Cargando…

Performance Comparison between Fountain Codes-Based Secure MIMO Protocols with and without Using Non-Orthogonal Multiple Access

In this paper, we propose and evaluate the performance of fountain codes (FCs) based secure transmission protocols in multiple-input-multiple-output (MIMO) wireless systems, in presence of a passive eavesdropper. In the proposed protocols, a source selects its best antenna to transmit fountain encod...

Descripción completa

Detalles Bibliográficos
Autores principales: The Hung, Dang, Trung Duy, Tran, Tran, Phuong T., Quoc Trinh, Do, Hanh, Tan
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2019
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7514314/
http://dx.doi.org/10.3390/e21100982
_version_ 1783586559502581760
author The Hung, Dang
Trung Duy, Tran
Tran, Phuong T.
Quoc Trinh, Do
Hanh, Tan
author_facet The Hung, Dang
Trung Duy, Tran
Tran, Phuong T.
Quoc Trinh, Do
Hanh, Tan
author_sort The Hung, Dang
collection PubMed
description In this paper, we propose and evaluate the performance of fountain codes (FCs) based secure transmission protocols in multiple-input-multiple-output (MIMO) wireless systems, in presence of a passive eavesdropper. In the proposed protocols, a source selects its best antenna to transmit fountain encoded packets to a destination that employs selection combining (SC) or maximal ratio combing (MRC) to enhance reliability of the decoding. The transmission is terminated when the destination has a required number of the encoded packets to reconstruct the original data of the source. Similarly, the eavesdropper also has the ability to recover the source data if it can intercept a sufficient number of the encoded packets. To reduce the number of time slots used, the source can employ non-orthogonal multiple access (NOMA) to send two encoded packets to the destination at each time slot. For performance analysis, exact formulas of average number of time slots (TS) and intercept probability (IP) over Rayleigh fading channel are derived and then verified by Monte-Carlo simulations. The results presented that the protocol using NOMA not only reduces TS but also obtains lower IP at medium and high transmit signal-to-noise ratios (SNRs), as compared with the corresponding protocol without using NOMA.
format Online
Article
Text
id pubmed-7514314
institution National Center for Biotechnology Information
language English
publishDate 2019
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-75143142020-11-09 Performance Comparison between Fountain Codes-Based Secure MIMO Protocols with and without Using Non-Orthogonal Multiple Access The Hung, Dang Trung Duy, Tran Tran, Phuong T. Quoc Trinh, Do Hanh, Tan Entropy (Basel) Article In this paper, we propose and evaluate the performance of fountain codes (FCs) based secure transmission protocols in multiple-input-multiple-output (MIMO) wireless systems, in presence of a passive eavesdropper. In the proposed protocols, a source selects its best antenna to transmit fountain encoded packets to a destination that employs selection combining (SC) or maximal ratio combing (MRC) to enhance reliability of the decoding. The transmission is terminated when the destination has a required number of the encoded packets to reconstruct the original data of the source. Similarly, the eavesdropper also has the ability to recover the source data if it can intercept a sufficient number of the encoded packets. To reduce the number of time slots used, the source can employ non-orthogonal multiple access (NOMA) to send two encoded packets to the destination at each time slot. For performance analysis, exact formulas of average number of time slots (TS) and intercept probability (IP) over Rayleigh fading channel are derived and then verified by Monte-Carlo simulations. The results presented that the protocol using NOMA not only reduces TS but also obtains lower IP at medium and high transmit signal-to-noise ratios (SNRs), as compared with the corresponding protocol without using NOMA. MDPI 2019-10-09 /pmc/articles/PMC7514314/ http://dx.doi.org/10.3390/e21100982 Text en © 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
The Hung, Dang
Trung Duy, Tran
Tran, Phuong T.
Quoc Trinh, Do
Hanh, Tan
Performance Comparison between Fountain Codes-Based Secure MIMO Protocols with and without Using Non-Orthogonal Multiple Access
title Performance Comparison between Fountain Codes-Based Secure MIMO Protocols with and without Using Non-Orthogonal Multiple Access
title_full Performance Comparison between Fountain Codes-Based Secure MIMO Protocols with and without Using Non-Orthogonal Multiple Access
title_fullStr Performance Comparison between Fountain Codes-Based Secure MIMO Protocols with and without Using Non-Orthogonal Multiple Access
title_full_unstemmed Performance Comparison between Fountain Codes-Based Secure MIMO Protocols with and without Using Non-Orthogonal Multiple Access
title_short Performance Comparison between Fountain Codes-Based Secure MIMO Protocols with and without Using Non-Orthogonal Multiple Access
title_sort performance comparison between fountain codes-based secure mimo protocols with and without using non-orthogonal multiple access
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7514314/
http://dx.doi.org/10.3390/e21100982
work_keys_str_mv AT thehungdang performancecomparisonbetweenfountaincodesbasedsecuremimoprotocolswithandwithoutusingnonorthogonalmultipleaccess
AT trungduytran performancecomparisonbetweenfountaincodesbasedsecuremimoprotocolswithandwithoutusingnonorthogonalmultipleaccess
AT tranphuongt performancecomparisonbetweenfountaincodesbasedsecuremimoprotocolswithandwithoutusingnonorthogonalmultipleaccess
AT quoctrinhdo performancecomparisonbetweenfountaincodesbasedsecuremimoprotocolswithandwithoutusingnonorthogonalmultipleaccess
AT hanhtan performancecomparisonbetweenfountaincodesbasedsecuremimoprotocolswithandwithoutusingnonorthogonalmultipleaccess