Next Article in Journal
A Security Enhanced Encryption Scheme and Evaluation of Its Cryptographic Security
Previous Article in Journal
Multivariate Pointwise Information-Driven Data Sampling and Visualization
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Rateless Codes-Based Secure Communication Employing Transmit Antenna Selection and Harvest-To-Jam under Joint Effect of Interference and Hardware Impairments

1
VSB—Technical University of Ostrava, 17. listopadu 15/2172, 708 33 Ostrava, Czech Republic
2
Faculty of Electronics Technology, Industrial University of Ho Chi Minh City, Ho Chi Minh City 700000, Vietnam
3
Department of Electrical and Electronic Engineering, Duy Tan University, DaNang City 550000, Vietnam
4
Department of Telecommunications, Posts and Telecommunications Institute of Technology, Ho Chi Minh City 700000, Vietnam
5
Wireless Communications Research Group, Faculty of Electrical and Electronics Engineering, Ton Duc Thang University, Ho Chi Minh City 700000, Vietnam
*
Author to whom correspondence should be addressed.
Entropy 2019, 21(7), 700; https://doi.org/10.3390/e21070700
Submission received: 30 May 2019 / Revised: 7 July 2019 / Accepted: 11 July 2019 / Published: 16 July 2019
(This article belongs to the Section Information Theory, Probability and Statistics)

Abstract

:
In this paper, we propose a rateless codes-based communication protocol to provide security for wireless systems. In the proposed protocol, a source uses the transmit antenna selection (TAS) technique to transmit Fountain-encoded packets to a destination in presence of an eavesdropper. Moreover, a cooperative jammer node harvests energy from radio frequency (RF) signals of the source and the interference sources to generate jamming noises on the eavesdropper. The data transmission terminates as soon as the destination can receive a sufficient number of the encoded packets for decoding the original data of the source. To obtain secure communication, the destination must receive sufficient encoded packets before the eavesdropper. The combination of the TAS and harvest-to-jam techniques obtains the security and efficient energy via reducing the number of the data transmission, increasing the quality of the data channel, decreasing the quality of the eavesdropping channel, and supporting the energy for the jammer. The main contribution of this paper is to derive exact closed-form expressions of outage probability (OP), probability of successful and secure communication (SS), intercept probability (IP) and average number of time slots used by the source over Rayleigh fading channel under the joint impact of co-channel interference and hardware impairments. Then, Monte Carlo simulations are presented to verify the theoretical results.

Graphical Abstract

1. Introduction

Physical-layer security (PLS) [1,2,3,4] has attracted much attention of the researchers as an efficient method to attain security. Due to the simple implementation, i.e., only exploiting characteristics of wireless medium such as link distance and channel state information (CSI), PLS can be implemented efficiently in wireless sensor networks (WSNs), internet-of-things (IoT) networks, etc. [5,6,7,8]. To enhance the secrecy performance, diversity transmission methods can be employed. In [9,10,11,12], MIMO-based transmit–receive methods such as Transmit Antenna Selection-Maximal Ratio Combining (TAS-MRC), Maximal Ratio Transmission-MRC (MRT-MRC), MRT-Selection Combining (MRT-SC), MRT-SC were proposed and analyzed. In addition, performance of secure communication protocols can be also enhanced with cooperative relaying methods [13,14,15,16]. In [17,18,19,20], the authors proposed cooperative jamming (CJ) techniques to reduce quality of the eavesdropping channels, where friendly jammers are employed to generate artificial noises on the eavesdropper, and the legitimate receivers have to cooperate with the jammers to remove the interference in the received signals. The results presented that the schemes which combine the diversity transmission and the jamming techniques outperform the conventional cooperative ones without using CJ. However, energy efficiency may become a critical issue when the jammer nodes continuously transmit the artificial noises by using their own energy. Recently, radio frequency (RF) energy harvesting (EH) is an efficient method to prolong lifetime for wireless networks [21,22,23,24]. Particularly, the wireless devices can harvest energy from full-energy nodes [21,22] or from power stations deployed in networks [25,26] or even from co-channel interferences caused by outside sources [27,28]. References [20,29] proposed and analyzed performance of RF-EH-based secure communication protocols. To support energy for the jammer nodes, the authors of [20,29] proposed harvest-to-jam (HJ) methods, where the cooperative jammers harvest energy from the RF signals, and then use it to generate artificial noises.
Rateless codes or Fountain codes (FCs) [30,31,32,33] have drawn much attention due to their simple implementation. In FCs, a transmitter uses Fountain encoder to generate a limitless number of encoded packets, and then transmit them to intended receivers. If the receivers can receive a sufficient number of the encoded packets, they can recover the original message of the transmitter. Due to broadcast of the wireless channels, the encoded packets can be overheard by eavesdroppers. Therefore, the security becomes a critical issue for the FCs-based communication systems. Recently, some published works considering the secure communication protocols with FCs have been reported in [34,35,36]. In [34], the authors proposed a secure delivery scheme, in which the security can be achieved if the legitimate user receives enough Fountain packets before the eavesdropper. In [35], a dynamic Fountain-encoded at a transmitter was proposed to enhance the data security. The authors of [36] proposed a FC-based cooperative relay protocol. In [36], the source and the jammer cooperate to remove the interference components in the received signals at the destination. Reference [37] proposed an efficient FCs-based multicast scenario to achieve security for Internet of Things (IoT) systems.
In this paper, we propose a FCs based secure communication protocol, where a multi-antenna source selects its best antenna to transmit the encoded packets to a single-antenna destination, in presence of a single-antenna eavesdropper who attempts to overhear the source information. When the destination can receive sufficient encoded packets for decoding the original data, it would send a feedback to the source to terminate the transmission. As a result, to obtain the secure transmission, the destination must receive a sufficient number of the encoded packets before the eavesdropper. Otherwise, the original information is intercepted. The main contributions of this paper can be summarized as follows:
  • To the best of our knowledge, we first propose the FCs based communication protocol using the harvest-to-jam based cooperative jamming technique to reduce the quality of the eavesdropping link. Different with [34,35,36,37], we propose a cooperative jamming technique, where a cooperative jammer node harvests energy from the RF signals of the source and the interference sources to generate noises to the eavesdropper. Different with our previous works [38,39], in the proposed protocol, there exist interference sources in the network that cause co-channel interferences on both the destination and the eavesdropper.
  • Until now, almost published works related to secrecy performance evaluation have assumed that the transceiver hardware of the wireless devices is perfect. However, in practice, it is not perfect due to phase noise, I/Q imbalance (IQI), amplifier non-linearity [40,41,42,43]. In this paper, the joint impact of hardware noises and co-channel interference on the system performances is investigated.
  • For performance evaluation, we derive exact closed-form expressions of outage probability (OP), probability of successful and secure communication (SS), intercept probability (IP) and average number of the time slots used by the source over Rayleigh fading channel. The closed-form formulas are easy-to-compute, and hence they can be easily used to design and optimize the considered system. In addition, all of the derived expressions are verified by Monte Carlo simulations.
The rest of this paper is organized as follows. The system model of the proposed protocols is described in Section 2. In Section 3, we evaluate performance of the proposed scheme. The simulation results are shown in Section 4. Finally, this paper is concluded in Section 5.

