in diagnostic x-ray examinations

    Get PDF
    The availability of Optically Stimulated Luminescence (OSL) dosimeter system developed by Landauer Inc. (Glenwood IL) has greatly improved radiation dosimetry application in the medical field. Recent studies with OSL dosimeters (nanoDots) gave much emphases to patient radiation exposure in radiotherapy but ignoring the potential risks from radiographic examinations. This study focused on the measurement of entrance surface dose (ESD) resulting from radiographic examination. Monitoring procedures have been developed by the International Atomic Energy Agency (IAEA) to estimate ESD, while considering exposure parameters and patient’s characteristics. However, dosimetric properties of the OSL system must be characterized to ascertain its suitability for ESD measurements in medical radiography due to energy dependence and over-response factors of the Al2O3 material. This thesis consists of three phases: 1) evaluating stability of the new OSL dosimetry system, 2) characterizing the nanoDots in radiographic energy range from 40 kV to 150 kV with typical doses ranging from 0 to 20 mGy, and 3) assessing suitability of the nanoDots for ESD measurement in routine X-ray examinations. The dosimetric characteristics of the nanoDots in the above energy range are presented in this study, including repeatability, reproducibility, signal depletion, element correction factor, linearity, angular and energy dependence, and dose measurement accuracy. Experimental results showed repeatability of below 5% and reproducibility of less than 2%. OSL signals after sequential readouts were reduced by approximately 0.5% per readout and having good linearity for doses between 5 – 20 mGy. The nanoDots OSL dosimeter showed significant angular and energy dependence in this energy range, and corresponding energy correction factors were determined in the range of 0.76 – 1.12. ESDs were determined in common diagnostic X-ray examinations using three different methods including direct (measured on phantom/patient) and indirect (without phantom) measurements with nanoDots OSL dosimeters, and CALDose_X 5.0 software calculations. Results from direct and indirect ESD measurements showed good agreement within relative uncertainties of 5.9% and 12%, respectively, in accordance with the International Electrotechnical Commission (IEC) 61674 specifications. However, the measured results were below ESDs calculated with CALDose_X 5.0 software. Measured eye and gonad doses were found to be significant compared to ESDs during anterior-posterior (AP) abdomen and AP skull examinations, respectively. The results obtained in this research work indicate the suitability of utilizing nanoDots OSL dosimeter for entrance surface dose assessment during diagnostic X-ray examinations

    Beamforming and non-orthogonal multiple access for rate and secrecy enhancement of fifth generation communication system

    Get PDF
    The fifth-generation (5G) communication systems have many anticipated functionalities and requirements such as high data rate, massive connectivity, wide coverage area, low latency and enhanced secrecy performance. In order to meet these criteria, communication schemes that combine 5G key enabling technologies need to be investigated. In this thesis, a novel communication system that merges non-orthogonal multiple access (NOMA), energy harvesting, beamforming, and full-duplex (FD) techniques in order to enhance both capacity and secrecy of 5G system is introduced. In the capacity improving scheme, NOMA is first combined with beamforming to serve more than one user in each beamforming vector. Next, simultaneous wireless information and power transfer (SWIPT) technique is exploited to encourage the strong user (user with better channel condition) to relay the information messages of the weak user (user with poor channel condition) in FD manner. The total sum rate maximisation problem is formulated and solved by means of convex-concave procedure. The system performance is also analysed by deriving the outage probability of both users. Additionally, the model is extended to a more general case wherein the users are moving, and the outage probability of this dynamic topology is provided by means of the stochastic geometry framework. Novel secure schemes are also introduced to safeguard legitimate users’ information from internal and external eavesdroppers. In the internal eavesdropper’s case, artificial signal concept is adopted to protect NOMA’s weak user’s information from being intercepted by the strong user. The secrecy outage probability of theweak user is derived and validated. In addition, game theory discipline is exploited to provide an efficient eavesdropping avoidance algorithm. Null-steering beamforming is adopted in the external eavesdropper’s case in two different schemes namely self and nonself-cooperative jamming. In self-cooperative strategy, the base station applies the null-steering jamming to impair the eavesdropper channel, while sending the information-bearing signals to the intended legitimate users. Whereas in the nonself-cooperative jamming scheme, the base station provides the helpers with the required information and power by means of SWIPT technique in the first phase. The helpers deploy null-steering beamforming to jam the eavesdropper during the information exchange between the base station and the intended users in the second phase. The secrecy outage probability of the legitimate users is derived in both jamming schemes. Game theory is also introduced to the nonself-cooperative jamming scheme for further improvements on the secrecy outage behaviour and the economic revenue of the system. The proposed capacity enhancing scheme demonstrates about 200% higher sum rate when compared with the non-cooperative and half-duplex cooperative NOMA systems. In addition, the novel secure scheme in the internal eavesdropper case is proven to enhance the information security of the weak user without compromising the functionalities of the strong user or NOMA superiority over orthogonal multiple access systems. Null-steering based jamming system also illustrates improved secrecy performance in the external eavesdropper case when compared to the conventional jamming schemes. Numerical simulations are carried out in order to validate the derived closed-form expressions and to illustrate the performance enhancement achieved by the proposed schemes where the rate is increased by 200% and the secrecy outage probability is decreased by 33% when compared to the baseline systems

