163 research outputs found

    Secrecy performance of TAS/SC-based multi-hop harvest-to-transmit cognitive WSNs under joint constraint of interference and hardware imperfection

    Get PDF
    In this paper, we evaluate the secrecy performance of multi-hop cognitive wireless sensor networks (WSNs). In the secondary network, a source transmits its data to a destination via the multi-hop relaying model using the transmit antenna selection (TAS)/selection combining (SC) technique at each hop, in the presence of an eavesdropper who wants to receive the data illegally. The secondary transmitters, including the source and intermediate relays, have to harvest energy from radio-frequency signals of a power beacon for transmitting the source data. Moreover, their transmit power must be adjusted to satisfy the quality of service (QoS) of the primary network. Under the joint impact of hardware imperfection and interference constraint, expressions for the transmit power for the secondary transmitters are derived. We also derive exact and asymptotic expressions of secrecy outage probability (SOP) and probability of non-zero secrecy capacity (PNSC) for the proposed protocol over Rayleigh fading channel. The derivations are then verified by Monte Carlo simulations.Web of Science195art. no. 116

    Performance of export-oriented small and medium-sized manufacturing enterprises in Viet Nam

    Get PDF
    The study recommends the formulation of policies that support the development of business linkages and networking, and which promote subcontracting arrangements between small and large enterprises or between domestic firms and foreign investment enterprises. It is also necessary to support and facilitate the direct involvement of SMMEs in exporting or indirectly through large manufacturing enterprises.Export-oriented, SME,SMME, Viet Nam

    Rateless codes-based secure communication employing transmit antenna selection and harvest-to-jam under joint effect of interference and hardware impairments

    Get PDF
    In this paper, we propose a rateless codes-based communication protocol to provide security for wireless systems. In the proposed protocol, a source uses the transmit antenna selection (TAS) technique to transmit Fountain-encoded packets to a destination in presence of an eavesdropper. Moreover, a cooperative jammer node harvests energy from radio frequency (RF) signals of the source and the interference sources to generate jamming noises on the eavesdropper. The data transmission terminates as soon as the destination can receive a sufficient number of the encoded packets for decoding the original data of the source. To obtain secure communication, the destination must receive sufficient encoded packets before the eavesdropper. The combination of the TAS and harvest-to-jam techniques obtains the security and efficient energy via reducing the number of the data transmission, increasing the quality of the data channel, decreasing the quality of the eavesdropping channel, and supporting the energy for the jammer. The main contribution of this paper is to derive exact closed-form expressions of outage probability (OP), probability of successful and secure communication (SS), intercept probability (IP) and average number of time slots used by the source over Rayleigh fading channel under the joint impact of co-channel interference and hardware impairments. Then, Monte Carlo simulations are presented to verify the theoretical results.Web of Science217art. no. 70

    Analysis of probability of non-zero secrecy capacity for multi-hop networks in presence of hardware impairments over Nakagami-m fading channels

    Get PDF
    In this paper, we evaluate probability of non-zero secrecy capacity of multi-hop relay networks over Nakagamim fading channels in presence of hardware impairments. In the considered protocol, a source attempts to transmit its data to a destination by using multi-hop randomize-and-forward (RF) strategy. The data transmitted by the source and relays are overheard by an eavesdropper. For performance evaluation, we derive exact expressions of probability of non-zero secrecy capacity (PoNSC), which are expressed by sums of infinite series of exponential functions and exponential integral functions. We then perform Monte Carlo simulations to verify the theoretical analysis.Web of Science25478277

    Performance of cluster-based cognitive multihop networks under joint impact of hardware noises and non-identical primary co-channel interference

    Get PDF
    In this paper, we evaluate outage probability (OP) of a cluster-based multi-hop protocol operating on an underlay cognitive radio (CR) mode. The primary network consists of multiple independent transmit/receive pairs, and the primary transmitters seriously cause co-channel interference (CCI) to the secondary receivers. To improve the outage performance for the secondary network under the joint impact of the CCI and hardware imperfection, we employ the best relay selection at each hop. Moreover, the destination is equipped with multiple antennas and uses the selection combining (SC) technique to enhance the reliability of the data transmission at the last hop. For performance evaluation, we first derive an exact formula of OP for the primary network which is used to calculate the transmit power of the secondary transmitters. Next, an exact closed-form expression of the end-to-end OP for the secondary network is derived over Rayleigh fading channels. We then perform Monte-Carlo simulations to validate the derivations. The results present that the CCI caused by the primary operations significantly impacts on the outage performance of the secondary network

    Energy harvesting-based spectrum access with incremental cooperation, relay selection and hardware noises