2. System Model

Figure 1 illustrates the system model of the proposed protocol, where the source node (S) equipped with M antennas communicates with the single-antenna destination (D), in presence of the single-antenna eavesdropper (E) who attempts to overhear the source data. All of the receivers such as D and E are suffered from co-channel interference caused by K ambient sources (denoted by I 1 , I 2 , , I K ). To reduce the quality of the eavesdropping link, the cooperative jamming technique can be used, where the single antenna jammer (J) is employed to continuously generate the artificial noises to E. We assume that the nodes D and J are close with each other so that D can remove the co-channel interference generated by J [38]. Moreover, the jammer (J) uses the energy harvested from the RF signals of the source and the interference sources for transmitting the jamming signals.
The source divides its original data into L packets which are encoded appropriately to create the encoded packets. Then, at each time slot, the source uses the TAS technique to send each encoded packet to the destination. At the same time, the eavesdropper tries to receive the encoded packet. The destination and the eavesdropper are assumed to be able to successfully obtain the original data if they can correctly receive at least H encoded packets, where H = 1 + ε L , and ε is the decoding overhead which depends on concrete code design. Moreover, after the destination receives sufficient number of the encoded packets, it will send an ACK message to inform the source to stop the data transmission. In this case, if the eavesdropper cannot obtain enough number of the encoded packets, it cannot obtain the source data. Otherwise, the original data of the source will be intercepted.
Let us consider the data transmission at an arbitrary time slot. Let h S m D , h S m E and h S m J denote channel coefficients between the m th antenna of the source and the nodes D, E and J, respectively, where m = 1 , 2 , , M . We also denote h I k D , h I k E , h I k J and h JE as channel gains of the I k D , I k E , I k J and J E links, respectively, where k = 1 , 2 , , K . We assume that all of the link channels are block and flat Rayleigh fading which keeps constant in a time slot but independently changes over time slots. Therefore, the channel gains γ XY = | h XY | 2 , X , Y S m , D , E , J , I k are exponential random variables (RVs) whose cumulative distribution function (CDF) and probability density function (PDF) are given, respectively as
F γ XY z = 1 exp λ XY x , f γ XY z = λ XY exp λ XY x ,
where λ XY is a parameter of γ XY , i.e., λ XY = 1 / E γ XY , and E . is an expected operator. We can assume that the RVs γ S m D γ S m E , γ S m J are independent and identical, i.e., λ S m D = λ SD λ S m E = λ SE , λ S m J = λ SJ for all m. On the contrary, the RVs γ I k D γ I k E , γ I k J are assumed to be independent and non-identical, i.e., λ I k D λ I l D λ I k E λ I l E , λ I k J λ I l J as k l , where l 1 , 2 , , K .
With the TAS technique, the source selects the best transmit antenna to send the encoded packet to the destination, using the following method:
b = arg max m = 1 , 2 , , M γ S m D ,
where b 1 , 2 , , M .
Moreover, the CDF of γ S b D can be obtained as
F γ S b D x = Pr max m = 1 , 2 , , M γ S m D < x = 1 exp λ SD x M = 1 + m = 1 M 1 m C M m exp m λ SD x ,
where C M m = M ! / m ! / M m ! is a binomial coefficient.
Let us denote T as a block time of each time slot: a duration of α T 0 α 1 is used for the jammer node to harvest the energy from the source and the interference sources, and the remaining time 1 α T is spent for the data transmission. Then, the energy harvested by the jammer is expressed as
EH = η α T P S γ S b J + k = 1 K P I k γ I k J ,
where η 0 η 1 is an energy conversion efficiency, P S and P I k are transmit power of the source (S) and the interference sources I k , respectively.
Next, the average transmit power of the jammer used for the data transmission phase can be formulated by
P J = EH 1 α T = χ P S γ S b J + k = 1 K P I k γ I k J ,
where χ = η α / 1 α .
It is worth noting that the implementation of the TAS method is simpler than that of the MRT method because it only requires the index of the best antenna which can be feed-backed by the destination (not feedback all of the channel state information (CSI) as in MRT). Moreover, the best transmit antenna selection can be performed before the EH phase, and the time used for this process can be ignored as compared with the EH and packet transmission phases. Finally, the source uses the selected antenna during each time slot for both the EH and data transmission purposes due to scheduling issues, e.g., the source uses the remaining antennas to serve other destinations.
Let us denote U as the length of each encoded packet. If the source sends the signal x S l l = 1 , 2 , , U to the destination, the received signals at the destination and the eavesdropper can be expressed, respectively as
y D = P S h S b D x S l + ν D l + P J h JD x J l + k = 1 K P I k h I k D x I k l + n D l , y E = P S h S b E x S l + ν E l + P J h JE x J l + k = 1 K P I k h I k E x I k l + n E l ,
