Rateless Codes-Based Secure Communication Employing Transmit Antenna Selection and Harvest-To-Jam under Joint Effect of Interference and Hardware Impairments

In this paper, we propose a rateless codes-based communication protocol to provide security for wireless systems. In the proposed protocol, a source uses the transmit antenna selection (TAS) technique to transmit Fountain-encoded packets to a destination in presence of an eavesdropper. Moreover, a c...

Full description

Bibliographic Details
Main Authors: Phu Tran Tin, Tan N. Nguyen, Nguyen Q. Sang, Tran Trung Duy, Phuong T. Tran, Miroslav Voznak
Format: Article
Language:English
Published: MDPI AG 2019-07-01
Series:Entropy
Subjects:
Online Access:https://www.mdpi.com/1099-4300/21/7/700
_version_ 1798039413281783808
author Phu Tran Tin
Tan N. Nguyen
Nguyen Q. Sang
Tran Trung Duy
Phuong T. Tran
Miroslav Voznak
author_facet Phu Tran Tin
Tan N. Nguyen
Nguyen Q. Sang
Tran Trung Duy
Phuong T. Tran
Miroslav Voznak
author_sort Phu Tran Tin
collection DOAJ
description In this paper, we propose a rateless codes-based communication protocol to provide security for wireless systems. In the proposed protocol, a source uses the transmit antenna selection (TAS) technique to transmit Fountain-encoded packets to a destination in presence of an eavesdropper. Moreover, a cooperative jammer node harvests energy from radio frequency (RF) signals of the source and the interference sources to generate jamming noises on the eavesdropper. The data transmission terminates as soon as the destination can receive a sufficient number of the encoded packets for decoding the original data of the source. To obtain secure communication, the destination must receive sufficient encoded packets before the eavesdropper. The combination of the TAS and harvest-to-jam techniques obtains the security and efficient energy via reducing the number of the data transmission, increasing the quality of the data channel, decreasing the quality of the eavesdropping channel, and supporting the energy for the jammer. The main contribution of this paper is to derive exact closed-form expressions of outage probability (OP), probability of successful and secure communication (SS), intercept probability (IP) and average number of time slots used by the source over Rayleigh fading channel under the joint impact of co-channel interference and hardware impairments. Then, Monte Carlo simulations are presented to verify the theoretical results.
first_indexed 2024-04-11T21:53:32Z
format Article
id doaj.art-e9fbb2e5753d4e3da7f1939939ef076d
institution Directory Open Access Journal
issn 1099-4300
language English
last_indexed 2024-04-11T21:53:32Z
publishDate 2019-07-01
publisher MDPI AG
record_format Article
series Entropy
spelling doaj.art-e9fbb2e5753d4e3da7f1939939ef076d2022-12-22T04:01:11ZengMDPI AGEntropy1099-43002019-07-0121770010.3390/e21070700e21070700Rateless Codes-Based Secure Communication Employing Transmit Antenna Selection and Harvest-To-Jam under Joint Effect of Interference and Hardware ImpairmentsPhu Tran Tin0Tan N. Nguyen1Nguyen Q. Sang2Tran Trung Duy3Phuong T. Tran4Miroslav Voznak5VSB—Technical University of Ostrava, 17. listopadu 15/2172, 708 33 Ostrava, Czech RepublicVSB—Technical University of Ostrava, 17. listopadu 15/2172, 708 33 Ostrava, Czech RepublicDepartment of Electrical and Electronic Engineering, Duy Tan University, DaNang City 550000, VietnamDepartment of Telecommunications, Posts and Telecommunications Institute of Technology, Ho Chi Minh City 700000, VietnamWireless Communications Research Group, Faculty of Electrical and Electronics Engineering, Ton Duc Thang University, Ho Chi Minh City 700000, VietnamVSB—Technical University of Ostrava, 17. listopadu 15/2172, 708 33 Ostrava, Czech RepublicIn this paper, we propose a rateless codes-based communication protocol to provide security for wireless systems. In the proposed protocol, a source