scispace - formally typeset
Search or ask a question
Author

Pham Ngoc Son

Other affiliations: University of Ulsan
Bio: Pham Ngoc Son is an academic researcher from Ho Chi Minh City University of Technology. The author has contributed to research in topics: Relay & Rayleigh fading. The author has an hindex of 9, co-authored 46 publications receiving 245 citations. Previous affiliations of Pham Ngoc Son include University of Ulsan.

Papers published on a yearly basis

Papers
More filters
Journal ArticleDOI
TL;DR: The simulation results show that the EH-DF protocol outperforms the Eh-AF protocol, and both proposed protocols are improved when the number of cooperative relays and the distances of the relay–eavesdropper links increase and the relays move toward the destination.
Abstract: In this study, the authors propose a cooperative transmission scheme with energy-harvesting (EH) relays under wiretapping of an eavesdropper. In this scheme, the relays harvest energy from radio-frequency (RF) signals of a source through power-splitting receivers, and process arrived signals by amplify-and-forward (EH-AF protocol) and decode-and-forward (EH-DF protocol) technologies. In the proposed protocols, a best relay is selected at the destination so that the end-to-end achievable secrecy rates are maximal. Exact and asymptotic secrecy outage probability expressions are used to evaluate the EH-AF and EH-DF protocols, respectively, and are confirmed by Monte Carlo simulations. The simulation results show that (i) the EH-DF protocol outperforms the EH-AF protocol, and both proposed protocols are improved when the number of cooperative relays and the distances of the relay–eavesdropper links increase and the relays move toward the destination, (ii) the secrecy performance of the EH-AF and EH-DF protocols is the best at optimal power-splitting ratios, which are obtained by the golden section search method, (iii) the energy conversion efficiency and the noise at RF-to-baseband conversion units seriously affect the proposed protocols, and finally, (iv) the theoretical analysis results fit those of the Monte Carlo simulations.

29 citations

Journal ArticleDOI
TL;DR: A two-way decode-and-forward scheme with a relay selection method that uses digital network coding to enhance secure communication and spectrum use efficiency and the Monte-Carlo simulation results are presented to verify the theoretical analysis.
Abstract: The combination of cooperative communication and physical layer security is an effective approach to overcome the disadvantages of the fading environment as well as to increase the security capacity of the wireless network. In this paper, we propose a two-way decode-and-forward scheme with a relay selection method. In the proposed protocol, two source nodes communicate with each other with the help of intermediate relays under the eavesdropping of another wireless node, called the eavesdropper node. The best relay, which is chosen by the max---min strategy, uses digital network coding to enhance secure communication and spectrum use efficiency. The system performance is analyzed and evaluated in terms of the exact closed-form outage probability over Rayleigh fading channels. The Monte-Carlo simulation results are presented to verify the theoretical analysis. Finally, the proposed protocol is compared with the two-way protocol, which does not use digital network coding.

24 citations

Journal ArticleDOI
TL;DR: The throughput of the FDEHSN protocol is enhanced and exceeds that of the WoEH one while the impacts of residual loopback interference are serious, and the asymptotic outage probability and corresponding throughput are valid with Monte Carlo simulation results.

19 citations

Journal ArticleDOI
TL;DR: The results show performance improvement of the proposed SIC–DNC protocol because of increase of the number of the cooperative relays, decrease of the residual interference signal powers, and respect to optimal relay locations and optimal power allocation coefficients of the near source.
Abstract: In this paper, we propose a new approach based on combination of successive interference cancellation (SIC), digital network coding (DNC), and opportunistic relay selection in a two-way cooperative scheme in which two source nodes send simultaneously their packets to each other with a help of multiple relaying nodes, called as SIC–DNC protocol. In the proposed SIC–DNC protocol, the cooperative relays use the SIC technique to decode sequentially the packets from received sum signals, and then encode these packets by the DNC technique. These relays operate in the half-duplex mode, and suffer interference signals from imperfect SIC operations. A best relay is selected by the opportunistic relay selection based on taking maximization of signal-to-interference-plus-noise ratios from a successful decoding relay set to two source nodes in the last time slot. Exact and asymptotic closed-form outage probability expressions are obtained to evaluate the proposed SIC–DNC protocol, and then are verified by performing the Monte Carlo simulations. Our results show performance improvement of the proposed SIC–DNC protocol because of increase of the number of the cooperative relays, decrease of the residual interference signal powers, and respect to optimal relay locations and optimal power allocation coefficients of the near source. In addition, insightful comparisons with a conventional two-way decode-and-forward scheme are provided to prove highlight performances in asymmetric two-way cooperative schemes whereas the proposed SIC–DNC protocol owns better spectrum utilization efficiency. Finally, the simulation results are harvested to valid the exact and asymptotic analysis values.

