Cargando…
Secrecy Performance of TAS/SC-Based Multi-Hop Harvest-to-Transmit Cognitive WSNs Under Joint Constraint of Interference and Hardware Imperfection
In this paper, we evaluate the secrecy performance of multi-hop cognitive wireless sensor networks (WSNs). In the secondary network, a source transmits its data to a destination via the multi-hop relaying model using the transmit antenna selection (TAS)/selection combining (SC) technique at each hop...
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2019
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6427423/ https://www.ncbi.nlm.nih.gov/pubmed/30866513 http://dx.doi.org/10.3390/s19051160 |
_version_ | 1783405207162454016 |
---|---|
author | Tin, Phu Tran Minh Nam, Pham Trung Duy, Tran Tran, Phuong T. Voznak, Miroslav |
author_facet | Tin, Phu Tran Minh Nam, Pham Trung Duy, Tran Tran, Phuong T. Voznak, Miroslav |
author_sort | Tin, Phu Tran |
collection | PubMed |
description | In this paper, we evaluate the secrecy performance of multi-hop cognitive wireless sensor networks (WSNs). In the secondary network, a source transmits its data to a destination via the multi-hop relaying model using the transmit antenna selection (TAS)/selection combining (SC) technique at each hop, in the presence of an eavesdropper who wants to receive the data illegally. The secondary transmitters, including the source and intermediate relays, have to harvest energy from radio-frequency signals of a power beacon for transmitting the source data. Moreover, their transmit power must be adjusted to satisfy the quality of service (QoS) of the primary network. Under the joint impact of hardware imperfection and interference constraint, expressions for the transmit power for the secondary transmitters are derived. We also derive exact and asymptotic expressions of secrecy outage probability (SOP) and probability of non-zero secrecy capacity (PNSC) for the proposed protocol over Rayleigh fading channel. The derivations are then verified by Monte Carlo simulations. |
format | Online Article Text |
id | pubmed-6427423 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2019 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-64274232019-04-15 Secrecy Performance of TAS/SC-Based Multi-Hop Harvest-to-Transmit Cognitive WSNs Under Joint Constraint of Interference and Hardware Imperfection Tin, Phu Tran Minh Nam, Pham Trung Duy, Tran Tran, Phuong T. Voznak, Miroslav Sensors (Basel) Article In this paper, we evaluate the secrecy performance of multi-hop cognitive wireless sensor networks (WSNs). In the secondary network, a source transmits its data to a destination via the multi-hop relaying model using the transmit antenna selection (TAS)/selection combining (SC) technique at each hop, in the presence of an eavesdropper who wants to receive the data illegally. The secondary transmitters, including the source and intermediate relays, have to harvest energy from radio-frequency signals of a power beacon for transmitting the source data. Moreover, their transmit power must be adjusted to satisfy the quality of service (QoS) of the primary network. Under the joint impact of hardware imperfection and interference constraint, expressions for the transmit power for the secondary transmitters are derived. We also derive exact and asymptotic expressions of secrecy outage probability (SOP) and probability of non-zero secrecy capacity (PNSC) for the proposed protocol over Rayleigh fading channel. The derivations are then verified by Monte Carlo simulations. MDPI 2019-03-07 /pmc/articles/PMC6427423/ /pubmed/30866513 http://dx.doi.org/10.3390/s19051160 Text en © 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Tin, Phu Tran Minh Nam, Pham Trung Duy, Tran Tran, Phuong T. Voznak, Miroslav Secrecy Performance of TAS/SC-Based Multi-Hop Harvest-to-Transmit Cognitive WSNs Under Joint Constraint of Interference and Hardware Imperfection |
title | Secrecy Performance of TAS/SC-Based Multi-Hop Harvest-to-Transmit Cognitive WSNs Under Joint Constraint of Interference and Hardware Imperfection |
title_full | Secrecy Performance of TAS/SC-Based Multi-Hop Harvest-to-Transmit Cognitive WSNs Under Joint Constraint of Interference and Hardware Imperfection |
title_fullStr | Secrecy Performance of TAS/SC-Based Multi-Hop Harvest-to-Transmit Cognitive WSNs Under Joint Constraint of Interference and Hardware Imperfection |
title_full_unstemmed | Secrecy Performance of TAS/SC-Based Multi-Hop Harvest-to-Transmit Cognitive WSNs Under Joint Constraint of Interference and Hardware Imperfection |
title_short | Secrecy Performance of TAS/SC-Based Multi-Hop Harvest-to-Transmit Cognitive WSNs Under Joint Constraint of Interference and Hardware Imperfection |
title_sort | secrecy performance of tas/sc-based multi-hop harvest-to-transmit cognitive wsns under joint constraint of interference and hardware imperfection |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6427423/ https://www.ncbi.nlm.nih.gov/pubmed/30866513 http://dx.doi.org/10.3390/s19051160 |
work_keys_str_mv | AT tinphutran secrecyperformanceoftasscbasedmultihopharvesttotransmitcognitivewsnsunderjointconstraintofinterferenceandhardwareimperfection AT minhnampham secrecyperformanceoftasscbasedmultihopharvesttotransmitcognitivewsnsunderjointconstraintofinterferenceandhardwareimperfection AT trungduytran secrecyperformanceoftasscbasedmultihopharvesttotransmitcognitivewsnsunderjointconstraintofinterferenceandhardwareimperfection AT tranphuongt secrecyperformanceoftasscbasedmultihopharvesttotransmitcognitivewsnsunderjointconstraintofinterferenceandhardwareimperfection AT voznakmiroslav secrecyperformanceoftasscbasedmultihopharvesttotransmitcognitivewsnsunderjointconstraintofinterferenceandhardwareimperfection |