Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (7)

Search Parameters:
Keywords = intercept probability (IP)

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
19 pages, 537 KiB  
Article
Security and Reliability Analysis of the Power Splitting-Based Relaying in Wireless Sensors Network
by Minh Tran, Lam-Thanh Tu, Bui Vu Minh, Quang-Sang Nguyen, Lubos Rejfek and Byung Moo Lee
Sensors 2024, 24(4), 1300; https://doi.org/10.3390/s24041300 - 17 Feb 2024
Cited by 7 | Viewed by 1341
Abstract
This paper studies the security and reliability of the power splitting (PS)-based relaying in the Internet of Things (IoT) networks with the help of a jammer. Based on the considered system model, we derive outage probability (OP) and intercept probability (IP) under two [...] Read more.
This paper studies the security and reliability of the power splitting (PS)-based relaying in the Internet of Things (IoT) networks with the help of a jammer. Based on the considered system model, we derive outage probability (OP) and intercept probability (IP) under two distinguished schemes, namely, the static PS relaying (SPSR) scheme and the dynamic PS relaying (DPSR) scheme. More precisely, the PS ratio of the former is a constant number, while the latter is optimally adjusted in order to minimize the OP and counts only on the channel gain of the second hop. Numerical results are provided to not only verify the accuracy of the proposed mathematical framework but also identify the trends of both OP and IP with respect to several important parameters. Our findings unveil that the OP and IP have contradictory behavior with respect to the transmit power and number of sources. Moreover, the performance of the DPSR scheme is superior to that of the SPSR scheme. Full article
(This article belongs to the Section Sensor Networks)
Show Figures

Figure 1

19 pages, 876 KiB  
Article
Security–Reliability Analysis of AF Full-Duplex Relay Networks Using Self-Energy Recycling and Deep Neural Networks
by Tan N. Nguyen, Bui Vu Minh, Dinh-Hieu Tran, Thanh-Lanh Le, Anh-Tu Le, Quang-Sang Nguyen and Byung Moo Lee
Sensors 2023, 23(17), 7618; https://doi.org/10.3390/s23177618 - 2 Sep 2023
Cited by 3 | Viewed by 1919
Abstract
This paper investigates the security–reliability of simultaneous wireless information and power transfer (SWIPT)-assisted amplify-and-forward (AF) full-duplex (FD) relay networks. In practice, an AF-FD relay harvests energy from the source (S) using the power-splitting (PS) protocol. We propose an analysis of the related reliability [...] Read more.
This paper investigates the security–reliability of simultaneous wireless information and power transfer (SWIPT)-assisted amplify-and-forward (AF) full-duplex (FD) relay networks. In practice, an AF-FD relay harvests energy from the source (S) using the power-splitting (PS) protocol. We propose an analysis of the related reliability and security by deriving closed-form formulas for outage probability (OP) and intercept probability (IP). The next contribution of this research is an asymptotic analysis of OP and IP, which was generated to obtain more insight into important system parameters. We validate the analytical formulas and analyze the impact on the key system parameters using Monte Carlo simulations. Finally, we propose a deep learning network (DNN) with minimal computation complexity and great accuracy for OP and IP predictions. The effects of the system’s primary parameters on OP and IP are examined and described, along with the numerical data. Full article
(This article belongs to the Section Sensor Networks)
Show Figures

