LE QUY DON
Technical University
VietnameseClear Cookie - decide language by browser settings

Secrecy performance evaluation of TAS protocol exploiting fountain codes and cooperative jamming under impact of hardware impairments

The Hung, D. and Trung Duy, T. and Quoc Trinh, D. and Quoc Bao, V.N. (2018) Secrecy performance evaluation of TAS protocol exploiting fountain codes and cooperative jamming under impact of hardware impairments. In: 2nd International Conference on Recent Advances in Signal Processing, Telecommunications and Computing, SIGTELCOM 2018, 29 January 2018 through 31 January 2018.

Full text not available from this repository. (Upload)

Abstract

In this paper, we propose a transmit antenna selection (TAS) protocol exploiting Fountain codes for secure communication. In the proposed protocol, a base station (BS) selects its best antenna to transmit Fountain packets to a legitimate user (US). Moreover, a cooperative jammer (JA) is used to generate artificial noises to an eavesdropper (EA). The transmission between BS and US will terminate as soon as US can receive a sufficient number of the encoded packets for decoding the original message. To obtain a secure communication, US must receive enough the number of the packets before EA can. Under impact of hardware noises at all of the nodes, we derive expressions of probability of successful and secure communication (SSC), intercept probability (IP) and average number of the packets transmitted by BS over Rayleigh fading channel. Monte Carlo simulations are presented to verify the theoretical results. © 2018 IEEE.

Item Type: Conference or Workshop Item (Paper)
Divisions: Faculties > Faculty of Aerospace Engineering
Faculties > Faculty of Radio-Electronic Engineering
Identification Number: 10.1109/SIGTELCOM.2018.8325783
Uncontrolled Keywords: Antennas; Codes (symbols); Fading channels; Forward error correction; Hardware; Intelligent systems; Jamming; Monte Carlo methods; Network layers; Rayleigh fading; Secure communication; Artificial noise; Average numbers; Cooperative jamming; Fountain codes; Legitimate users; Performance evaluations; Physical layer security; Transmit antenna selection; Signal processing
Additional Information: Conference code: 135592. Language of original document: English.
URI: http://eprints.lqdtu.edu.vn/id/eprint/9582

Actions (login required)

View Item
View Item