Cargando…

Secrecy Performance of TAS/SC-Based Multi-Hop Harvest-to-Transmit Cognitive WSNs Under Joint Constraint of Interference and Hardware Imperfection

In this paper, we evaluate the secrecy performance of multi-hop cognitive wireless sensor networks (WSNs). In the secondary network, a source transmits its data to a destination via the multi-hop relaying model using the transmit antenna selection (TAS)/selection combining (SC) technique at each hop...

Descripción completa

Detalles Bibliográficos
Autores principales: Tin, Phu Tran, Minh Nam, Pham, Trung Duy, Tran, Tran, Phuong T., Voznak, Miroslav
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2019
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6427423/
https://www.ncbi.nlm.nih.gov/pubmed/30866513
http://dx.doi.org/10.3390/s19051160
_version_ 1783405207162454016
author Tin, Phu Tran
Minh Nam, Pham
Trung Duy, Tran
Tran, Phuong T.
Voznak, Miroslav
author_facet Tin, Phu Tran
Minh Nam, Pham
Trung Duy, Tran
Tran, Phuong T.
Voznak, Miroslav
author_sort Tin, Phu Tran
collection PubMed
description In this paper, we evaluate the secrecy performance of multi-hop cognitive wireless sensor networks (WSNs). In the secondary network, a source transmits its data to a destination via the multi-hop relaying model using the transmit antenna selection (TAS)/selection combining (SC) technique at each hop, in the presence of an eavesdropper who wants to receive the data illegally. The secondary transmitters, including the source and intermediate relays, have to harvest energy from radio-frequency signals of a power beacon for transmitting the source data. Moreover, their transmit power must be adjusted to satisfy the quality of service (QoS) of the primary network. Under the joint impact of hardware imperfection and interference constraint, expressions for the transmit power for the secondary transmitters are derived. We also derive exact and asymptotic expressions of secrecy outage probability (SOP) and probability of non-zero secrecy capacity (PNSC) for the proposed protocol over Rayleigh fading channel. The derivations are then verified by Monte Carlo simulations.
format Online
Article
Text
id pubmed-6427423
institution National Center for Biotechnology Information
language English
publishDate 2019
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-64274232019-04-15 Secrecy Performance of TAS/SC-Based Multi-Hop Harvest-to-Transmit Cognitive WSNs Under Joint Constraint of Interference and Hardware Imperfection Tin, Phu Tran Minh Nam, Pham Trung Duy, Tran Tran, Phuong T. Voznak, Miroslav Sensors (Basel) Article In this paper, we evaluate the secrecy performance of multi-hop cognitive wireless sensor networks (WSNs). In the secondary network, a source transmits its data to a destination via the multi-hop relaying model using the transmit antenna selection (TAS)/selection combining (SC) technique at each hop, in the presence of an eavesdropper who wants to receive the data illegally. The secondary transmitters, including the source and intermediate relays, have to harvest energy from radio-frequency signals of a power beacon for transmitting the source data. Moreover, their transmit power must be adjusted to satisfy the quality of service (QoS) of the primary network. Under the joint impact of hardware imperfection and interference constraint, expressions for the transmit power for the secondary transmitters are derived. We also derive exact and asymptotic expressions of secrecy outage probability (SOP) and probability of non-zero secrecy capacity (PNSC) for the proposed protocol over Rayleigh fading channel. The derivations are then verified by Monte Carlo simulations. MDPI 2019-03-07 /pmc/articles/PMC6427423/ /pubmed/30866513 http://dx.doi.org/10.3390/s19051160 Text en © 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Tin, Phu Tran
Minh Nam, Pham
Trung Duy, Tran
Tran, Phuong T.
Voznak, Miroslav
Secrecy Performance of TAS/SC-Based Multi-Hop Harvest-to-Transmit Cognitive WSNs Under Joint Constraint of Interference and Hardware Imperfection
title Secrecy Performance of TAS/SC-Based Multi-Hop Harvest-to-Transmit Cognitive WSNs Under Joint Constraint of Interference and Hardware Imperfection
title_full Secrecy Performance of TAS/SC-Based Multi-Hop Harvest-to-Transmit Cognitive WSNs Under Joint Constraint of Interference and Hardware Imperfection
title_fullStr Secrecy Performance of TAS/SC-Based Multi-Hop Harvest-to-Transmit Cognitive WSNs Under Joint Constraint of Interference and Hardware Imperfection
title_full_unstemmed Secrecy Performance of TAS/SC-Based Multi-Hop Harvest-to-Transmit Cognitive WSNs Under Joint Constraint of Interference and Hardware Imperfection
title_short Secrecy Performance of TAS/SC-Based Multi-Hop Harvest-to-Transmit Cognitive WSNs Under Joint Constraint of Interference and Hardware Imperfection
title_sort secrecy performance of tas/sc-based multi-hop harvest-to-transmit cognitive wsns under joint constraint of interference and hardware imperfection
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6427423/
https://www.ncbi.nlm.nih.gov/pubmed/30866513
http://dx.doi.org/10.3390/s19051160
work_keys_str_mv AT tinphutran secrecyperformanceoftasscbasedmultihopharvesttotransmitcognitivewsnsunderjointconstraintofinterferenceandhardwareimperfection
AT minhnampham secrecyperformanceoftasscbasedmultihopharvesttotransmitcognitivewsnsunderjointconstraintofinterferenceandhardwareimperfection
AT trungduytran secrecyperformanceoftasscbasedmultihopharvesttotransmitcognitivewsnsunderjointconstraintofinterferenceandhardwareimperfection
AT tranphuongt secrecyperformanceoftasscbasedmultihopharvesttotransmitcognitivewsnsunderjointconstraintofinterferenceandhardwareimperfection
AT voznakmiroslav secrecyperformanceoftasscbasedmultihopharvesttotransmitcognitivewsnsunderjointconstraintofinterferenceandhardwareimperfection