10 research outputs found
Can Artificial Noise Boost Further the Secrecy of Dual-hop RIS-aided Networks?
In this paper, we quantify the physical layer security of a dual-hop
regenerative relaying-based wireless communication system assisted by
reconfigurable intelligent surfaces (RISs). In particular, the setup consists
of a source node communicating with a destination node via a regenerative
relay. In this setup, a RIS is installed in each hop to increase the
source-relay and relay-destination communications reliability, where the RISs'
phase shifts are subject to quantization errors. The legitimate transmission is
performed under the presence of a malicious eavesdropper attempting to
compromise the legitimate transmissions by overhearing the broadcasted signal
from the relay. To overcome this problem, we incorporate a jammer to increase
the system's secrecy by disrupting the eavesdropper through a broadcasted
jamming signal. Leveraging the well-adopted Gamma and Exponential distributions
approximations, the system's secrecy level is quantified by deriving
approximate and asymptotic expressions of the secrecy intercept probability
(IP) metric in terms of the main network parameters. The results show that the
secrecy is enhanced significantly by increasing the jamming power and/or the
number of reflective elements (REs). In particular, an IP of approximately
can be reached with REs and dB of jamming power-to-noise
ratio even when the legitimate links' average signal-to-noise ratios are
-dB less than the eavesdropper's one. We show that cooperative jamming is
very helpful in strong eavesdropping scenarios with a fixed number of REs, and
the number of quantization bits does not influence the secrecy when exceeding
bits. All the analytical results are endorsed by Monte Carlo simulations
Expanding Boundaries: Cross-Media Routing for Seamless Underwater and Aerial Communication
The colossal evolution of wireless communication technologies over the past
few years has driven increased interest in its integration in a variety of
less-explored environments, such as the underwater medium. In this magazine
paper, we present a comprehensive discussion on a novel concept of routing
protocol known as cross-media routing, incorporating the marine and aerial
interfaces. In this regard, we discuss the limitation of single-media routing
and advocate the need for cross-media routing along with the current status of
research development in this direction. To this end, we also propose a novel
cross-media routing protocol known as bubble routing for autonomous marine
systems where different sets of AUVs, USVs, and airborne nodes are considered
for the routing problem. We evaluate the performance of the proposed routing
protocol by using the two key performance metrics, i.e., packet delivery ratio
(PDR) and end-to-end delay. Moreover, we delve into the challenges encountered
in cross-media routing, unveiling exciting opportunities for future research
and innovation. As wireless communication expands its horizons to encompass the
underwater and aerial domains, understanding and addressing these challenges
will pave the way for enhanced cross-media communication and exploration.Comment: Submitted to IEEE Communications Magazin
Physical Layer Security of a Dual-Hop Regenerative Mixed RF/UOW System
Ensuring physical layer security is a crucial task in conventional and emerging communication systems, which are typically characterized by stringent quality of service and security requirements. This also accounts for wireless technologies in the context of the Internet of Things paradigm, which are expected to exhibit considerably increased computational complexity. Based on this, the present contribution investigates the secrecy outage performance of a dual-hop decode-and-forward (DF) mixed radio-frequency/underwater optical wireless communication (RF/UOWC) system. Such wireless network configurations are particularly useful in efficient and demanding scenarios, such as military communications. Therefore, our analysis considers one single-antenna source node communicating with one legitimate destination node via a DF relay node equipped with multiple antennas for reception. Particularly, the relay receives the incoming signal from S via an RF link, applies selection-combining (SC) technique, fully decodes it, re-encodes it and then forwards it to the destination via a UOWC link. The communication is performed under the eavesdropper's attempt to intercept the hop (RF side). In this context, a closed-form expression for the secrecy outage probability is derived along with a thorough asymptotic analysis in the high SNR regime, based on which the achievable diversity order is provided. The offered results provide useful insights on the impact of some key system and channel parameters on the secrecy outage performance, such as the number of eavesdroppers, the number of relay antennas, fading severity parameters of RF links, and water turbulence severity of the UOWC link. The conducted analysis shows that the secrecy outage probability is dominated only by the link in the high SNR regime, regardless of the parameters, such as the number of relay antennas and the average SNR at the relay branches. The offered analytic results are corroborated with respective results from computer simulations. Since these parameters are closely related with the computational complexity at the involved terminals, the offered insights are useful for the design and deployment of such systems.acceptedVersionPeer reviewe
Analysis of Asymmetric Dual-Hop Energy Harvesting-Based Wireless Communication Systems in Mixed Fading Environments
This work investigates the performance of a dual-hop energy harvesting-based fixed-gain amplify-and-forward relaying communication system, subject to fading impairments. We consider a source node (S) communicating with a destination node (D), either directly or through a fixed distant relay (R), which harvests energy from its received signals and uses it to amplify and forward the received signals to D. We also consider maximal-ratio combining at D to combine the signals coming from S and R. Both power-splitting and time-switching energy harvesting protocols are investigated. The S-R link is modeled by Nakagami-m fading model, while the R-D and S-D links experience α-μ fading. Closed-form expressions for the statistical properties of the total signal-to-noise ratio are derived, based on which novel closed-form expressions are then derived for the average symbol error rate as well as for the average channel capacity, considering four different adaptive transmission policies. The derived expressions are validated through Monte Carlo simulations.acceptedVersionPeer reviewe
Analysis of Asymmetric Dual-Hop Energy Harvesting-Based Wireless Communication Systems in Mixed Fading Environments
This work investigates the performance of a dual-hop energy harvesting-based fixed-gain amplify-and-forward relaying communication system, subject to fading impairments. We consider a source node (S) communicating with a destination node (D), either directly or through a fixed distant relay (R), which harvests energy from its received signals and uses it to amplify and forward the received signals to D. We also consider maximal-ratio combining at D to combine the signals coming from S and R. Both power-splitting and time-switching energy harvesting protocols are investigated. The S-R link is modeled by Nakagami-m fading model, while the R-D and S-D links experience α-μ fading. Closed-form expressions for the statistical properties of the total signal-to-noise ratio are derived, based on which novel closed-form expressions are then derived for the average symbol error rate as well as for the average channel capacity, considering four different adaptive transmission policies. The derived expressions are validated through Monte Carlo simulations.Peer reviewe
Recommended from our members
Physical layer security for authentication, confidentiality, and malicious node detection: a paradigm shift in securing IoT networks
The pervasiveness of commercial Internet of Things (IoT) around the globe is expected to reach significant levels with the upcoming sixth generation of mobile networks (6G). Throughout the past years, wireless standardization units worldwide have been prominently active in the deployment and performance optimization of such IoT networks and fusing them with current and futuristic cellular networks. Nonetheless, the openness of wireless transmissions and the forecasted overwhelm in connected devices will provoke unprecedented security leakages and vulnerabilities. In addition to the key targets of the 6G and IoT, it has been of paramount importance to cater to decent and lightweight security mechanisms in ultra-massively connected heterogeneous networks. Recently, significant efforts have been made to pave the way for the integration of physical layer security (PLS) in contemporary and futuristic networks. The primary motivation behind its deployment resides in its low complexity and ability to provide information-theoretic secure transmissions, which alleviates the complexity burden caused by implementing complex cryptographic schemes. This survey overviews the recent advancement in PLS techniques with a particular interest in its application to the Internet of Things (IoT). We review essentially recent PLS techniques aiming at ensuring message confidentiality along with node/message authentication and malicious nodes’ detection, where their corresponding application scenarios and underlying pros and cons are discussed. On top of that, we explore recent findings in the incorporation of cutting-edge technologies at the physical layer, such as non-orthogonal multiple-access, reconfigurable intelligent surfaces, joint communication and sensing, and optical wireless/Terahertz communications in boosting confidentiality and authentication at the physical layer. Lastly, promising extensions and future directions are discussed based on the quantified pros and cons of each PLS category, opening up ways for timely research directions within the topic and current/future challenges faced by PLS