ترغب بنشر مسار تعليمي؟ اضغط هنا

On the Secrecy Performance and Power Allocation in Relaying Networks with Untrusted Relay in the Partial Secrecy Regime

93   0   0.0 ( 0 )
 نشر من قبل Diana Pamela Moya Osorio
 تاريخ النشر 2019
  مجال البحث هندسة إلكترونية
والبحث باللغة English




اسأل ChatGPT حول البحث

Recently, three useful secrecy metrics based on the partial secrecy regime were proposed to analyze secure transmissions on wireless systems over quasi-static fading channels, namely: generalized secrecy outage probability, average fractional equivocation, and average information leakage. These metrics were devised from the concept of fractional equivocation, which is related to the decoding error probability at the eavesdropper, so as to provide a comprehensive insight on the practical implementation of wireless systems with different levels of secrecy requirements. Considering the partial secrecy regime, in this paper we examine the secrecy performance of an amplify-and-forward relaying network with an untrusted relay node, where a destination-based jamming is employed to enable secure transmissions. In this regard, a closed-form approximation is derived for the generalized secrecy outage probability, and integral-form expressions are obtained for the average fractional equivocation and the average information leakage rate. Additionally, equal and optimal power allocation schemes are investigated and compared for the three metrics. From this analysis, we show that different power allocation approaches lead to different system design criteria. The obtained expressions are validated via Monte Carlo simulations.



قيم البحث

اقرأ أيضاً

In this paper, incremental decode-and-forward (IDF) and incremental selective decode-and-forward (ISDF) relaying are proposed to improve the spectral efficiency of power line communication. Contrary to the traditional decode-and-forward (DF) relaying , IDF and ISDF strategies utilize the relay only if the direct link ceases to attain a certain information rate, thereby improving the spectral efficiency. The path gain through the power line is assumed to be log-normally distributed with high distance-dependent attenuation and the additive noise is from a Bernoulli-Gaussian process. Closed-form expressions for the outage probability, and approximate closed-form expressions for the end-to-end average channel capacity and the average bit error rate for binary phase-shift keying are derived. Furthermore, a closed-form expression for the fraction of times the relay is in use is derived as a measure of the spectral efficiency. Comparative analysis of IDF and ISDF with traditional DF relaying is presented. It is shown that IDF is a specific case of ISDF and can obtain optimal spectral efficiency without compromising the outage performance. By employing power allocation to minimize the outage probability, it is realized that the power should be allocated in accordance with the inter-node distances and channel parameters.
By observing the fact that moving in a straight line is a common flying behavior of unmanned aerial vehicles (UAVs) in normal applications, e.g., power line inspections, and air patrols along with highway/streets/borders, in this paper we investigate the secrecy outage performance of a UAV system with linear trajectory, where a UAV ($S$) flies in a straight line and transmits its information over the downlink to a legitimate receiver ($D$) on the ground while an eavesdropping UAV ($E$) trying to overhear the information delivery between $S$ and $D$. Meanwhile, some information is delivered to $S$ over the uplink from $D$, such as commanding messages to control $S$s detecting operations, which can also be eavesdropped by $E$. The locations of $S$, $D$, and $E$ are randomly distributed. We first characterize the statistical characteristics (including cumulative distribution functions and probability density function) of the received signal-to-noise ratio over both downlink and uplink, and then the closed-form analytical expressions for the lower boundary of the secrecy outage probability of both downlink and uplink have also been derived accordingly. Finally, Monte-Carlo simulations are given to testify our proposed analytical models.
Employing reconfigurable intelligent surfaces (RIS) is emerging as a game-changer candidate, thanks to their unique capabilities in improving the power efficiency and supporting the ubiquity of future wireless communication systems. Conventionally, a wireless network design has been limited to the communicating end points, i.e., the transmitter and the receiver. In general, we take advantage of the imposed channel state knowledge to manipulate the transmitted signal and to improve the detection quality at the receiver. With the aid of RISs, and to some extent, the propagation channel has become a part of the design problem. In this paper, we consider a single-input single-output cooperative network and investigate the effect of using RISs in enhancing the physical layer security of the system. Specifically, we formulate an optimization problem to study the effectiveness of the RIS in improving the system secrecy by introducing a weighted variant of the secrecy capacity definition. Numerical simulations are provided to show the design trade-offs and to present the superiority of RIS-assisted networks over the conventional ones in terms of the systems secrecy performance.
52 - Qian Wang , Zhi Chen , 2018
Mobile relaying is emerged as a promising technique to assist wireless communication, driven by the rapid development of unmanned aerial vehicles (UAVs). In this paper, we study secure transmission in a four-node (source, destination, mobile relay, a nd eavesdropper) system, wherein we focus on maximizing the secrecy rate via jointly optimizing the relay trajectory and the source/relay transmit power. Nevertheless, due to the coupling of the trajectory designing and the power allocating, the secrecy rate maximization (SRM) problem is intractable to solve. Accordingly, we propose an alternating optimization (AO) approach, wherein the trajectory designing and the power allocating are tackled in an alternating manner. Unfortunately, the trajectory designing is a nonconvex problem, and thus is still hard to solve. To circumvent the nonconvexity, we exploit sequential convex programming (SCP) to derive an iterative algorithm, which is proven to converge to a Karush-Kuhn-Tucker (KKT) point of the trajectory design problem. The simulation results demonstrate the efficacy of the joint power and trajectory design in improving the secrecy throughput.
This paper investigates the physical-layer security for a random indoor visible light communication (VLC) network with imperfect channel state information (CSI) and a protected zone. The VLC network consists of three nodes, i.e., a transmitter (Alice ), a legitimate receiver (Bob), and an eavesdropper (Eve). Alice is fixed in the center of the ceiling, and the emitted signal at Alice satisfies the non-negativity and the dimmable average optical intensity constraint. Bob and Eve are randomly deployed on the receiver plane. By employing the protected zone and considering the imperfect CSI, the stochastic characteristics of the channel gains for both the main and the eavesdropping channels is first analyzed. After that, the closed-form expressions of the average secrecy capacity and the lower bound of secrecy outage probability are derived, respectively. Finally, Monte-Carlo simulations are provided to verify the accuracy of the derived theoretical expressions. Moreover, the impacts of the nominal optical intensity, the dimming target, the protected zone and the imperfect CSI on secrecy performance are discussed, respectively.
التعليقات
جاري جلب التعليقات جاري جلب التعليقات
سجل دخول لتتمكن من متابعة معايير البحث التي قمت باختيارها
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا