35 Hits in 7.0 sec

Secrecy wireless information and power transfer: challenges and opportunities

Xiaoming Chen, Derrick Wing Kwan Ng, Hsiao-Hwa Chen
2016 IEEE wireless communications  
Finally, we discuss several potential research directions to further enhance the security in SWIPT systems.  ...  Furthermore, we provide a survey on a variety of physical layer security techniques to improve secrecy performance.  ...  Secrecy Outage Capacity In this section, we focus on the analysis of secrecy outage capacity in the considered DF M-MIMO secure relaying system.  ... 
doi:10.1109/mwc.2016.7462485 fatcat:iulwdifunjhtnoyi5mwnc3xclq

Physical Layer Security of WPCNs With Imperfect CSI and Full-duplex Receiver Aided Jamming

Mu Li, Hao Yin, Yuzhen Huang, Yan Wang, Rui Yu
2019 IEEE Access  
In this paper, we investigate the secrecy performance of wireless powered communication networks (WPCNs) faced by multiple passive eavesdroppers, where the full-duplex (FD) receiver utilizes the harvested  ...  Moreover, we adopt a practical maximal ratio transmission (MRT) scheme at the transmitter taking into account the impact of imperfect CSI to try to improve the transmission efficiency of the considered  ...  In [15] , a single-antenna SWIPT system with FD scheme was proposed to enhance the secrecy performance of information transmission and the analytical expressions for connect outage probability (COP),  ... 
doi:10.1109/access.2019.2913210 fatcat:2etwkvqtnbgbtfmsh72azarz4u

A Study of Physical Layer Security in SWIPT-Based Decode-And-Forward Relay Networks with Dynamic Power Splitting

Van-Duc Phan, Tan N. Nguyen, Anh Vu Le, Miroslav Voznak
2021 Sensors  
We consider a system model including one transmitter that tries to transmit information to one receiver under the help of multiple relay users and in the presence of one eavesdropper that attempts to overhear  ...  In this paper, we study the physical layer security for simultaneous wireless information and power transfer (SWIPT)-based half-duplex (HD) decode-and-forward relaying system.  ...  Outage Probability (OP) Analysis In this section, the outage probability of the SWIPT-aided HD DF relaying system over Rayleigh fading channels is derived.  ... 
doi:10.3390/s21175692 pmid:34502582 pmcid:PMC8433674 fatcat:f2ezcq6fyzcxjgwenaic4c547i

2018 IndexIEEE Wireless Communications LettersVol. 7

2018 IEEE Wireless Communications Letters  
., +, LWC June 2018 328-331 Extending the ITU-R P.530 Deep-Fading Outage Probability Results to SIMO-MRC and MIMO-MRC Line-of-Sight Systems.  ...  ., +, LWC Aug. 2018 498-501 Extending the ITU-R P.530 Deep-Fading Outage Probability Results to SIMO-MRC and MIMO-MRC Line-of-Sight Systems.  ... 
doi:10.1109/lwc.2018.2888676 fatcat:olfvetmkt5bt3c572e5y76b5pm

An Adaptive-Harvest-Then-Transmit Protocol for Wireless Powered Communications: Multiple Antennas System and Performance Analysis

2017 KSII Transactions on Internet and Information Systems  
The system outage capacity and ergodic capacity are evaluated for performance analysis. Furthermore, the optimal power allocation is also considered.  ...  In order to take advantage of multiple antennas, two different linear processing schemes, including Maximum Ratio Combining (MRC) and Selection Combination (SC) are studied.  ...  In [19] , an impactful SWIPT scheme for boosting secrecy rate has been taken into consideration under the impact of external eavesdroppers.  ... 
doi:10.3837/tiis.2017.04.004 fatcat:aghhb5pdendyhfzizkl2mqdqye

Secrecy performance of a multi-NOMA-MIMO system in the UEH relaying network using the PSO algorithm