Figure 1

22 pages, 11097 KiB  
Article
A Secrecy Transmission Protocol with Energy Harvesting for Federated Learning
by Ping Xie, Fan Li, Ilsun You, Ling Xing, Honghai Wu and Huahong Ma
Sensors 2022, 22(15), 5506; https://doi.org/10.3390/s22155506 - 23 Jul 2022
Viewed by 1930
Abstract
In federated learning (FL), model parameters of deep learning are communicated between clients and the central server. To better train deep learning models, the spectrum resource and transmission security need to be guaranteed. Toward this end, we propose a secrecy transmission protocol based [...] Read more.
In federated learning (FL), model parameters of deep learning are communicated between clients and the central server. To better train deep learning models, the spectrum resource and transmission security need to be guaranteed. Toward this end, we propose a secrecy transmission protocol based on energy harvesting and jammer selection for FL, in which the secondary transmitters can harvest energy from the primary source. Specifically, a secondary transmitter STi is first selected, which can offer the best transmission performance for the secondary users to access the primary frequency spectrum. Then, another secondary transmitter STn, which has the best channel for eavesdropping, is also chosen as a friendly jammer to provide secrecy service. Furthermore, we use outage probability (OP) and intercept probability (IP) as metrics to evaluate performance. Meanwhile, we also derive closed-form expressions of OP and IP of primary users and OP of secondary users for the proposed protocol, respectively. We also conduct a theoretical analysis of the optimal secondary transmission selection (OSTS) protocol. Finally, the performance of the proposed protocol is validated through numerical experiments. The results show that the secrecy performance of the proposed protocol is better than the OSTS and OCJS, respectively. Full article
(This article belongs to the Special Issue Cyber Security and AI)
Show Figures

Figure 1

16 pages, 3084 KiB  
Article
Physical Layer Security in a Hybrid TPSR Two-Way Half-Duplex Relaying Network over a Rayleigh Fading Channel: Outage and Intercept Probability Analysis
by Ngo Hoang An, Minh Tran, Tan N. Nguyen and Duy-Hung Ha
Electronics 2020, 9(3), 428; https://doi.org/10.3390/electronics9030428 - 4 Mar 2020
Cited by 11 | Viewed by 3636
Abstract
In this paper, the system performance of a hybrid time–power splitting relaying (TPSR) two-way half-duplex (HD) relaying network over a Rayleigh fading channel is investigated in terms of the outage probability (OP) and intercept probability (IP). The proposed model has two sources, A [...] Read more.
In this paper, the system performance of a hybrid time–power splitting relaying (TPSR) two-way half-duplex (HD) relaying network over a Rayleigh fading channel is investigated in terms of the outage probability (OP) and intercept probability (IP). The proposed model has two sources, A and B, which communicate with each other with the help of an intermediate relay (R) under the presence of an eavesdropper (E). The physical layer security (PLS) was considered in this case. Firstly, we derived the closed-form expressions of the exact and asymptotic IP in two cases, using MRC (maximal ratio combining) and SC (selection combining) techniques. The closed-form expressions of the system OP was then analyzed and derived. All the analytical expressions of the OP and IP of the system model were verified by a Monte Carlo simulation in connection with all the main system parameters. In the research results, the analytical and simulation values were in total agreement, demonstrating the correctness of the system performance analysis. Full article
(This article belongs to the Section Networks)
Show Figures

Figure 1

17 pages, 1540 KiB  
Article
Security Analysis of Multi-Antenna NOMA Networks Under I/Q Imbalance
by Xingwang Li, Mengle Zhao, Changsen Zhang, Wali Ullah Khan, Jun Wu, Khaled M. Rabie and Rupak Kharel
Electronics 2019, 8(11), 1327; https://doi.org/10.3390/electronics8111327 - 11 Nov 2019
Cited by 20 | Viewed by 3146
Abstract
This paper investigates the reliability and security performance of the downlink non-orthogonal multiple access (NOMA) networks over Nakagami-m fading channels, where the base station (BS) aims to communicate with multi-antenna NOMA users in the presence of a multi-antenna eavesdropper. To be more [...] Read more.
This paper investigates the reliability and security performance of the downlink non-orthogonal multiple access (NOMA) networks over Nakagami-m fading channels, where the base station (BS) aims to communicate with multi-antenna NOMA users in the presence of a multi-antenna eavesdropper. To be more practical, a detrimental factor at both transmitter and receiver is considered, namely in-phase and quadrature-phase imbalance (IQI). To further improve the reliability and security of the considered networks, the selection combining (SC) algorithm at the receiver is taken into account. More specifically, the exact analytical expressions for the outage probability (OP) and the intercept probability (IP) are derived in closed-form. To obtain a better understanding of the influence for the IQI parameters on the system performance, the asymptotic behaviors for the outage probabilities (OPs) in the high signal-to-noise ratio (SNR) region are analyzed. Based on the asymptotic results, the diversity order of the considered system are obtained and discussed. The numerical results are presented to verify the validity of the theoretical analysis. Full article
Show Figures