18 citations


Cited by
More filters
01 Jan 2016
TL;DR: The table of integrals series and products is universally compatible with any devices to read and is available in the book collection an online access to it is set as public so you can get it instantly.
Abstract: Thank you very much for downloading table of integrals series and products. Maybe you have knowledge that, people have look hundreds times for their chosen books like this table of integrals series and products, but end up in harmful downloads. Rather than reading a good book with a cup of coffee in the afternoon, instead they cope with some harmful virus inside their laptop. table of integrals series and products is available in our book collection an online access to it is set as public so you can get it instantly. Our book servers saves in multiple locations, allowing you to get the most less latency time to download any of our books like this one. Merely said, the table of integrals series and products is universally compatible with any devices to read.

4,085 citations

Journal ArticleDOI
TL;DR: This work reviews recently proposed solutions in over explored and under explored areas in D2D, and provides new insights on open issues in these areas and discusses potential future research directions.
Abstract: Device-to-Device (D2D) communication has emerged as a promising technology for optimizing spectral efficiency in future cellular networks. D2D takes advantage of the proximity of communicating devices for efficient utilization of available resources, improving data rates, reducing latency, and increasing system capacity. The research community is actively investigating the D2D paradigm to realize its full potential and enable its smooth integration into the future cellular system architecture. Existing surveys on this paradigm largely focus on interference and resource management. We review recently proposed solutions in over explored and under explored areas in D2D. These solutions include protocols, algorithms, and architectures in D2D. Furthermore, we provide new insights on open issues in these areas. Finally, we discuss potential future research directions.

426 citations

01 Jan 2014
TL;DR: The fundamental limits of the interference channel are discussed and the interference alignment technique and its extension of signal alignment techniques are presented and compared to this traditional view, which treats interference as a detrimental phenomenon, are introduced.
Abstract: This article re-examines the fundamental notion of interference in wireless networks by contrasting traditional approaches to new concepts that handle interference in a creative way. Specifically, we discuss the fundamental limits of the interference channel and present the interference alignment technique and its extension of signal alignment techniques. Contrary to this traditional view, which treats interference as a detrimental phenomenon, we introduce three concepts that handle interference as a useful resource. The first concept exploits interference at the modulation level and leads to simple multiuser downlink precoding that provides significant energy savings. The second concept uses radio frequency radiation for energy harvesting and handles interference as a source of green energy. The last concept refers to a secrecy environment and uses interference as an efficient means to jam potential eavesdroppers. These three techniques bring a new vision about interference in wireless networks and motivate a plethora of potential new applications and services.

104 citations

Journal ArticleDOI
TL;DR: In the low main-user-to-eavesdropper ratio (MUER) region, the proposed ANaTWORS scheme is capable of guaranteeing secure transmissions, whereas no SRT gain is achieved by conventional one-way relaying.
Abstract: In this paper, we investigate the physical-layer security of cooperative communications relying on multiple two-way relays using the decode-and-forward (DF) protocol in the presence of an eavesdropper, where the eavesdropper appears to tap the transmissions of both the source and of the relay. The design tradeoff to be resolved is that the throughput is improved by invoking two-way relaying, but the secrecy of wireless transmissions may be degraded, since the eavesdropper may overhear the signals transmitted by both the source and relay nodes. We conceive an artificial noise aided two-way opportunistic relay selection (ANaTWORS) scheme for enhancing the security of the pair of source nodes communicating with the assistance of multiple two-way relays. Furthermore, we analyze both the outage probability and intercept probability of the proposed ANaTWORS scheme, where the security and reliability are characterized in terms of the intercept probability and the security outage probability. For comparison, we also provide the security–reliability tradeoff (SRT) analysis of both the traditional direct transmission and of the one-way relaying schemes. It is shown that the proposed ANaTWORS scheme outperforms both the conventional direct transmission, as well as the one-way relay methods in terms of its SRT. More specifically, in the low main-user-to-eavesdropper ratio (MUER) region, the proposed ANaTWORS scheme is capable of guaranteeing secure transmissions, whereas no SRT gain is achieved by conventional one-way relaying. In fact, the one-way relaying scheme may even be inferior to the traditional direct transmission scheme in terms of its SRT.

76 citations

Journal ArticleDOI
01 Mar 2019
TL;DR: Two relay selection methods to enhance system outage performance for energy harvesting (EH) based two-way relaying protocols in wireless adhoc networks are proposed and exact and asymptotic expressions of the system outage probability (SOP) for the proposed protocols over block Rayleigh fading channels are derived.
Abstract: In this paper, we propose two relay selection methods to enhance system outage performance for energy harvesting (EH) based two-way relaying protocols in wireless adhoc networks. In the proposed protocol, two source nodes communicate with each other via the assistance of multiple decode-and-forward (DF) relays using three-phase digital network coding. At the first and second phases, two sources broadcast their data to the relays. Employing a power-splitting model, the relays would harvest energy from radio frequency (RF) signals of the sources to transmit the data at the third phase. We propose a simple partial relay selection (PRS) method and an opportunistic relay selection (ORS) method to enhance the reliability of data transmission at the cooperative phase. For performance evaluation, we derive exact and asymptotic expressions of the system outage probability (SOP) for the proposed protocols over block Rayleigh fading channels. Finally, Monte Carlo simulations are presented to verify the theoretical derivations as well as to compare the performance of the proposed protocols with that of the random relay selection protocol.

60 citations