Le Thi Anh, Ic Pyo Hong
2020 IEEE Access  
In this network, a source communicates with users with the help of a relaying network composed of multiple untrusted components using the amplify-and-forward (AF) protocol.  ...  To evaluate the secrecy performance of each user and the overall system, we derive the closed-form expressions of the secrecy outage probability (SOP) over the Rayleigh fading channels and use a Monte  ...  MOTIVATION AND CONTRIBUTIONS To the best of our knowledge, there are no reports in the literature on the investigations of secrecy outage performance for a cooperative NOMA/MIMO system using MRT/MRC with  ... 
doi:10.1109/access.2020.3047674 fatcat:h42nbxte5vet7fk36g6wlabnaa

Secure Multiuser Communications in Wireless Sensor Networks with TAS and Cooperative Jamming

Maoqiang Yang, Bangning Zhang, Yuzhen Huang, Nan Yang, Daoxing Guo, Bin Gao
2016 Sensors  
Numerical results are provided to verify the theoretical analysis and illustrate the impact of key system parameters on the secrecy performance.  ...  We then derive the exact closed-form expressions for the secrecy outage probability and the effective secrecy throughput of both schemes to characterize the secrecy performance.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/s16111908 pmid:27845753 pmcid:PMC5134567 fatcat:fv5tfnq2ifdgjh5226bhcwlusi

On Secure Underlay MIMO Cognitive Radio Networks With Energy Harvesting and Transmit Antenna Selection

Hongjiang Lei, Ming Xu, Imran Shafique Ansari, Gaofeng Pan, Khalid A. Qaraqe, Mohamed-Slim Alouini
2017 IEEE Transactions on Green Communications and Networking  
In this paper, we consider an underlay multipleinput-multiple-output (MIMO) cognitive radio network (CRN) including a pair of primary nodes, a couple of secondary nodes, and an eavesdropper, where the  ...  Based on whether the channel state information (CSI) of wiretap links are available or not, the secrecy outage performance of the optimal antenna selection (OAS) scheme and suboptimal antenna selection  ...  The secrecy outage performance of cognitive SWIPT was investigated where the EH receivers act as eavesdroppers in [29] .  ... 
doi:10.1109/tgcn.2017.2684827 dblp:journals/tgcn/LeiXAPQA17 fatcat:tifwnhair5ba7pifi74sns22hi

Physical Layer Security for 5G Wireless Networks: A Comprehensive Survey

José David Vega Sánchez, Luis Urquiza-Aguiar, Martha Cecilia Paredes Paredes
2019 Zenodo  
This paper provides a comprehensive review of information-theoretic measures of the secrecy performance in physical layer security.  ...  The main idea of physical layer security is to take advantage of the features of the wireless channel and its impairments in order to ensure secure communication in the physical layer.  ...  antennas [54] , performance analysis of wireless communications in a multi-user massive MIMO by considering imperfect CSI [55] , secrecy outage probability analysis performance for massive MIMO scenarios  ... 
doi:10.5281/zenodo.3532040 fatcat:lct4ai7lf5hzpmepwqwv6e72t4

Impact of Correlation and Pointing Error on Secure Outage Performance over Arbitrary Correlated Nakagami-m and M-Turbulent Fading Mixed RF-FSO Channel

Sheikh Habibul Islam, A. S. M. Badrudduza, S. M. Riazul Islam, Fardin Ibne Shahid, Imran Shafique Ansari, Milton Kumar Kundu, Heejung Yu
2021 IEEE Photonics Journal  
In this paper, a secrecy rate of wiretap channels with a single source, relay, destination, and eavesdropper is analyzed under practical environments with the aforementioned impairments.  ...  We derive novel closed-form expressions for secrecy outage probability (SOP) and strictly positive secrecy capacity (SPSC) considering heterodyne detection (HD) and intensity modulation with direct detection  ...  A SWIPT system was considered in [38] , where the signal branches were combined using the MRC scheme.  ... 
doi:10.1109/jphot.2021.3059805 fatcat:jnpmrxqsvnfovaerbnpakv6cje

Robust Artificial Noise-Aided Secure Beamforming in Wireless-Powered Non-Regenerative Relay Networks