Figure 1

23 pages, 392 KiB  
Article
Performance Comparison between Fountain Codes-Based Secure MIMO Protocols with and without Using Non-Orthogonal Multiple Access
by Dang The Hung, Tran Trung Duy, Phuong T. Tran, Do Quoc Trinh and Tan Hanh
Entropy 2019, 21(10), 982; https://doi.org/10.3390/e21100982 - 9 Oct 2019
Cited by 8 | Viewed by 3233
Abstract
In this paper, we propose and evaluate the performance of fountain codes (FCs) based secure transmission protocols in multiple-input-multiple-output (MIMO) wireless systems, in presence of a passive eavesdropper. In the proposed protocols, a source selects its best antenna to transmit fountain encoded packets [...] Read more.
In this paper, we propose and evaluate the performance of fountain codes (FCs) based secure transmission protocols in multiple-input-multiple-output (MIMO) wireless systems, in presence of a passive eavesdropper. In the proposed protocols, a source selects its best antenna to transmit fountain encoded packets to a destination that employs selection combining (SC) or maximal ratio combing (MRC) to enhance reliability of the decoding. The transmission is terminated when the destination has a required number of the encoded packets to reconstruct the original data of the source. Similarly, the eavesdropper also has the ability to recover the source data if it can intercept a sufficient number of the encoded packets. To reduce the number of time slots used, the source can employ non-orthogonal multiple access (NOMA) to send two encoded packets to the destination at each time slot. For performance analysis, exact formulas of average number of time slots (TS) and intercept probability (IP) over Rayleigh fading channel are derived and then verified by Monte-Carlo simulations. The results presented that the protocol using NOMA not only reduces TS but also obtains lower IP at medium and high transmit signal-to-noise ratios (SNRs), as compared with the corresponding protocol without using NOMA. Full article
(This article belongs to the Section Information Theory, Probability and Statistics)
Show Figures

Graphical abstract

18 pages, 404 KiB  
Article
Rateless Codes-Based Secure Communication Employing Transmit Antenna Selection and Harvest-To-Jam under Joint Effect of Interference and Hardware Impairments
by Phu Tran Tin, Tan N. Nguyen, Nguyen Q. Sang, Tran Trung Duy, Phuong T. Tran and Miroslav Voznak
Entropy 2019, 21(7), 700; https://doi.org/10.3390/e21070700 - 16 Jul 2019
Cited by 14 | Viewed by 4526
Abstract
In this paper, we propose a rateless codes-based communication protocol to provide security for wireless systems. In the proposed protocol, a source uses the transmit antenna selection (TAS) technique to transmit Fountain-encoded packets to a destination in presence of an eavesdropper. Moreover, a [...] Read more.
In this paper, we propose a rateless codes-based communication protocol to provide security for wireless systems. In the proposed protocol, a source uses the transmit antenna selection (TAS) technique to transmit Fountain-encoded packets to a destination in presence of an eavesdropper. Moreover, a cooperative jammer node harvests energy from radio frequency (RF) signals of the source and the interference sources to generate jamming noises on the eavesdropper. The data transmission terminates as soon as the destination can receive a sufficient number of the encoded packets for decoding the original data of the source. To obtain secure communication, the destination must receive sufficient encoded packets before the eavesdropper. The combination of the TAS and harvest-to-jam techniques obtains the security and efficient energy via reducing the number of the data transmission, increasing the quality of the data channel, decreasing the quality of the eavesdropping channel, and supporting the energy for the jammer. The main contribution of this paper is to derive exact closed-form expressions of outage probability (OP), probability of successful and secure communication (SS), intercept probability (IP) and average number of time slots used by the source over Rayleigh fading channel under the joint impact of co-channel interference and hardware impairments. Then, Monte Carlo simulations are presented to verify the theoretical results. Full article
(This article belongs to the Section Information Theory, Probability and Statistics)
Show Figures

Graphical abstract

Back to TopTop