    Physical layer security solutions against passive and colluding eavesdroppers in large wireless networks and impulsive noise environments

    Get PDF
    Wireless networks have experienced rapid evolutions toward sustainability, scalability and interoperability. The digital economy is driven by future networked societies to a more holistic community of intelligent infrastructures and connected services for a more sustainable and smarter society. Furthermore, an enormous amount of sensitive and confidential information, e.g., medical records, electronic media, financial data, and customer files, is transmitted via wireless channels. The implementation of higher layer key distribution and management was challenged by the emergence of these new advanced systems. In order to resist various malicious abuses and security attacks, physical layer security (PLS) has become an appealing alternative. The basic concept behind PLS is to exploit the characteristics of wireless channels for the confidentiality. Its target is to blind the eavesdroppers such that they cannot extract any confidential information from the received signals. This thesis presents solutions and analyses to improve the PLS in wireless networks. In the second chapter, we investigate the secrecy capacity performance of an amplify-andforward (AF) dual-hop network for both distributed beamforming (DBF) and opportunistic relaying (OR) techniques. We derive the capacity scaling for two large sets; trustworthy relays and untrustworthy aggressive relays cooperating together with a wire-tapper aiming to intercept the message. We show that the capacity scaling in the DBF is lower bounded by a value which depends on the ratio between the number of the trustworthy and the untrustworthy aggressive relays, whereas the capacity scaling of OR is upper bounded by a value depending on the number of relays as well as the signal to noise ratio (SNR). In the third chapter, we propose a new location-based multicasting technique, for dual phase AF large networks, aiming to improve the security in the presence of non-colluding passive eavesdroppers. We analytically demonstrate that the proposed technique increases the security by decreasing the probability of re-choosing a sector that has eavesdroppers, for each transmission time. Moreover, we also show that the secrecy capacity scaling of our technique is the same as for broadcasting. Hereafter, the lower and upper bounds of the secrecy outage probability are calculated, and it is shown that the security performance is remarkably enhanced, compared to the conventional multicasting technique. In the fourth chapter, we propose a new cooperative protocol, for dual phase amplify-andforward large wireless sensor networks, aiming to improve the transmission security while taking into account the limited capabilities of the sensor nodes. In such a network, a portion of the K relays can be potential passive eavesdroppers. To reduce the impact of these untrustworthy relays on the network security, we propose a new transmission protocol, where the source agrees to share with the destination a given channel state information (CSI) of source-trusted relay-destination link to encode the message. Then, the source will use this CSI again to map the right message to a certain sector while transmitting fake messages to the other sectors. Adopting such a security protocol is promising because of the availability of a high number of cheap electronic sensors with limited computational capabilities. For the proposed scheme, we derived the secrecy outage probability (SOP) and demonstrated that the probability of receiving the right encoded information by an untrustworthy relay is inversely proportional to the number of sectors. We also show that the aggressive behavior of cooperating untrusted relays is not effective compared to the case where each untrusted relay is trying to intercept the transmitted message individually. Fifth and last, we investigate the physical layer security performance over Rayleigh fading channels in the presence of impulsive noise, as encountered, for instance, in smart grid environments. For this scheme, secrecy performance metrics were considered with and without destination assisted jamming at the eavesdropper’s side. From the obtained results, it is verified that the SOP, without destination assisted jamming, is flooring at high signal-to-noise-ratio values and that it can be significantly improved with the use of jamming