Bin Li, Zesong Fei, Hongbin Chen
2016 IEEE Access  
Assuming imperfect channel state information from the source/relay to the destination/eavesdropper, we investigate the artificial noise-aided secure robust beamformer that minimize the transmission power  ...  In this paper, we consider a non-regenerative relay network supporting simultaneous wireless information and power transfer, in which the energy harvesting relay is powered by radio-frequency signals from  ...  In practical communication systems, the CSI associated with destination/eavesdropper is difficult to perfectly obtain at the transmitter due to the lack of cooperation with hostile eavesdroppers, imperfect  ... 
doi:10.1109/access.2016.2627002 fatcat:qki35c5qwjbmtan5sbsabrvjuq

On secure system performance over SISO, MISO and MIMO-NOMA wireless networks equipped a multiple antenna based on TAS protocol

Thanh-Nam Tran, Miroslav Voznak
2020 EURASIP Journal on Wireless Communications and Networking  
The results of analysis of users in these three scenarios were obtained in an approximate closed form by using the Gaussian-Chebyshev quadrature method.  ...  This study investigated and compared the outage probability (OP) and system throughput assuming all users were over Rayleigh fading channels. The individual scenarios also each had an eavesdropper.  ...  The research leading to these results received funding from the Czech Ministry of Education, Youth and Sports under grant No. SP2019/41 conducted at VSB -Technical University of Ostrava.  ... 
doi:10.1186/s13638-019-1586-y fatcat:pzp5hlaxfzee5asoqkcak3dpsq

Wireless powered large-scale multi-antenna AF relaying for cooperative jamming-aided secrecy

Hong Xing, Yansha Deng, Kai-Kit Wong, Arumugam Nallanathan
2016 2016 IEEE 17th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC)  
This paper studies the secrecy transmission with the aid of a large-scale multi-antenna amplify-and-forward (AF) relay wireless powered by the source.  ...  Assuming that the eavesdroppers in the proximity are distributed as Poisson point process (PPP), no channel state information (CSI) but the density of which is known to the relay, the ergodic secrecy rate  ...  SYSTEM MODEL In this paper, we consider secrecy transmission with the aid of a multi-antenna AF relay in a SWIPT system, where the transmitter (Tx) sends confidential message to the legitimate Rx far away  ... 
doi:10.1109/spawc.2016.7536864 dblp:conf/spawc/XingDWN16 fatcat:76nwvxxeizdbnhtzbodsgs2tw4

Survey on Physical Layer Security for 5G Wireless Networks [article]

José David Vega Sánchez, Luis Urquiza-Aguiar, Martha Cecilia Paredes Paredes, Diana Pamela Moya Osorio
2020 arXiv   pre-print
This work introduces a comprehensive review of the main information-theoretic metrics used to measure the secrecy performance in physical layer security.  ...  The idea of physical layer security is to take advantage of the features of the propagation medium and its impairments to ensure secure communication in the physical layer.  ...  [79] , performance analysis of wireless communications in a multi-user massive MIMO by using imperfect CSI [80] , and SOP analysis for massive MIMO scenarios [81] .  ... 
arXiv:2006.08044v1 fatcat:r5l25bicwjhanidz3qu7bbi4mi

Secrecy Performance Analysis of Mixed Hyper-Gamma and Gamma-Gamma Cooperative Relaying System

Noor Ahmad Sarker, A. S. M. Badrudduza, S.M. Riazul Islam, Sheikh Habibul Islam, Imran Shafique Ansari, Milton Kumar Kundu, Mst. Fateha Samad, Md. Biplob Hossain, Heejung Yu
2020 IEEE Access  
A Nakagami-m-Málaga faded SWIPT system was employed in [41] .  ...  Another multihop system with low altitude aerial platform (LAP) relaying technique was designed in [17] for outage analysis.  ...  Fateha has been working in the area of Nanotechnology, Telecommunication, and Biomedical Engineering for last ten years and she has published a number of research papers on those fields.  ... 
doi:10.1109/access.2020.3009026 fatcat:ogr44ye6ynh3bk6htmoflk35ki
« Previous Showing results 1 — 15 out of 35 results