Next Article in Journal
A Security Enhanced Encryption Scheme and Evaluation of Its Cryptographic Security
Previous Article in Journal
Multivariate Pointwise Information-Driven Data Sampling and Visualization
Article

Rateless Codes-Based Secure Communication Employing Transmit Antenna Selection and Harvest-To-Jam under Joint Effect of Interference and Hardware Impairments

1
VSB—Technical University of Ostrava, 17. listopadu 15/2172, 708 33 Ostrava, Czech Republic
2
Faculty of Electronics Technology, Industrial University of Ho Chi Minh City, Ho Chi Minh City 700000, Vietnam
3
Department of Electrical and Electronic Engineering, Duy Tan University, DaNang City 550000, Vietnam
4
Department of Telecommunications, Posts and Telecommunications Institute of Technology, Ho Chi Minh City 700000, Vietnam
5
Wireless Communications Research Group, Faculty of Electrical and Electronics Engineering, Ton Duc Thang University, Ho Chi Minh City 700000, Vietnam
*
Author to whom correspondence should be addressed.
Entropy 2019, 21(7), 700; https://doi.org/10.3390/e21070700
Received: 30 May 2019 / Revised: 7 July 2019 / Accepted: 11 July 2019 / Published: 16 July 2019
(This article belongs to the Section Information Theory, Probability and Statistics)
In this paper, we propose a rateless codes-based communication protocol to provide security for wireless systems. In the proposed protocol, a source uses the transmit antenna selection (TAS) technique to transmit Fountain-encoded packets to a destination in presence of an eavesdropper. Moreover, a cooperative jammer node harvests energy from radio frequency (RF) signals of the source and the interference sources to generate jamming noises on the eavesdropper. The data transmission terminates as soon as the destination can receive a sufficient number of the encoded packets for decoding the original data of the source. To obtain secure communication, the destination must receive sufficient encoded packets before the eavesdropper. The combination of the TAS and harvest-to-jam techniques obtains the security and efficient energy via reducing the number of the data transmission, increasing the quality of the data channel, decreasing the quality of the eavesdropping channel, and supporting the energy for the jammer. The main contribution of this paper is to derive exact closed-form expressions of outage probability (OP), probability of successful and secure communication (SS), intercept probability (IP) and average number of time slots used by the source over Rayleigh fading channel under the joint impact of co-channel interference and hardware impairments. Then, Monte Carlo simulations are presented to verify the theoretical results. View Full-Text
Keywords: rateless codes; transmit antenna selection; energy harvesting; co-channel interference; hardware impairments rateless codes; transmit antenna selection; energy harvesting; co-channel interference; hardware impairments
Show Figures

Graphical abstract

MDPI and ACS Style

Tran Tin, P.; Nguyen, T.N.; Sang, N.Q.; Trung Duy, T.; Tran, P.T.; Voznak, M. Rateless Codes-Based Secure Communication Employing Transmit Antenna Selection and Harvest-To-Jam under Joint Effect of Interference and Hardware Impairments. Entropy 2019, 21, 700. https://doi.org/10.3390/e21070700

AMA Style

Tran Tin P, Nguyen TN, Sang NQ, Trung Duy T, Tran PT, Voznak M. Rateless Codes-Based Secure Communication Employing Transmit Antenna Selection and Harvest-To-Jam under Joint Effect of Interference and Hardware Impairments. Entropy. 2019; 21(7):700. https://doi.org/10.3390/e21070700

Chicago/Turabian Style

Tran Tin, Phu, Tan N. Nguyen, Nguyen Q. Sang, Tran Trung Duy, Phuong T. Tran, and Miroslav Voznak. 2019. "Rateless Codes-Based Secure Communication Employing Transmit Antenna Selection and Harvest-To-Jam under Joint Effect of Interference and Hardware Impairments" Entropy 21, no. 7: 700. https://doi.org/10.3390/e21070700

Find Other Styles
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop