725 research outputs found

    Secure Multiuser Communications in Wireless Sensor Networks with TAS and Cooperative Jamming

    Get PDF
    In this paper, we investigate the secure transmission in wireless sensor networks (WSNs) consisting of one multiple-antenna base station (BS), multiple single-antenna legitimate users, one single-antenna eavesdropper and one multiple-antenna cooperative jammer. In an effort to reduce the scheduling complexity and extend the battery lifetime of the sensor nodes, the switch-and-stay combining (SSC) scheduling scheme is exploited over the sensor nodes. Meanwhile, transmit antenna selection (TAS) is employed at the BS and cooperative jamming (CJ) is adopted at the jammer node, aiming at achieving a satisfactory secrecy performance. Moreover, depending on whether the jammer node has the global channel state information (CSI) of both the legitimate channel and the eavesdropper's channel, it explores a zero-forcing beamforming (ZFB) scheme or a null-space artificial noise (NAN) scheme to confound the eavesdropper while avoiding the interference to the legitimate user. Building on this, we propose two novel hybrid secure transmission schemes, termed TAS-SSC-ZFB and TAS-SSC-NAN, for WSNs. We then derive the exact closed-form expressions for the secrecy outage probability and the effective secrecy throughput of both schemes to characterize the secrecy performance. Using these closed-form expressions, we further determine the optimal switching threshold and obtain the optimal power allocation factor between the BS and jammer node for both schemes to minimize the secrecy outage probability, while the optimal secrecy rate is decided to maximize the effective secrecy throughput for both schemes. Numerical results are provided to verify the theoretical analysis and illustrate the impact of key system parameters on the secrecy performance.This work was supported by the National Science Foundation of China (No. 61501507), and the Jiangsu Provincial Natural Science Foundation of China (No. BK20150719). The work of Nan Yang is supported by the Australian Research Council Discovery Project (DP150103905)

    Analysis of probability of non-zero secrecy capacity for multi-hop networks in presence of hardware impairments over Nakagami-m fading channels

    Get PDF
    In this paper, we evaluate probability of non-zero secrecy capacity of multi-hop relay networks over Nakagamim fading channels in presence of hardware impairments. In the considered protocol, a source attempts to transmit its data to a destination by using multi-hop randomize-and-forward (RF) strategy. The data transmitted by the source and relays are overheard by an eavesdropper. For performance evaluation, we derive exact expressions of probability of non-zero secrecy capacity (PoNSC), which are expressed by sums of infinite series of exponential functions and exponential integral functions. We then perform Monte Carlo simulations to verify the theoretical analysis.Web of Science25478277

    Green Cellular Networks: A Survey, Some Research Issues and Challenges

    Full text link
    Energy efficiency in cellular networks is a growing concern for cellular operators to not only maintain profitability, but also to reduce the overall environment effects. This emerging trend of achieving energy efficiency in cellular networks is motivating the standardization authorities and network operators to continuously explore future technologies in order to bring improvements in the entire network infrastructure. In this article, we present a brief survey of methods to improve the power efficiency of cellular networks, explore some research issues and challenges and suggest some techniques to enable an energy efficient or "green" cellular network. Since base stations consume a maximum portion of the total energy used in a cellular system, we will first provide a comprehensive survey on techniques to obtain energy savings in base stations. Next, we discuss how heterogeneous network deployment based on micro, pico and femto-cells can be used to achieve this goal. Since cognitive radio and cooperative relaying are undisputed future technologies in this regard, we propose a research vision to make these technologies more energy efficient. Lastly, we explore some broader perspectives in realizing a "green" cellular network technologyComment: 16 pages, 5 figures, 2 table

    Secure Multiple Amplify-and-Forward Relaying Over Correlated Fading Channels

    Get PDF
    This paper quantifies the impact of correlated fading on secure communication of multiple amplify-and-forward (AF) relaying networks. In such a network, the base station (BS) is equipped with multiple antennas and communicates with the destination through multiple AF relays, while the message from the relays can be overheard by an eavesdropper. We focus on the practical communication scenario, where the main and eavesdropper’s channels are correlated. In order to enhance the transmission security, transmit antenna selection (TAS) is performed at the BS, and the best relay is chosen according to the full or partial relay selection criterion, which relies on the dualhop relay channels or the second-hop relay channels, respectively. For these criteria, we study the impact of correlated fading on the network secrecy performance, by deriving an analytical approximation for the secrecy outage probability (SOP) and an asymptotic expression for the high main-to-eavesdropper ratio (MER). From these results, it is concluded that the channel correlation is always beneficial to the secrecy performance of full relay selection. However, it deteriorates the secrecy performance if partial relay selection is used, when the number of antennas at the BS is less than the number of relays.ARC Discovery Projects Grant DP150103905

    Analysis of Probability of Non-zero Secrecy Capacity for Multi-hop Networks in Presence of Hardware Impairments over Nakagami-m Fading Channels

    Get PDF
    In this paper, we evaluate probability of non-zero secrecy capacity of multi-hop relay networks over Nakagami-m fading channels in presence of hardware impairments. In the considered protocol, a source attempts to transmit its data to a destination by using multi-hop randomize-and-forward (RF) strategy. The data transmitted by the source and relays are overheard by an eavesdropper. For performance evaluation, we derive exact expressions of probability of non-zero secrecy capacity (PoNSC), which are expressed by sums of infinite series of exponential functions and exponential integral functions. We then perform Monte Carlo simulations to verify the theoretical analysis

    Hybrid satellite–terrestrial networks toward 6G : key technologies and open issues

    Get PDF
    Future wireless networks will be required to provide more wireless services at higher data rates and with global coverage. However, existing homogeneous wireless networks, such as cellular and satellite networks, may not be able to meet such requirements individually, especially in remote terrain, including seas and mountains. One possible solution is to use diversified wireless networks that can exploit the inter-connectivity between satellites, aerial base stations (BSs), and terrestrial BSs over inter-connected space, ground, and aerial networks. Hence, enabling wireless communication in one integrated network has attracted both the industry and the research fraternities. In this work, we provide a comprehensive survey of the most recent work on hybrid satellite–terrestrial networks (HSTNs), focusing on system architecture, performance analysis, design optimization, and secure communication schemes for different cooperative and cognitive HSTN network architectures. Different key technologies are compared. Based on this comparison, several open issues for future research are discussed
    corecore