    Enhancing physical layer security in wireless networks with cooperative approaches

    Get PDF
    Motivated by recent developments in wireless communication, this thesis aims to characterize the secrecy performance in several types of typical wireless networks. Advanced techniques are designed and evaluated to enhance physical layer security in these networks with realistic assumptions, such as signal propagation loss, random node distribution and non-instantaneous channel state information (CSI). The first part of the thesis investigates secret communication through relay-assisted cognitive interference channel. The primary and secondary base stations (PBS and SBS) communicate with the primary and secondary receivers (PR and SR) respectively in the presence of multiple eavesdroppers. The SBS is allowed to transmit simultaneously with the PBS over the same spectrum instead of waiting for an idle channel. To improve security, cognitive relays transmit cooperative jamming (CJ) signals to create additional interferences in the direction of the eavesdroppers. Two CJ schemes are proposed to improve the secrecy rate of cognitive interference channels depending on the structure of cooperative relays. In the scheme where the multiple-antenna relay transmits weighted jamming signals, the combined approach of CJ and beamforming is investigated. In the scheme with multiple relays transmitting weighted jamming signals, the combined approach of CJ and relay selection is analyzed. Numerical results show that both these two schemes are effective in improving physical layer security of cognitive interference channel. In the second part, the focus is shifted to physical layer security in a random wireless network where both legitimate and eavesdropping nodes are randomly distributed. Three scenarios are analyzed to investigate the impact of various factors on security. In scenario one, the basic scheme is studied without a protected zone and interference. The probability distribution function (PDF) of channel gain with both fading and path loss has been derived and further applied to derive secrecy connectivity and ergodic secrecy capacity. In the second scenario, we studied using a protected zone surrounding the source node to enhance security where interference is absent. Both the cases that eavesdroppers are aware and unaware of the protected zone boundary are investigated. Based on the above scenarios, further deployment of the protected zones at legitimate receivers is designed to convert detrimental interference into a beneficial factor. Numerical results are investigated to check the reliability of the PDF for reciprocal of channel gain and to analyze the impact of protected zones on secrecy performance. In the third part, physical layer security in the downlink transmission of cellular network is studied. To model the repulsive property of the cellular network planning, we assume that the base stations (BSs) follow the Mat´ern hard-core point process (HCPP), while the eavesdroppers are deployed as an independent Poisson point process (PPP). The distribution function of the distances from a typical point to the nodes of the HCPP is derived. The noise-limited and interference-limited cellular networks are investigated by applying the fractional frequency reuse (FFR) in the system. For the noise-limited network, we derive the secrecy outage probability with two different strategies, i.e. the best BS serve and the nearest BS serve, by analyzing the statistics of channel gains. For the interference-limited network with the nearest BS serve, two transmission schemes are analyzed, i.e., transmission with and without the FFR. Numerical results reveal that both the schemes of transmitting with the best BS and the application of the FFR are beneficial for physical layer security in the downlink cellular networks, while the improvement du

    Secure SWIPT by Exploiting Constructive Interference and Artificial Noise

    Get PDF
    This paper studies interference exploitation techniques for secure beamforming design in simultaneous wireless information and power transfer (SWIPT) in multiple-input single-output (MISO) systems. In particular, multiuser interference (MUI) and artificially generated noise signals are designed as constructive to the information receivers (IRs) yet kept disruptive to potential eavesdropping by the energy receivers (ERs). The objective is to improve the received signal-to-interference and noise ratio (SINR) at the IRs by exploiting the MUI and AN power in an attempt to minimize the total transmit power. We first propose second-order cone programming based solutions for the perfect channel state information (CSI) case by defining strong upper and lower bounds on the energy harvesting (EH) constraints. We then provide semidefinite programming based solutions for the problems. In addition, we also solve the worst-case harvested energy maximization problem under the proposed bounds. Finally, robust beamforming approaches based on the above are derived for the case of imperfect CSI. Our results demonstrate that the proposed constructive interference precoding schemes yield huge saving in transmit power over conventional interference management schemes. Most importantly, they show that, while the statistical constraints of conventional approaches may lead to instantaneous SINR as well as EH outages, the instantaneous constraints of our approaches guarantee both constraints at every symbol period
    corecore