where l = 1 , 2 , , U , ν D l and ν E l are hardware noises caused by impairments, x J l and x I k l are signals transmitted by the nodes J and I k , respectively, and n D l and n E l are additive white Gaussian noises (AWGNs) at D and E, respectively. The hardware noises ν D l and ν E l can be modeled as Gaussian RVs with zero-mean and variances of κ D 2 and κ E 2 , respectively, where κ D 2 and κ E 2 is total hardware impairment levels of the S b D and S b E links, respectively.
Because the nodes D and J are close with each other so that we can assume that D knows x J l , h JD and P J via securely exchanging local messages with J. Therefore, D can remove the interference component P J h JD x J l from the received signal y D . Once D can perfectly remove the interference, the instantaneous signal-to-interference-plus-noise ratio (SINR) received by the destination under joint impact of co-channel interference and hardware impairments can be formulated as [44]
Ψ D = P S γ S b D κ D 2 P S γ S b D + k = 1 K P I k γ I k D + N 0 = Q S γ S b D κ D 2 Q S γ S b D + k = 1 K Q I k γ I k D + 1 ,
where N 0 is variance of additive noises n D l which are assumed to be same at all of the receivers, Q S = P S / N 0 and Q I k = P I k / N 0 .
Because the eavesdropper cannot remove the jamming signals, the instantaneous SINR obtained at this node is given as
Ψ E = P S γ S b E κ E 2 P S γ S b E + P J γ JE + k = 1 K P I k γ I k D + N 0 .
Substituting (5) into (8), we obtain
Ψ E = Q S γ S b E κ E 2 Q S γ S b E + χ Q S γ S b J + k = 1 K Q I k γ I k J γ JE + k = 1 K Q I k γ I k E + 1 .
Next, we can give expressions of the data rate for the data and eavesdropping links, respectively by
C D = 1 α Tlog 2 1 + Ψ D , C E = 1 α Tlog 2 1 + Ψ E .
Assume that each encoded packet can be decoded successfully if the achievable data rate is higher than a predetermined target rate (denoted by C th ). Otherwise, the encoded packet cannot be received correctly. Hence, the probability that the destination cannot receive one encoded packet correctly is formulated as
Pr C D < C th = Pr Ψ D < θ th = Δ ρ D ,
where
θ th = 2 C th 1 α T 1 .
Note that the probability of the successful decoding for one encoded packet at D is Pr C D C th = 1 ρ D . Similarly, the probability that one encoded packet can be received correctly and incorrectly by the eavesdropper is given, respectively as
Pr C E < C th = Pr Ψ E < θ th = Δ ρ E , Pr C E C th = Pr Ψ E θ th = 1 ρ E .
Considering a delay-constrained system where the maximum number of time slots that can be used for transmitting the encoded packets is limited by N th N th H . This means that the destination cannot recover the original data if it cannot successfully receive H encoded packets within N th time slots. Let us denote N S H N S N th as the number of time slots used by the source (or the number of the encoded packets sent by the source), N D and N E as the number of the encoded packets received by the nodes D and E, respectively, after the source stops its transmission. Then, the outage probability (OP) at the destination is formulated by
OP = Pr N D < H | N S = N th .
Next, the probability that the source-destination transmission is successful and secure (SS) is defined as
SS = Pr N D = H , N E < H | N S N th .
Equation (15) implies that the destination can receive sufficient number of the encoded packets N D = H before the eavesdropper N E < H when the number of time slots used is less than or equal to N th N S N th .
Let us consider the intercept probability (IP) defined as the probability that the eavesdropper can obtain H encoded packets before or at same time with the destination:
IP = Pr N E = H , N D H | N S N th .
We note from (16) that when the eavesdropper obtains H encoded packets, it does not need to receive more encoded packets, regardless of whether the source will transmit the encoded packets in the next time slots. Instead, it will start to decode the original data of the source. Finally, we study the average number of the time slots used to transmit encoded packets to the destination, which can be formulated by
TS = v = 0 H 1 N th Pr N D = v | N S = N th + t = H N th t Pr N D = H | N S = t .
In (17), Pr N D = v | N S = N th is the probability that the number of the encoded packets received at the destination is v 0 v < H when the source used N th time slots (the destination is in outage), and Pr N D = H | N S = t is the probability that D can obtain sufficient number of the encoded packets within t time slots, where H t N th (the data transmission is successful).

3. Performance Analysis

3.1. Derivations of ρ D and ρ E

Proposition 1.
If 1 κ D 2 θ th 0 , then ρ D = 1 , and if 1 κ D 2 θ th > 0 , ρ D can be expressed by an exact closed-form formula as
ρ D = 1 + m = 1 M 1 m C M m exp m λ SD ω 0 k = 1 K λ I k D λ I k D + m λ SD ω k .
Proof. 
See the proof and notations in Appendix A. □
Proposition 2.
If 1 κ E 2 θ th 0 , then ρ E = 1 , and if 1 κ E 2 θ th > 0 , we can obtain an exact closed-form expression of ρ E as
ρ E = 1 k = 1 K λ I k E λ I k E + λ SE ϑ k exp λ SE ϑ 0 × λ JE Ω SJ λ SE β 0 exp λ JE Ω SJ λ SE E 1 λ JE Ω SJ λ SE + k = 1 K λ JE Ω I k J λ SE β k exp λ JE Ω I k J λ SE E 1 λ JE Ω I k J λ SE .
Proof. 
See the proof and notations in Appendix B. □
In case where α = 0 , Equation (19) reduces to
ρ E = 1 k = 1 K λ I k E λ I k E + λ SE ϑ k exp λ SE ϑ 0 .

