Next Article in Journal
Intelligent Analysis Algorithm for Satellite Health under Time-Varying and Extremely High Thermal Loads
Previous Article in Journal
Criticality as a Determinant of Integrated Information Φ in Human Brain Networks
Open AccessArticle

Performance Comparison between Fountain Codes-Based Secure MIMO Protocols with and without Using Non-Orthogonal Multiple Access

1
Faculty of Radio-Electronics Engineering, Le Quy Don Technical University, Ha Noi 100000, Vietnam
2
Department of Telecommunications, and Department of Information Technology, Posts and Telecommunications Institute of Technology, Ho Chi Minh City 700000, Vietnam
3
Wireless Communications Research Group, Faculty of Electrical and Electronics Engineering, Ton Duc Thang University, Ho Chi Minh City 700000, Vietnam
*
Author to whom correspondence should be addressed.
Entropy 2019, 21(10), 982; https://doi.org/10.3390/e21100982
Received: 13 August 2019 / Revised: 25 September 2019 / Accepted: 6 October 2019 / Published: 9 October 2019
(This article belongs to the Section Information Theory, Probability and Statistics)
In this paper, we propose and evaluate the performance of fountain codes (FCs) based secure transmission protocols in multiple-input-multiple-output (MIMO) wireless systems, in presence of a passive eavesdropper. In the proposed protocols, a source selects its best antenna to transmit fountain encoded packets to a destination that employs selection combining (SC) or maximal ratio combing (MRC) to enhance reliability of the decoding. The transmission is terminated when the destination has a required number of the encoded packets to reconstruct the original data of the source. Similarly, the eavesdropper also has the ability to recover the source data if it can intercept a sufficient number of the encoded packets. To reduce the number of time slots used, the source can employ non-orthogonal multiple access (NOMA) to send two encoded packets to the destination at each time slot. For performance analysis, exact formulas of average number of time slots (TS) and intercept probability (IP) over Rayleigh fading channel are derived and then verified by Monte-Carlo simulations. The results presented that the protocol using NOMA not only reduces TS but also obtains lower IP at medium and high transmit signal-to-noise ratios (SNRs), as compared with the corresponding protocol without using NOMA. View Full-Text
Keywords: physical-layer security; fountain codes; non-orthogonal multiple access; intercept probability physical-layer security; fountain codes; non-orthogonal multiple access; intercept probability
Show Figures

Graphical abstract

MDPI and ACS Style

The Hung, D.; Trung Duy, T.; Tran, P.T.; Quoc Trinh, D.; Hanh, T. Performance Comparison between Fountain Codes-Based Secure MIMO Protocols with and without Using Non-Orthogonal Multiple Access. Entropy 2019, 21, 982.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop