18 research outputs found

    Secrecy performance analysis on spatial modeling of wireless communications with unmanned aerial vehicle and ground devices

    Get PDF
    In this paper, the secrecy performance of the spatial modeling for ground devices with randomly placed eavesdroppers when an unmanned aerial vehicle (UAV) acted as two hops decode and forward (DF) was investigated. We characterize the secrecy outage probability (SOP) and intercept probability (IP) expressions. Our capacity performance analysis is based on the Rayleigh fading distributions. After analytical results by Monte Carlo simulation, and the Gauss-Chebyshev parameter was selected to yield a close approximation, the results demonstrate the SOP with the average signal-to-noise ratio (SNR) between UAV and ground users among the eavesdroppers and the IP relationship with the ability to intercept the information of the ground users successfully

    Outage performance analysis of cell-center/edge users under two policies of energy harvesting

    Get PDF
    In this paper, two energy harvesting policies deploying in cooperative non-orthogonal multiple access (NOMA) systems are considered. After period of wireless power transfer, the NOMA users including cell-edge and cell-center users simultaneously transmit the superposition coded symbols to the base station (BS). In the last time slot, the BS decodes to achieve its signal based on superposition coded symbol with corresponding power allocation factors. This paper provides exact expressions of outage probability in two schemes. Performance gap of two NOMA users can be raised by providing different power allocation factors. It is confirmed by numerical result. Distance and data rate are main factors affecting outage performance. Scheme I exhibit scenario where power beacon transmits energy signal to NOMA user while the BS feeds energy to NOMA user in Scheme II. It is shown that outage performance of Scheme I is better than that of Scheme II.Web of Science254807

    Exploiting secure performance of full-duplex decode and forward in optimal relay selection networks

    Get PDF
    In the presence of an illegitimate user, we investigate the secrecy outage probability (SOP) of the optimal relay selection (ORS) networks by applying decode-and-forward (DnF) based full-duplex (FD) relaying mode. The closed-form expressions for the allocations of the end-to-end signal-to-interference-plus-noise ratio (SINR) in each wireless network are derived as well as the closed-form expression for the exact SOP of the proposed ORS system is presented under Rayleigh fading schemes. As an important achievement, SOP is also compared between orthogonal multiple access (OMA) and non-orthogonal multiple access (NOMA) schemes. Our results reveal that the SOP of the suggested scheme can be considerably influenced by several parameters involved, including the number of relays, the average signal-to-noise ratio (SNR) of eavesdropper links, transmit power and the average residual self-interference (SI) enforced on the FD relays.Web of Science244767

    UAV based satellite-terrestrial systems with hardware impairment and imperfect SIC: Performance analysis of user pairs

    Get PDF
    We investigated the outage performance of non-orthogonal multiple access (NOMA) in satellite-terrestrial systems which contain hardware impairments. An unmanned aerial vehicle (UAV) was implemented to forward signals from a satellite to users on the ground. A two-user model was applied to achieve spectral efficiency. In practical, real-life scenarios, the UAV and ground users encounter issues with imperfect hardware. We examined the performance gap between two users experiencing practical problems such as hardware impairment and imperfect successive interference cancellation (SIC). To implement a practical scenario, Shadow-Rician fading was adopted in the satellite links, and Rician fading was employed in the terrestrial links for ground users. In the main results, we derived the closed-form expression of the outage probability, and to evaluate the system performance of two NOMA users, we obtained the approximate expressions for high signal-to-noise ratios (SNR). Finally, we produced Monte-Carlo simulations to verify the analytical expressions and demonstrate the effect of the main system parameters, such as the number of transmit antennas on the satellite, transmit SNR, and level of hardware impairment on the system performance metric.Web of Science911793711792

    Enabling D2D Transmission Mode with Energy Harvesting and Information Transfer in Heterogeneous Networks

    Get PDF
    The concept of energy harvesting-assisted relay has been introduced to support the relaying transmission using Device-to-Device (D2D) communications for enhancing communication reliability. Motivated by the recent advance in Heterogeneous Network (HetNet) using relaying techniques, we consider the D2D communication provided by Energy Harvesting (EH) assisted relay where signal is forwarded from a Base Station (BS) to the conventional cellular user (non-D2D user) and D2D user. We first derive the outage probability by taking into account the SNR and power allocation parameters, and propose the transmission mode for D2D link as well as non-D2D link. After deriving the outage probability of the D2D-HetNet, we explore the effects of the network parameters on the outage probability and throughput

    SECURE PERFORMANCE ANALYSIS OF ADAPTIVE ENERGY HARVESTING ENABLED RELAYING NETWORKS

    Get PDF
    In this paper, the impact of the jamming signal on the secrecy performance of Energy Harvesting (EH) enabled dual-hop amplify-and-forward relaying network is investigated. First, the security outage probability analysis is studied for conventional networks under a single passive eavesdropper attack. Then, the outage performance analysis in two cases regarding energy harvesting is investigated. Moreover, the proposed work enhances Physical Layer (PHY) security performance of two-hop relaying model using Cooperative Jamming Dual-Hop Techniques (CJDH). For this purpose, new closed-form expressions are derived for the outage probability of CJDH model in the presence of interference over Rayleigh fading channels. A power allocation optimization problem for energy harvesting protocol is formulated and solved for enhancing the system security. The derived analytical formulas herein are supported by numerical and simulation results to clarify the main contributions of the paper

    ATLAS Run 1 searches for direct pair production of third-generation squarks at the Large Hadron Collider

    Get PDF

    Power beacon-based wireless power transfer in MISO/SISO: An application in device-to-device networks

    No full text
    This paper considers device-to-device (D2D) together with single input single output and multiple input single output models in transmitting of nearby devices under help of wireless power transfer. To support more harvested energy, two modes are studied in which multiple-antenna/single antenna power beacons are proposed to robust D2D transmission network. Especially, enhanced successful communication is explored with short distance transmission. Accordingly, the alternative energy source can be used to maintain small devices which can operate at close position efficiently. In this paper, a model of radio frequency-assisted wireless energy transfer for D2D system with two realistic transmission schemes will be investigated, namely pure D2D and D2D with interference impact of conventional user equipment. As an important result, we derive analytical expressions for outage probability to achieve performance evaluation. This paper will analyze outage probability by matching Monte-Carlo and analytical simulations to corroborate the exactness of derived expressions.Web of Science110140238

    Secure performance analysis of adaptive energy harvesting enabled relaying networks

    No full text
    In this paper, the impact of the jamming signal on the secrecy performance of Energy Harvesting (EH) enabled dual-hop amplify-and-forward relaying network is investigated. First, the security outage probability analysis is studied for conventional networks under a single passive eavesdropper attack. Then, the outage performance analysis in two cases regarding energy harvesting is investigated. Moreover, the proposed work enhances Physical Layer (PHY) security performance of two-hop relaying model using Cooperative Jamming Dual-Hop Techniques (CJDH). For this purpose, new closed-form expressions are derived for the outage probability of CJDH model in the presence of interference over Rayleigh fading channels. A power allocation optimization problem for energy harvesting protocol is formulated and solved for enhancing the system security. The derived analytical formulas herein are supported by numerical and simulation results to clarify the main contributions of the paper.Web of Science13124052403
    corecore