3.2. Analysis of Outage Probability (OP)

As defined in (14), an exact closed-form expression of OP can be provided as follows:
OP = N D = 0 H 1 C N th N D 1 ρ D N D ρ D N th N D .
It is noted from (21) that the possible values of N D are from 0 to H 1 , and there are C N th N D possible cases for each value of N D .

3.3. Analysis of Successful and Secure Communication (SS)

From (15), we can rewrite SS by
SS = u = H N th Pr N D = H | N S = u × t = 0 H 1 Pr N E = t | N S = u .
In (22), Pr N D = H | N S = u is the probability that the destination can correctly receive H encoded packets when the number of time slots used is u. Since the data transmission between the source and the destination ends in the u th time slot, Pr N D = H | N S = u is given as
Pr N D = H | N S = u = C u 1 u H 1 ρ D H ρ D u H .
Moreover, Pr N E = t | N S = u in (22) presents the probability that the number of encoded packets obtained at the eavesdropper is t. Similar to (21), we have
Pr N E = t | N S = u = C u t 1 ρ E t ρ E u t .
Substituting (23) and (24) into (22), an exact closed-form expression of SS can be given as
SS = u = H N th C u 1 u H 1 ρ D H ρ D u H × t = 0 H 1 C u t 1 ρ E t ρ E u t .

3.4. Analysis of Intercept Probability (IP)

The intercept probability (IP) in (16) is given by
IP = u = H N th Pr N E = H | N S = u × Pr N D = H | N S = u + v = 0 H 1 Pr N D = v | N S = u .
In (26), Pr N E = H | N S = u is the probability that the eavesdropper can receive sufficient number of the encoded packets in u time slots, which can be calculated similarly to (23) as
Pr N E = H | N S = u = C u 1 u H 1 ρ E H ρ E u H .
Next, Pr N D = H | N S = u in (26) is calculated by (23), and Pr N D = v | N S = u in (26) can be obtained by
Pr N D = v | N S = u = C u v 1 ρ D v ρ D u v .
Plugging (23), (26), (27) and (28) together, we obtain
IP = u = H N th C u 1 u H 1 ρ E H ρ E u H × C u 1 u H 1 ρ D H ρ D u H + v = 0 H 1 C u v 1 ρ D v ρ D u v .

3.5. Analysis of Average Number of Time Slots (TS)

Similarly, the probability Pr N D = v | N S = N th and Pr N D = H | N S = t in (17) can be calculated respectively as
Pr N D = v | N S = N th = C N th v 1 ρ D v ρ D N th H , Pr N D = H | N S = t = C t 1 t H 1 ρ D H ρ D t H .
Substituting (30) into (17), we obtain an exact closed-form formula for the average number of time slots used by the source as
TS = N th v = 0 H 1 C N th v 1 ρ D v ρ D N th v + t = H N th t C t 1 t H 1 ρ D H ρ D t H .

4. Simulation Results

In this section, Monte Carlo simulations are presented to verify the theoretical results. For illustration purpose, in all of the simulations, we fix the required number of the encoded packets by 10 H = 10 , the energy conversion efficiency by 1 η = 1 , the total block time by 1 T = 1 , the number of the interference sources by 3 K = 3 , the parameters of the interference links by λ I 1 D = λ I 1 E = λ I 1 J = 3 , λ I 2 D = λ I 2 E = λ I 2 J = 4 and λ I 3 D = λ I 3 E = λ I 3 J = 5 , and the parameters of the remaining links by 1 λ SD = λ SE = λ SJ = λ JE = 1 . In the figures, the simulation and theoretical results are denoted by Sim and Theo, respectively.
In Figure 2, we present the probability ρ D and ρ E as a function of Q S in dB. In this figure, the number of antenna equipped by the source is set to 3 M = 3 , the fraction of time allocated for the EH phase is fixed by 0.3 α = 0.3 , the hardware impairment levels are assigned by κ D 2 = κ E 2 = 0.1 , and the target rate is set to 0.75 C th = 0.75 . It can be seen from Figure 2 that ρ D and ρ E decrease with the increasing of Q S and the decreasing of Q I . However, ρ D is much smaller than ρ E at medium and high Q S regimes. We also obverse that the simulation and theoretical results are in good agreement, which validates our derivations.
Figure 3 presents outage performance of the proposed protocol as a function of Q S in dB with Q I = 7.5 dB, M = 2 , α = 0.1 , κ D 2 = κ E 2 = 0 and C th = 1 . It is shown in Figure 3 that the impact of the co-channel interference on the performance is negative, i.e., the value of OP is very high at low Q S regimes. In particularly, when the value of Q S is lower than that of Q I , OP is almost equal to 1. We can also observe that the outage performance is better with high value of N th because the source has more time slots to transmit the encoded packets to the destination.
In Figure 4, we present the value of SS as a function of Q S in dB when Q I = 10 dB , α = 0.1 , κ D 2 = 0.1 , κ E 2 = 0 , N th = 20 and C th = 1.5 . We can see that the proposed protocol obtains higher value of SS when more antennas are equipped at the source. It is also seen that when M = 1 , the SS performance is significantly degraded because no transmit diversity gain is obtained. Moreover, SS also increases as increasing Q S . It is due to the fact that at high Q S values, the destination almost obtains sufficient number of the encoded packets before the eavesdropper. However, it can be seen from Figure 4 that when the value of Q S is very high, the value of SS slightly decreases due to high overhearing possibility of the eavesdropper. Moreover, the SS performance in all values of M ( M > 1 ) is almost same at high Q S regimes.
In Figure 5, the value of SS is presented as a function of α when Q S = Q I = 15 dB, M = 3 , κ E 2 = 0.1 , N th = 15 and C th = 0.7 . As we can see, the performance significantly degrades with high hardware impairment levels of the data links, i.e., κ D 2 is high. Moreover, we can observe from that the fraction of time allocated for the EH phase impacts on the value of SS. It can be seen that there exists an optimal value of α at which the value of SS is highest.
In Figure 6, the intercept probability of the proposed protocol is presented as a function of M when Q S = Q I = 20 dB, κ D 2 = 0.2 , α = 0.3 , N th = 20 and C th = 0.5 . As we can see, the value of IP decreases when more antennas are equipped at the source. Also, IP is lower when the hardware impairment level of the eavesdropping links is high.
Figure 7 investigates impact of N th on the intercept probability as Q S = Q I = 20 dB, M = 2 , κ D 2 = κ E 2 = 0 , and C th = 0.5 . It can be seen that the value of IP is higher when the number of N th increases. However, when the number of N th is high enough, IP converges to a constant. As expected, IP is lower when more time used for the EH phase (because the transmit power of the jammer is higher).
Figure 8 presents OP and IP as a function of α when Q S = Q I = 15 dB, M = 4 , κ D 2 = κ E 2 = 0 and N th = 16 . We can see that there exists a trade-off between OP and IP. Indeed, OP increases when increasing the value of α , while IP decreases with higher value of α . We can also see that when C th = 0.8 , OP is below 10 3 when the value of α is higher than (about) 0.15, but the intercept probability is higher than 2.5 × 10 3 . In addition, OP significantly decreases as decreasing the value of C th .
Figure 9 shows the trade-off between OP and IP when Q S = Q I = 15 dB, M = 3 , κ D 2 = κ E 2 = 0.1 and C th = 0.75 . As we can observe, when the cooperative jamming technique is not used α = 0 , the OP value is lower but the IP one is higher. Similarly, to increase the reliability of the data transmission, we can increase the number of N th . However, the intercept possibility of the eavesdropper also increases with higher value of N th .
In Figure 10, we present average number of the time slots as a function of Q S in dB when Q I = 10 dB, α = 0.2 , κ D 2 = κ E 2 = 0.05 , N th = 17 and C th = 1 . We see that the number of time slots used decreases when increasing the number of antennas and the transmit power of the source. It is also seen that as the source has a single antenna ( M = 1 ), the average number of time slots is much higher. Moreover, reducing the number of time slots means reducing the delay time and transmit power, which are an important metric of wireless communication systems.
From Figure 3, Figure 4, Figure 5, Figure 6, Figure 7, Figure 8, Figure 9 and Figure 10, it is worth noting that the theoretical results and simulation results are in good agreement which validates the theoretical derivations.

5. Conclusions

In this paper, we proposed an FC-based MISO scheme using the TAS and EH-based cooperative jamming techniques for the secure communication under the joint impact of hardware impairments and co-channel interference. The performance of the proposed scheme such as outage probability (OP), probability of successful and secure communication (SS), intercept probability (IP) and average number of the time slots was evaluated via both simulation and theory. The results presented that the hardware impairment levels, the co-channel interference, the fraction of time allocated for the EH phase and the number of transmit antennas at the source significantly impact on the system performance. Moreover, there exists a trade-off between the security and reliability, i.e., between OP and IP. Finally, the fraction of time allocated for the EH phase should be designed appropriately to optimize system performance.

Author Contributions

The main contributions of P.T.T. (Phu Tran Tin) and P.T.T. (Phuong T. Tran) were to create the main ideas and execute performance evaluation by simulations, while the main contributions of T.T.D., T.N.N., M.V. and N.Q.S. are to discuss, create, and advise the main ideas and performance evaluations together.

Funding

This research received support from the grant SGS reg. No. SP2019/41 conducted at VSB Technical University of Ostrava, Czech Republic, and is funded by Vietnam National Foundation for Science and Technology Development (NAFOSTED) under grant number 102.04-2017.317.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A. Proof of Proposition 1

From (7) and (11), we obtain
ρ D = Pr Q S γ S b D κ D 2 Q S γ S b D + k = 1 K Q I k γ I k D + 1 < θ th = Pr 1 κ D 2 θ th Q S γ S b D < k = 1 K Q I k θ th γ I k D + θ th .
From (A1), we observe that if 1 κ D 2 θ th 0 , then ρ D = 1 ; and if 1 κ D 2 θ th > 0 , we can rewrite (A1) as
ρ D = Pr γ S b D < k = 1 K ω k γ I k D + ω 0 ,
where
ω 0 = θ th 1 κ D 2 θ th Q S , ω k = θ th Q I k 1 κ D 2 θ th Q S .
Moreover, Equation (A2) can be rewritten by
ρ D = 0 + 0 + F γ S b D k = 1 K ω k x k + ω 0 f γ I 1 D x 1 f γ I K D x K d x 1 d x K .
Using the CDF obtained by (3), we have
F γ S b D k = 1 K ω k x k + ω 0 = 1 + m = 1 M 1 m C M m exp m λ SD ω 0 exp m λ SD k = 1 K ω k x k .
Substituting (A5) and the PDF of γ I k D in (1); after some manipulations, we can obtain (18), and finish the proof here.

