Next Article in Journal
Erratum: Luan, E.X.; Shoman, H.; Ratner, D.M.; Cheung, K.C.; Chrostowski, L. Silicon Photonic Biosensors Using Label-Free Detection. Sensors 2018, 18, 3519
Previous Article in Journal
Spatiotemporal Rule of Heat Transfer on a Soil/Finned Tube Interface
Article

Secrecy Performance of TAS/SC-Based Multi-Hop Harvest-to-Transmit Cognitive WSNs Under Joint Constraint of Interference and Hardware Imperfection

1
VSB, Technical University of Ostrava, 17. listopadu 15/2172, 708 33 Ostrava, Poruba, Czech Republic
2
Faculty of Electronics Technology, Industrial University of Ho Chi Minh City, Ho Chi Minh City 700000, Vietnam
3
Faculty of Electrical and Electronics Engineering, HCMC University of Technology and Education, Ho Chi Minh City 700000, Vietnam
4
Department of Telecommunications, Posts and Telecommunications Institute of Technology, Ho Chi Minh City 700000, Vietnam
5
Wireless Communications Research Group, Faculty of Electrical and Electronics Engineering, Ton Duc Thang University, Ho Chi Minh City 700000, Vietnam
*
Author to whom correspondence should be addressed.
Sensors 2019, 19(5), 1160; https://doi.org/10.3390/s19051160
Received: 11 February 2019 / Revised: 20 February 2019 / Accepted: 4 March 2019 / Published: 7 March 2019
(This article belongs to the Section Sensor Networks)
In this paper, we evaluate the secrecy performance of multi-hop cognitive wireless sensor networks (WSNs). In the secondary network, a source transmits its data to a destination via the multi-hop relaying model using the transmit antenna selection (TAS)/selection combining (SC) technique at each hop, in the presence of an eavesdropper who wants to receive the data illegally. The secondary transmitters, including the source and intermediate relays, have to harvest energy from radio-frequency signals of a power beacon for transmitting the source data. Moreover, their transmit power must be adjusted to satisfy the quality of service (QoS) of the primary network. Under the joint impact of hardware imperfection and interference constraint, expressions for the transmit power for the secondary transmitters are derived. We also derive exact and asymptotic expressions of secrecy outage probability (SOP) and probability of non-zero secrecy capacity (PNSC) for the proposed protocol over Rayleigh fading channel. The derivations are then verified by Monte Carlo simulations. View Full-Text
Keywords: multi-hop wireless sensor networks; physical-layer security; transmit antenna selection; selection combining; cognitive radio; energy harvesting; hardware impairments multi-hop wireless sensor networks; physical-layer security; transmit antenna selection; selection combining; cognitive radio; energy harvesting; hardware impairments
Show Figures

Figure 1

MDPI and ACS Style

Tin, P.T.; Minh Nam, P.; Trung Duy, T.; Tran, P.T.; Voznak, M. Secrecy Performance of TAS/SC-Based Multi-Hop Harvest-to-Transmit Cognitive WSNs Under Joint Constraint of Interference and Hardware Imperfection. Sensors 2019, 19, 1160. https://doi.org/10.3390/s19051160

AMA Style

Tin PT, Minh Nam P, Trung Duy T, Tran PT, Voznak M. Secrecy Performance of TAS/SC-Based Multi-Hop Harvest-to-Transmit Cognitive WSNs Under Joint Constraint of Interference and Hardware Imperfection. Sensors. 2019; 19(5):1160. https://doi.org/10.3390/s19051160

Chicago/Turabian Style

Tin, Phu T., Pham Minh Nam, Tran Trung Duy, Phuong T. Tran, and Miroslav Voznak. 2019. "Secrecy Performance of TAS/SC-Based Multi-Hop Harvest-to-Transmit Cognitive WSNs Under Joint Constraint of Interference and Hardware Imperfection" Sensors 19, no. 5: 1160. https://doi.org/10.3390/s19051160

Find Other Styles
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop