Security-Reliability Analysis of Noma-Based Multi-Hop Relay Networks in Presence of an Active Eavesdropper with Imperfect Eavesdropping CSI
In this paper, we evaluate system performances of a multi-hop relay protocol with presence of an active eavesdropper. In the proposed protocol, a source attempts to transmit its data to a destination with assistance of multiple intermediate relays. From the eavesdropping Channel State Information (C...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
VSB-Technical University of Ostrava
2017-01-01
|
Series: | Advances in Electrical and Electronic Engineering |
Subjects: | |
Online Access: | http://advances.utc.sk/index.php/AEEE/article/view/2386 |
_version_ | 1797826952582660096 |
---|---|
author | Tran Tin Phu The Hung Dang Trung Duy Tran Miroslav Voznak |
author_facet | Tran Tin Phu The Hung Dang Trung Duy Tran Miroslav Voznak |
author_sort | Tran Tin Phu |
collection | DOAJ |
description | In this paper, we evaluate system performances of a multi-hop relay protocol with presence of an active eavesdropper. In the proposed protocol, a source attempts to transmit its data to a destination with assistance of multiple intermediate relays. From the eavesdropping Channel State Information (CSI) estimated, the source and relays adjust their transmit power so that the eavesdropper cannot overhear the transmitted data. Moreover, to enhance throughput for the proposed system, Non-Orthogonal Multiple Access (NOMA) technique with a simple power allocation is also proposed. We derive exact closed-form expressions of the Outage Probability (OP) and throughput for the data transmission over Rayleigh fading channel. In addition, when the CSI estimation is imperfect, Intercept Probability (IP) at the eavesdropper is derived. Finally, Monte Carlo simulations are presented to verify the theoretical derivations. |
first_indexed | 2024-04-09T12:41:39Z |
format | Article |
id | doaj.art-28ada3b396044a468bc20a23e0320a85 |
institution | Directory Open Access Journal |
issn | 1336-1376 1804-3119 |
language | English |
last_indexed | 2024-04-09T12:41:39Z |
publishDate | 2017-01-01 |
publisher | VSB-Technical University of Ostrava |
record_format | Article |
series | Advances in Electrical and Electronic Engineering |
spelling | doaj.art-28ada3b396044a468bc20a23e0320a852023-05-14T20:50:11ZengVSB-Technical University of OstravaAdvances in Electrical and Electronic Engineering1336-13761804-31192017-01-0115459159710.15598/aeee.v15i4.2386933Security-Reliability Analysis of Noma-Based Multi-Hop Relay Networks in Presence of an Active Eavesdropper with Imperfect Eavesdropping CSITran Tin Phu0The Hung Dang1Trung Duy Tran2Miroslav Voznak3Wireless Communications Research Group, Ton Duc Thang University, No. 19 Nguyen Huu Tho Street, Tan Phong Ward, District 7, Ho Chi Minh City, Vietnam & Faculty of Electrical and Electronics Engineering, Ton Duc Thang University, No.19 Nguyen Huu Tho Street, Tan Phong Ward, District 7, Ho Chi Minh City, VietnamFaculty of Radio-Electronics Engineering, Le Quy Don Technical University, 236 Hoang Quoc Viet street, Cau Giay District, Hanoi, VietnamDepartment of Telecommunications, Posts and Telecommunications Institute of Technology, 11 Nguyen Dinh Chieu Street, Ho Chi Minh City, VietnamDepartment of Telecommunications, Faculty of Electrical Engineering and Computer Science, VSB-Technical university of Ostrava, 17. listopadu 15, 708 33 Ostrava, Czech RepublicIn this paper, we evaluate system performances of a multi-hop relay protocol with presence of an active eavesdropper. In the proposed protocol, a source attempts to transmit its data to a destination with assistance of multiple intermediate relays. From the eavesdropping Channel State Information (CSI) estimated, the source and relays adjust their transmit power so that the eavesdropper cannot overhear the transmitted data. Moreover, to enhance throughput for the proposed system, Non-Orthogonal Multiple Access (NOMA) technique with a simple power allocation is also proposed. We derive exact closed-form expressions of the Outage Probability (OP) and throughput for the data transmission over Rayleigh fading channel. In addition, when the CSI estimation is imperfect, Intercept Probability (IP) at the eavesdropper is derived. Finally, Monte Carlo simulations are presented to verify the theoretical derivations.http://advances.utc.sk/index.php/AEEE/article/view/2386intercept probabilitymulti-hop relay protocolnon-orthogonal multiple accessoutage probabilityphysical-layer securitythroughput. |
spellingShingle | Tran Tin Phu The Hung Dang Trung Duy Tran Miroslav Voznak Security-Reliability Analysis of Noma-Based Multi-Hop Relay Networks in Presence of an Active Eavesdropper with Imperfect Eavesdropping CSI Advances in Electrical and Electronic Engineering intercept probability multi-hop relay protocol non-orthogonal multiple access outage probability physical-layer security throughput. |
title | Security-Reliability Analysis of Noma-Based Multi-Hop Relay Networks in Presence of an Active Eavesdropper with Imperfect Eavesdropping CSI |
title_full | Security-Reliability Analysis of Noma-Based Multi-Hop Relay Networks in Presence of an Active Eavesdropper with Imperfect Eavesdropping CSI |
title_fullStr | Security-Reliability Analysis of Noma-Based Multi-Hop Relay Networks in Presence of an Active Eavesdropper with Imperfect Eavesdropping CSI |
title_full_unstemmed | Security-Reliability Analysis of Noma-Based Multi-Hop Relay Networks in Presence of an Active Eavesdropper with Imperfect Eavesdropping CSI |
title_short | Security-Reliability Analysis of Noma-Based Multi-Hop Relay Networks in Presence of an Active Eavesdropper with Imperfect Eavesdropping CSI |
title_sort | security reliability analysis of noma based multi hop relay networks in presence of an active eavesdropper with imperfect eavesdropping csi |
topic | intercept probability multi-hop relay protocol non-orthogonal multiple access outage probability physical-layer security throughput. |
url | http://advances.utc.sk/index.php/AEEE/article/view/2386 |
work_keys_str_mv | AT trantinphu securityreliabilityanalysisofnomabasedmultihoprelaynetworksinpresenceofanactiveeavesdropperwithimperfecteavesdroppingcsi AT thehungdang securityreliabilityanalysisofnomabasedmultihoprelaynetworksinpresenceofanactiveeavesdropperwithimperfecteavesdroppingcsi AT trungduytran securityreliabilityanalysisofnomabasedmultihoprelaynetworksinpresenceofanactiveeavesdropperwithimperfecteavesdroppingcsi AT miroslavvoznak securityreliabilityanalysisofnomabasedmultihoprelaynetworksinpresenceofanactiveeavesdropperwithimperfecteavesdroppingcsi |