Appendix B. Proof of Proposition 2

Combining (9) and (13), we have
ρ E = Pr 1 κ E 2 θ th Q S γ S b E < χ θ th Q S γ S b J + k = 1 K Q I k γ I k J γ JE + θ th k = 1 K Q I k γ I k E + θ th .
We observe from (A6) that if 1 κ E 2 θ th 0 , then ρ E = 1 , and if 1 κ E 2 θ th > 0 , we can rewrite (A6) as
ρ E = Pr γ S b E < ϑ 0 + k = 1 K ϑ k γ I k E + μ 0 γ S b J + k = 1 K μ k γ I k J γ JE ,
where
ϑ 0 = θ th 1 κ E 2 θ th Q S , ϑ k = θ th Q I k 1 κ E 2 θ th Q S , μ 0 = χ θ th 1 κ E 2 θ th , μ k = χ θ th Q I k 1 κ E 2 θ th Q S .
Setting Z = μ 0 γ S b J + k = 1 K μ k γ I k J γ JE , from (A7), we have
ρ E = 0 + 0 + F γ S b E ϑ 0 + k = 1 K ϑ k x k + z f γ I 1 E x 1 f γ I K E x K f Z z d x 1 d x K d z .
Substituting the CDF of γ S b E and the PDF of γ I k D provided by (1) into (A9), after some manipulations, which yields
ρ E = 1 k = 1 K λ I k E λ I k E + λ SE ϑ k exp λ SE ϑ 0 × 0 + exp λ SE z f Z z d z I .
Now, our objective is to calculate the integral I in (A10). At first, we rewrite I under the following form:
I = 0 + exp λ SE z f Z z d z = 0 + λ SE exp λ SE z F Z z d z .
Next, we attempt to find the CDF of Z. Setting Y = μ 0 γ S b J + k = 1 K μ k γ I k J , the CDF of Z can be formulated by
F Z z = Pr Y γ JE < z = 0 + F Y z x λ JE exp λ JE x d x .
Before calculating the CDF of Y, we note that Y is sum of the exponential RVs, i.e., μ 0 γ S b J and μ k γ I k J . Indeed, because γ S b J and γ I k J are exponential RVs whose parameters are λ SJ and λ I k J , respectively, hence μ 0 γ S b J and μ k γ I k J are also exponential RVs, and their parameters are λ SJ / μ 0 and λ I k J / μ k , respectively. Hence, the CDF of Y can be given as
F Y y = 1 β 0 exp Ω SJ y k = 1 K β k exp Ω I k J y ,
where
Ω SJ = λ SJ μ 0 , Ω I k J = λ I k J μ k , β 0 = k = 1 K Ω I k J Ω I k J Ω SJ , β k = Ω SJ Ω SJ Ω I k J t = 1 , t k K Ω I t J Ω I t J Ω I k J .
Substituting (A13) into (A12), we obtain
F Z z = 1 β 0 0 + λ JE exp λ JE x exp Ω SJ z x d y k = 1 K β k 0 + λ JE exp λ JE x exp Ω I k J z x d y .
Using (Equation (3.324.1) of [45]) for the corresponding integrals in (A15), we arrive at
F Z z = 1 2 β 0 λ JE Ω SJ z K 1 2 λ JE Ω SJ z k = 1 K 2 β k λ JE Ω I k J z K 1 2 λ JE Ω I k J z ,
where K 1 . is modified Bessel function of the second kind [45]. Then, substituting (A16) into (A11), we obtain (A17) as
I = 1 2 β 0 0 + λ SE exp λ SE z λ JE Ω SJ z K 1 2 λ JE Ω SJ z d z k = 1 K 2 β k 0 + λ SE exp λ SE z λ JE Ω I k J z K 1 2 λ JE Ω I k J z d z .
Next, changing variable t = z , we can rewrite (A17) as
I = 1 4 λ SE λ JE Ω SJ β 0 0 + t 2 exp λ SE t 2 K 1 2 λ JE Ω SJ t d t k = 1 K 4 λ SE Ω I k J λ JE β k 0 + t 2 exp λ SE t 2 K 1 2 λ JE Ω I k J t d t .
Applying (Equation (6.631.3) of [45]) for the corresponding integrals in (A18), we obtain
I = 1 β 0 exp λ JE Ω SJ 2 λ SE W 1 , 1 / 2 λ JE Ω SJ λ SE k = 1 K β k exp λ JE Ω I k J 2 λ SE W 1 , 1 / 2 λ JE Ω I k J λ SE ,
where W 1 , 1 / 2 . is the Whittaker function [45].
Moreover, from (Equation (46) of [46]), we have
exp x 2 W 1 , 1 / 2 x = 1 x exp x E 1 x ,
where E 1 . is exponential integral function [45].
Combining (A19) and (A20), after some manipulations, we obtain
I = λ JE Ω SJ λ SE β 0 exp λ JE Ω SJ λ SE E 1 λ JE Ω SJ λ SE + k = 1 K λ JE Ω I k J λ SE β k exp λ JE Ω I k J λ SE E 1 λ JE Ω I k J λ SE .
It is worth noting that to attain (A21), we used the following equation:
β 0 + k = 1 K β k = 1 .
Finally, substituting (A21) into (A10), we obtain (19), and finish the proof.