    Get PDF
    In this paper, we propose an energy harvesting (EH)-based spectrum access model in cognitive radio (CR) network. In the proposed scheme, one of available secondary transmitters (STs) helps a primary transmitter (PT) forward primary signals to a primary receiver (PR). Via the cooperation, the selected ST finds opportunities to access licensed bands to transmit secondary signals to its intended secondary receiver (SR). Secondary users are assumed to be mobile, hence, optimization of energy consumption for these users is interested. The EH STs have to harvest energy from the PT's radio-frequency (RF) signals to serve the PTPR communication as well as to transmit their signals. The proposed scheme employs incremental relaying technique in which the PR only requires the assistance from the STs when the transmission between PT and PR is not successful. Moreover, we also investigate impact of hardware impairments on performance of the primary and secondary networks. For performance evaluation, we derive exact and lower-bound expressions of outage probability (OP) over Rayleigh fading channel. Monte-Carlo simulations are performed to verify the theoretical results. The results present that the outage performance of both networks can be enhanced by increasing the number of the ST-SR pairs. In addition, the outage performance of both primary and secondary networks is severely degraded with the increasing of hardware impairment level. It is also shown that fraction of time used for EH and positions of the secondary users significantly impact on the system performance.Web of Science26125024

    Secrecy performance enhancement for underlay cognitive radio networks employing cooperative multi-hop transmission with and without presence of hardware impairments

    Get PDF
    In this paper, we consider a cooperative multi-hop secured transmission protocol to underlay cognitive radio networks. In the proposed protocol, a secondary source attempts to transmit its data to a secondary destination with the assistance of multiple secondary relays. In addition, there exists a secondary eavesdropper who tries to overhear the source data. Under a maximum interference level required by a primary user, the secondary source and relay nodes must adjust their transmit power. We first formulate effective signal-to-interference-plus-noise ratio (SINR) as well as secrecy capacity under the constraints of the maximum transmit power, the interference threshold and the hardware impairment level. Furthermore, when the hardware impairment level is relaxed, we derive exact and asymptotic expressions of end-to-end secrecy outage probability over Rayleigh fading channels by using the recursive method. The derived expressions were verified by simulations, in which the proposed scheme outperformed the conventional multi-hop direct transmission protocol.Web of Science212art. no. 21

    Fisher information estimation using neural networks

    Get PDF
    In estimation theory, the Fisher information matrix (FIM) is a fundamental concept from which we can infer the well-known Cramér-Rao bound. A closed-form expression of the FIM is often intractable due to the lack or sophistication of statistical models. In this paper, we propose a Fisher Information Neural Estimator (FINE) based on neural networks and a relation between the f-divergence and the Fisher information. The proposed method produces an estimate of the FIM directly from observed data. It does not require knowledge or an estimate of the probability density function (pdf), and is therefore universally applicable. The proposed FINE is applicable for not only deterministic parameters but also random parameters. We show via numerical results that the proposed FINE can provide a highly-accurate FIM estimate with a low-computational complexity. Furthermore, we also propose an accelerated FINE version which can be used for scenarios with a high parameter dimension. Finally, we develop an algorithm to choose an appropriate size of the employed neural networks

    An Online Distributed Boundary Detection and Classification Algorithm for Mobile Sensor Networks

    Get PDF
    We present a novel online distributed boundary detection and classification algorithm in order to improve accuracy of boundary detection and classification for mobile sensor networks. This algorithm is developed by incorporating a boundary detection algorithm and our newly proposed boundary error correction algorithm. It is a fully distributed algorithm based on the geometric approach allowing to remove boundary errors without recursive process and global synchronization. Moreover, the algorithm allows mobile nodes to identify their states corresponding to their positions in network topologies, leading to self-classification of interior and exterior boundaries of network topologies. We have demonstrated effectiveness ofthis algorithm in both simulation and real-world experiments and proved that the accuracy of the ratio of correctly identified nodes over the total number of nodes is 100%

    New primitives of controlled elements F2/4 for block ciphers

    Get PDF
    This paper develops the cipher design approach based on the use of data-dependent operations (DDOs). A new class of DDO based on the advanced controlled elements (CEs) is introduced, which is proven well suited to hardware implementations for FPGA devices. To increase the hardware implementation efficiency of block ciphers, while using contemporary FPGA devices there is proposed an approach to synthesis of fast block ciphers, which uses the substitution-permutation network constructed on the basis of the controlled elements F2/4 implementing the 2 x 2 substitutions under control of the four-bit vector. There are proposed criteria for selecting elements F2/4 and results on investigating their main cryptographic properties. It is designed a new fast 128-bit block cipher MM-128 that uses the elements F2/4 as elementary building block. The cipher possesses higher performance and requires less hardware resources for its implementation on the bases of FPGA devices than the known block ciphers. There are presented result on differential analysis of the cipher MM-12
    corecore