uses the transmit antenna selection (TAS) technique to transmit Fountain-encoded packets to a destination in presence of an eavesdropper. Moreover, a cooperative jammer node harvests energy from radio frequency (RF) signals of the source and the interference sources to generate jamming noises on the eavesdropper. The data transmission terminates as soon as the destination can receive a sufficient number of the encoded packets for decoding the original data of the source. To obtain secure communication, the destination must receive sufficient encoded packets before the eavesdropper. The combination of the TAS and harvest-to-jam techniques obtains the security and efficient energy via reducing the number of the data transmission, increasing the quality of the data channel, decreasing the quality of the eavesdropping channel, and supporting the energy for the jammer. The main contribution of this paper is to derive exact closed-form expressions of outage probability (OP), probability of successful and secure communication (SS), intercept probability (IP) and average number of time slots used by the source over Rayleigh fading channel under the joint impact of co-channel interference and hardware impairments. Then, Monte Carlo simulations are presented to verify the theoretical results.https://www.mdpi.com/1099-4300/21/7/700rateless codestransmit antenna selectionenergy harvestingco-channel interferencehardware impairments
spellingShingle Phu Tran Tin
Tan N. Nguyen
Nguyen Q. Sang
Tran Trung Duy
Phuong T. Tran
Miroslav Voznak
Rateless Codes-Based Secure Communication Employing Transmit Antenna Selection and Harvest-To-Jam under Joint Effect of Interference and Hardware Impairments
Entropy
rateless codes
transmit antenna selection
energy harvesting
co-channel interference
hardware impairments
title Rateless Codes-Based Secure Communication Employing Transmit Antenna Selection and Harvest-To-Jam under Joint Effect of Interference and Hardware Impairments
title_full Rateless Codes-Based Secure Communication Employing Transmit Antenna Selection and Harvest-To-Jam under Joint Effect of Interference and Hardware Impairments
title_fullStr Rateless Codes-Based Secure Communication Employing Transmit Antenna Selection and Harvest-To-Jam under Joint Effect of Interference and Hardware Impairments
title_full_unstemmed Rateless Codes-Based Secure Communication Employing Transmit Antenna Selection and Harvest-To-Jam under Joint Effect of Interference and Hardware Impairments
title_short Rateless Codes-Based Secure Communication Employing Transmit Antenna Selection and Harvest-To-Jam under Joint Effect of Interference and Hardware Impairments
title_sort rateless codes based secure communication employing transmit antenna selection and harvest to jam under joint effect of interference and hardware impairments
topic rateless codes
transmit antenna selection
energy harvesting
co-channel interference
hardware impairments
url https://www.mdpi.com/1099-4300/21/7/700
work_keys_str_mv AT phutrantin ratelesscodesbasedsecurecommunicationemployingtransmitantennaselectionandharvesttojamunderjointeffectofinterferenceandhardwareimpairments
AT tannnguyen ratelesscodesbasedsecurecommunicationemployingtransmitantennaselectionandharvesttojamunderjointeffectofinterferenceandhardwareimpairments
AT nguyenqsang ratelesscodesbasedsecurecommunicationemployingtransmitantennaselectionandharvesttojamunderjointeffectofinterferenceandhardwareimpairments
AT trantrungduy ratelesscodesbasedsecurecommunicationemployingtransmitantennaselectionandharvesttojamunderjointeffectofinterferenceandhardwareimpairments
AT phuongttran ratelesscodesbasedsecurecommunicationemployingtransmitantennaselectionandharvesttojamunderjointeffectofinterferenceandhardwareimpairments
AT miroslavvoznak ratelesscodesbasedsecurecommunicationemployingtransmitantennaselectionandharvesttojamunderjointeffectofinterferenceandhardwareimpairments