References

  1. Wyner, A.D. The Wire-tap Channel. Bell Syst. Tech. J. 1975, 54, 1355–1387. [Google Scholar] [CrossRef]
  2. Csiszar, I.; Korner, J. Broadcast Channels with Confidential Messages. IEEE Trans. Inf. Theory 1978, 2, 339–348. [Google Scholar] [CrossRef]
  3. Liu, R.; Maric, I.; Spasojevic, P.; Yates, R.D. Discrete Memoryless Interference and Broadcast Channels with Conffdential Messages: Secrecy Rate Regions. IEEE Trans. Inf. Theory 2008, 2, 2493–2507. [Google Scholar] [CrossRef]
  4. Gopala, P.K.; Lai, L.; Gamal, H.E. On the Secrecy Capacity of Fading Channels. IEEE Trans. Inf. Theory 2008, 2, 4687–4698. [Google Scholar] [CrossRef]
  5. Zhang, J.; Duong, T.Q.; Woods, R.; Marshall, A. Securing Wireless Communications of the Internet of Things from the Physical Layer, An Overview. Entropy 2017, 19, 420. [Google Scholar] [CrossRef]
  6. Sun, L.; Du, Q. A Review of Physical Layer Security Techniques for Internet of Things: Challenges and Solutions. Entropy 2018, 2, 730. [Google Scholar] [CrossRef]
  7. Tin, P.T.; Hung, D.T.; Tan, N.N.; Duy, T.T.; Voznak, M. Secrecy Performance Enhancement for Underlay Cognitive Radio Networks Employing Cooperative Multi-hop Transmission With and Without Presence of Hardware Impairments. Entropy 2019, 21, 217. [Google Scholar] [CrossRef]
  8. Tin, P.T.; Nam, P.M.; Duy, T.T.; Phuong, T.T.; Voznak, M. Secrecy Performance of TAS/SC-based Multi-hop Harvest-to-Transmit Cognitive WSNs under Joint Constraint of Interference and Hardware Imperfection. Sensors 2019, 19, 1160. [Google Scholar] [CrossRef] [PubMed]
  9. Zhang, T.; Cai, Y.; Huang, Y.; Duong, T.Q.; Yang, W. Secure Transmission in Cognitive MIMO Relaying Networks With Outdated Channel State Information. IEEE Access 2016, 4, 8212–8224. [Google Scholar] [CrossRef] [Green Version]
  10. Huang, Y.; Wang, J.; Zhong, C.; Duong, T.Q.; Karagiannidis, G.K. Secure Transmission in Cooperative Relaying Networks with Multiple Antennas. IEEE Trans. Wirel. Commun. 2016, 2, 6843–6856. [Google Scholar] [CrossRef]
  11. Yang, M.; Guo, D.; Huang, Y.; Duong, T.Q.; Zhang, B. Secure Multiuser Scheduling in Downlink Dual-hop Regenerative Relay Networks over Nakagami-m Fading Channels. IEEE Trans. Wirel. Commun. 2016, 2, 8009–8024. [Google Scholar] [CrossRef]
  12. Zhao, R.; Lin, H.; He, Y.-C.; Chen, D.-H.; Huang, Y.; Yang, L. Secrecy Performance of Transmit Antenna Selection for MIMO Relay Systems with Outdated CSI. IEEE Trans. Commun. 2018, 2, 546–559. [Google Scholar] [CrossRef]
  13. Mo, J.; Tao, M.; Liu, L. Relay Placement for Physical Layer Security: A Secure Connection Perspective. IEEE Commun. Lett. 2012, 2, 878–881. [Google Scholar]
  14. Lee, J.-H.; Sohn, I.; Kim, Y.-H. Transmit Power Allocation for Physical Layer Security in Cooperative Multi-Hop Full-Duplex Relay Networks. Sensors 2016, 2, 1726. [Google Scholar] [CrossRef] [PubMed]
  15. Keshav, S.; Ku, M.-L.; Biswas, S.; Ratnarajah, T. Energy-Efficient Subcarrier Pairing and Power Allocation for DF Relay Networks with an Eavesdropper. Energies 2017, 2, 1953. [Google Scholar]
  16. Hieu, T.D.; Duy, T.T.; Kim, B.-S. Performance Enhancement for Multi-hop Harvest-to-Transmit WSNs with Path-Selection Methods in Presence of Eavesdroppers and Hardware Noises. IEEE Sens. J. 2018, 2, 5173–5186. [Google Scholar] [CrossRef]
  17. Cao, K.; Cai, K.; Wu, Y.; Yang, W. Cooperative Jamming for Secure Communication with Finite Alphabet Inputs. IEEE Commun. Lett. 2017, 2, 2025–2028. [Google Scholar] [CrossRef]
  18. Kang, J.M.; Yang, J.; Ha, J.; Kim, I.M. Joint Design of Optimal Precoding and Cooperative Jamming for Multiuser Secure Broadcast Systems. IEEE Trans. Veh. Technol. 2017, 2, 10551–10556. [Google Scholar] [CrossRef]
  19. Ma, H.; Cheng, J.; Wang, X.; Ma, P. Robust MISO Beamforming with Cooperative Jamming for Secure Transmission From Perspectives of QoS and Secrecy Rate. IEEE Trans. Commun. 2018, 2, 767–780. [Google Scholar] [CrossRef]
  20. Zhang, G.; Xu, J.; Wu, Q.; Cui, M.; Li, X.; Lin, F. Wireless Powered Cooperative Jamming for Secure OFDM System. IEEE Trans. Veh. Technol. 2018, 2, 1331–1346. [Google Scholar] [CrossRef]
  21. Nasir, A.A.; Zhou, X.; Durrani, S.; Kennedy, R.A. Relaying Protocols for Wireless Energy Harvesting and Information Processing. IEEE Trans. Wirel. Commun. 2013, 2, 3622–3636. [Google Scholar] [CrossRef]
  22. Atapattu, S.; Evans, J. Optimal Energy Harvesting Protocols for Wireless Relay Networks. IEEE Trans. Wirel. Commun. 2016, 2, 5789–5803. [Google Scholar] [CrossRef]
  23. Wang, L.; Wong, K.K.; Jin, S.; Zheng, G.; Heath, R.W. A New Look at Physical Layer Security, Caching, and Wireless Energy Harvesting for Heterogeneous Ultra-Dense Networks. IEEE Commun. Mag. 2018, 2, 49–55. [Google Scholar] [CrossRef]
