scispace - formally typeset
Open AccessJournal ArticleDOI

Rateless Codes-Based Secure Communication Employing Transmit Antenna Selection and Harvest-To-Jam under Joint Effect of Interference and Hardware Impairments.

TLDR
The main contribution of this paper is to derive exact closed-form expressions of outage probability, probability of successful and secure communication, intercept probability, and average number of time slots used by the source over Rayleigh fading channel under the joint impact of co-channel interference and hardware impairments.
Abstract
In this paper, we propose a rateless codes-based communication protocol to provide security for wireless systems. In the proposed protocol, a source uses the transmit antenna selection (TAS) technique to transmit Fountain-encoded packets to a destination in presence of an eavesdropper. Moreover, a cooperative jammer node harvests energy from radio frequency (RF) signals of the source and the interference sources to generate jamming noises on the eavesdropper. The data transmission terminates as soon as the destination can receive a sufficient number of the encoded packets for decoding the original data of the source. To obtain secure communication, the destination must receive sufficient encoded packets before the eavesdropper. The combination of the TAS and harvest-to-jam techniques obtains the security and efficient energy via reducing the number of the data transmission, increasing the quality of the data channel, decreasing the quality of the eavesdropping channel, and supporting the energy for the jammer. The main contribution of this paper is to derive exact closed-form expressions of outage probability (OP), probability of successful and secure communication (SS), intercept probability (IP) and average number of time slots used by the source over Rayleigh fading channel under the joint impact of co-channel interference and hardware impairments. Then, Monte Carlo simulations are presented to verify the theoretical results.

read more

Citations
More filters
Journal ArticleDOI

Physical Layer Security in a Hybrid TPSR Two-Way Half-Duplex Relaying Network over a Rayleigh Fading Channel: Outage and Intercept Probability Analysis

TL;DR: In this article, the performance of a hybrid time-power splitting relaying (TPSR) two-way half-duplex (HD) relaying network over a Rayleigh fading channel is investigated in terms of the outage probability (OP) and intercept probability (IP).
Journal ArticleDOI

Security-Reliability Trade-Off Analysis for Rateless Codes-Based Relaying Protocols Using NOMA, Cooperative Jamming and Partial Relay Selection

TL;DR: In this paper, the authors proposed secure relaying transmission protocols using rateless codes, where a source sends encoded packets to two intended destinations via help of intermediate relays, and two encoded packets can be sent to the destinations at the same time.
Journal ArticleDOI

Performance Comparison between Fountain Codes-Based Secure MIMO Protocols with and without Using Non-Orthogonal Multiple Access

TL;DR: The results presented that the protocol using NOMA not only reduces TS but also obtains lower IP at medium and high transmit signal-to-noise ratios (SNRs), as compared with the corresponding protocol without using NomA.
Journal ArticleDOI

Four Constructions of Asymptotically Optimal Codebooks via Additive Characters and Multiplicative Characters

Xia Wu, +1 more
TL;DR: Four new constructions of complex codebooks with multiplicative characters, additive characters, and quadratic irreducible polynomials are presented and it is proved that the codebooks constructed are asymptotically optimal with respect to the Welch bound.
Proceedings ArticleDOI

Reliability-Security Analysis for Harvest-to-Jam based Multi-hop LEACH Networks under Impact of Hardware Noises

TL;DR: Close-form expressions of the end-to-end outage probability (OP) and intercept probability (IP) for the proposed scheme over Rayleigh fading channels are derived and the theoretical derivations are verified by Monte-Carlo simulations.
References
More filters
Journal ArticleDOI

The wire-tap channel

TL;DR: This paper finds the trade-off curve between R and d, assuming essentially perfect (“error-free”) transmission, and implies that there exists a Cs > 0, such that reliable transmission at rates up to Cs is possible in approximately perfect secrecy.
Journal ArticleDOI

Broadcast channels with confidential messages

TL;DR: Given two discrete memoryless channels (DMC's) with a common input, a single-letter characterization is given of the achievable triples where R_{e} is the equivocation rate and the related source-channel matching problem is settled.
Journal ArticleDOI

Relaying Protocols for Wireless Energy Harvesting and Information Processing

TL;DR: The numerical analysis provides practical insights into the effect of various system parameters, such as energy harvesting time, power splitting ratio, source transmission rate, source to relay distance, noise power, and energy harvesting efficiency, on the performance of wireless energy harvesting and information processing using AF relay nodes.
Journal ArticleDOI

Relaying Protocols for Wireless Energy Harvesting and Information Processing

TL;DR: In this article, two relaying protocols, namely, time switching-based relaying (TSR) and power splitting-based relay (PSR), are proposed to enable energy harvesting and information processing at the relay.
Journal ArticleDOI

On the Secrecy Capacity of Fading Channels

TL;DR: The positive impact of fading on the secrecy capacity is revealed and the critical role of rate adaptation, based on the main channel CSI, in facilitating secure communications over slow fading channels is established.
Related Papers (5)