Cargando…

Rateless Codes-Based Secure Communication Employing Transmit Antenna Selection and Harvest-To-Jam under Joint Effect of Interference and Hardware Impairments

In this paper, we propose a rateless codes-based communication protocol to provide security for wireless systems. In the proposed protocol, a source uses the transmit antenna selection (TAS) technique to transmit Fountain-encoded packets to a destination in presence of an eavesdropper. Moreover, a c...

Descripción completa

Detalles Bibliográficos
Autores principales: Tran Tin, Phu, Nguyen, Tan N., Sang, Nguyen Q., Trung Duy, Tran, Tran, Phuong T., Voznak, Miroslav
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2019
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7515214/
https://www.ncbi.nlm.nih.gov/pubmed/33267414
http://dx.doi.org/10.3390/e21070700
_version_ 1783586767877701632
author Tran Tin, Phu
Nguyen, Tan N.
Sang, Nguyen Q.
Trung Duy, Tran
Tran, Phuong T.
Voznak, Miroslav
author_facet Tran Tin, Phu
Nguyen, Tan N.
Sang, Nguyen Q.
Trung Duy, Tran
Tran, Phuong T.
Voznak, Miroslav
author_sort Tran Tin, Phu
collection PubMed
description In this paper, we propose a rateless codes-based communication protocol to provide security for wireless systems. In the proposed protocol, a source uses the transmit antenna selection (TAS) technique to transmit Fountain-encoded packets to a destination in presence of an eavesdropper. Moreover, a cooperative jammer node harvests energy from radio frequency (RF) signals of the source and the interference sources to generate jamming noises on the eavesdropper. The data transmission terminates as soon as the destination can receive a sufficient number of the encoded packets for decoding the original data of the source. To obtain secure communication, the destination must receive sufficient encoded packets before the eavesdropper. The combination of the TAS and harvest-to-jam techniques obtains the security and efficient energy via reducing the number of the data transmission, increasing the quality of the data channel, decreasing the quality of the eavesdropping channel, and supporting the energy for the jammer. The main contribution of this paper is to derive exact closed-form expressions of outage probability (OP), probability of successful and secure communication (SS), intercept probability (IP) and average number of time slots used by the source over Rayleigh fading channel under the joint impact of co-channel interference and hardware impairments. Then, Monte Carlo simulations are presented to verify the theoretical results.
format Online
Article
Text
id pubmed-7515214
institution National Center for Biotechnology Information
language English
publishDate 2019
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-75152142020-11-09 Rateless Codes-Based Secure Communication Employing Transmit Antenna Selection and Harvest-To-Jam under Joint Effect of Interference and Hardware Impairments Tran Tin, Phu Nguyen, Tan N. Sang, Nguyen Q. Trung Duy, Tran Tran, Phuong T. Voznak, Miroslav Entropy (Basel) Article In this paper, we propose a rateless codes-based communication protocol to provide security for wireless systems. In the proposed protocol, a source uses the transmit antenna selection (TAS) technique to transmit Fountain-encoded packets to a destination in presence of an eavesdropper. Moreover, a cooperative jammer node harvests energy from radio frequency (RF) signals of the source and the interference sources to generate jamming noises on the eavesdropper. The data transmission terminates as soon as the destination can receive a sufficient number of the encoded packets for decoding the original data of the source. To obtain secure communication, the destination must receive sufficient encoded packets before the eavesdropper. The combination of the TAS and harvest-to-jam techniques obtains the security and efficient energy via reducing the number of the data transmission, increasing the quality of the data channel, decreasing the quality of the eavesdropping channel, and supporting the energy for the jammer. The main contribution of this paper is to derive exact closed-form expressions of outage probability (OP), probability of successful and secure communication (SS), intercept probability (IP) and average number of time slots used by the source over Rayleigh fading channel under the joint impact of co-channel interference and hardware impairments. Then, Monte Carlo simulations are presented to verify the theoretical results. MDPI 2019-07-16 /pmc/articles/PMC7515214/ /pubmed/33267414 http://dx.doi.org/10.3390/e21070700 Text en © 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Tran Tin, Phu
Nguyen, Tan N.
Sang, Nguyen Q.
Trung Duy, Tran
Tran, Phuong T.
Voznak, Miroslav
Rateless Codes-Based Secure Communication Employing Transmit Antenna Selection and Harvest-To-Jam under Joint Effect of Interference and Hardware Impairments
title Rateless Codes-Based Secure Communication Employing Transmit Antenna Selection and Harvest-To-Jam under Joint Effect of Interference and Hardware Impairments
title_full Rateless Codes-Based Secure Communication Employing Transmit Antenna Selection and Harvest-To-Jam under Joint Effect of Interference and Hardware Impairments
title_fullStr Rateless Codes-Based Secure Communication Employing Transmit Antenna Selection and Harvest-To-Jam under Joint Effect of Interference and Hardware Impairments
title_full_unstemmed Rateless Codes-Based Secure Communication Employing Transmit Antenna Selection and Harvest-To-Jam under Joint Effect of Interference and Hardware Impairments
title_short Rateless Codes-Based Secure Communication Employing Transmit Antenna Selection and Harvest-To-Jam under Joint Effect of Interference and Hardware Impairments
title_sort rateless codes-based secure communication employing transmit antenna selection and harvest-to-jam under joint effect of interference and hardware impairments
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7515214/
https://www.ncbi.nlm.nih.gov/pubmed/33267414
http://dx.doi.org/10.3390/e21070700
work_keys_str_mv AT trantinphu ratelesscodesbasedsecurecommunicationemployingtransmitantennaselectionandharvesttojamunderjointeffectofinterferenceandhardwareimpairments
AT nguyentann ratelesscodesbasedsecurecommunicationemployingtransmitantennaselectionandharvesttojamunderjointeffectofinterferenceandhardwareimpairments
AT sangnguyenq ratelesscodesbasedsecurecommunicationemployingtransmitantennaselectionandharvesttojamunderjointeffectofinterferenceandhardwareimpairments
AT trungduytran ratelesscodesbasedsecurecommunicationemployingtransmitantennaselectionandharvesttojamunderjointeffectofinterferenceandhardwareimpairments
AT tranphuongt ratelesscodesbasedsecurecommunicationemployingtransmitantennaselectionandharvesttojamunderjointeffectofinterferenceandhardwareimpairments
AT voznakmiroslav ratelesscodesbasedsecurecommunicationemployingtransmitantennaselectionandharvesttojamunderjointeffectofinterferenceandhardwareimpairments