  24. Chang, S.; Li, J.; Fu, X.; Zhang, L. Energy Harvesting for Physical Layer Security in Cooperative Networks Based on Compressed Sensing. Entropy 2017, 19, 462. [Google Scholar] [CrossRef]
  25. Xu, C.; Zheng, M.; Liang, W.; Yu, H.; Liang, Y.C. Outage Performance of Underlay Multihop Cognitive Relay Networks with Energy Harvesting. IEEE Commun. Lett. 2016, 2, 1148–1151. [Google Scholar] [CrossRef]
  26. Xu, C.; Zheng, M.; Liang, W.; Yu, H.; Liang, Y.C. End-to-end Throughput Maximization for Underlay Multi-hop Cognitive Radio Networks with RF Energy Harvesting. IEEE Trans. Wirel. Commun. 2017, 2, 3561–3572. [Google Scholar] [CrossRef]
  27. Zhu, G.; Zhong, C.; Suraweera, H.A.; Karagiannidis, G.K.; Zhang, Z.; Tsiftsis, T.A. Wireless Information and Power Transfer in Relay Systems with Multiple Antennas and Interference. IEEE Trans. Commun. 2015, 2, 1400–1418. [Google Scholar] [CrossRef]
  28. Chen, E.; Xia, M.; Da Costa, D.; Aissa, S. Multi-hop Cooperative Relaying with Energy Harvesting from Co-Channel Interferences. IEEE Commun. Lett. 2017, 2, 1199–1202. [Google Scholar] [CrossRef]
  29. Liu, M.; Liu, Y. Power Allocation for Secure SWIPT Systems with Wireless-Powered Cooperative Jamming. IEEE Commun. Lett. 2017, 2, 1353–1356. [Google Scholar] [CrossRef]
  30. MacKay, D. Fountain Codes. IEE Proc. Commun. 2005, 2, 1331–1346. [Google Scholar] [CrossRef]
  31. Castura, J.; Mao, Y. Rateless Coding over Fading Channels. IEEE Commun. Lett. 2006, 2, 46–48. [Google Scholar] [CrossRef]
  32. Nguyen, H.D.T.; Tran, L.N.; Hong, E.K. On Transmission Efficiency for Wireless Broadcast Using Network Coding and Fountain Codes. IEEE Commun. Lett. 2011, 2, 569–571. [Google Scholar] [CrossRef]
  33. Yue, J.; Lin, Z.; Vucetic, B. Distributed Fountain Codes With Adaptive Unequal Error Protection in Wireless Relay Networks. IEEE Trans. Wirel. Commun. 2014, 2, 4220–4231. [Google Scholar] [CrossRef]
  34. Niu, H.; Iwai, M.; Sezaki, K.; Sun, L.; Du, Q. Exploiting Fountain Codes for Secure Wireless Delivery. IEEE Commun. Lett. 2014, 2, 777–780. [Google Scholar] [CrossRef]
  35. Li, W.; Du, Q.; Sun, L.; Ren, P.; Wang, Y. Security Enhanced via Dynamic Fountain Code Design for Wireless Delivery. In Proceedings of the IEEE 2016 IEEE Wireless Communications and Networking Conference, Doha, Qatar, 3–6 April 2016; pp. 1–6. [Google Scholar]
  36. Sun, L.; Ren, P.; Du, Q.; Wang, Y. Fountain-coding Aided Strategy for Secure Cooperative Transmission in Industrial Wireless Sensor Networks. IEEE Trans. Ind. Inform. 2016, 2, 291–300. [Google Scholar] [CrossRef]
  37. Du, Q.; Xu, Y.; Li, W.; Song, H. Security Enhancement for Multicast over Internet of Things by Dynamically Constructed Fountain Codes. Wirel. Commun. Mob. Comput. 2018, 2018, 8404219. [Google Scholar] [CrossRef]
  38. Hung, D.T.; Duy, T.T.; Trinh, D.Q.; Bao, V.N.Q. Secrecy Performance Evaluation of TAS Protocol Exploiting Fountain Codes and Cooperative Jamming under Impact of Hardware Impairments. In Proceedings of the 2nd International Conference on Recent Advances in Signal Processing, Telecommunications & Computing (SigTelCom), Ho Chi Minh City, Vietnam, 29–31 January 2018; pp. 164–169. [Google Scholar]
  39. Hung, D.T.; Duy, T.T.; Trinh, D.Q.; Bao, V.N.Q.; Hanh, T. Security-Reliability Analysis of Power Beacon-Assisted Multi-hop Relaying Networks Exploiting Fountain Codes with Hardware Imperfection. In Proceedings of the International Conference on Advanced Technologies for Communications (ATC), Ho Chi Minh City, Vietnam, 18–20 October 2018; pp. 354–359. [Google Scholar]
  40. Mokhtar, M.; Gomaa, A.; Al-Dhahir, N. OFDM AF Relaying under I/Q Imbalance: Performance Analysis and Baseband Compensation. IEEE Trans. Commun. 2013, 2, 1304–1313. [Google Scholar] [CrossRef]
  41. Björnson, E.; Matthaiou, M.; Debbah, M. A New Look at Dual-Hop Relaying: Performance Limits with Hardware Impairments. IEEE Trans. Commun. 2013, 2, 4512–4525. [Google Scholar] [CrossRef]
  42. Son, P.N.; Kong, H.Y. Energy-Harvesting Decode-and-Forward Relaying under Hardware Impairments. Wirel. Pers. Commun. 2017, 2, 6381–6395. [Google Scholar] [CrossRef]
  43. Solanki, S.; Upadhyay, P.K.; da Costa, D.B.; Bithas, P.S.; Kanatas, A.G.; Dias, U.S. Joint Impact of RF Hardware Impairments and Channel Estimation Errors in Spectrum Sharing Multiple-Relay Networks. IEEE Trans. Commun. 2018, 2, 3809–3824. [Google Scholar] [CrossRef]
  44. Zarei, S.; Gerstacker, W.H.; Aulin, J.; Schober, R. Multi-Cell Massive MIMO Systems with Hardware Impairments: Uplink-Downlink Duality and Downlink Precoding. IEEE Trans. Wirel. Commun. 2017, 2, 5115–5130. [Google Scholar] [CrossRef]
  45. Gradshteyn, I.S.; Ryzhik, I.M. Table of Integrals, Series, and Products, 7th ed.; Elsevier Inc.: San Diego, CA, USA, 2007. [Google Scholar]
  46. Duy, T.T.; Alexandropoulos, G.C.; Vu, T.T.; Vo, N.-S.; Duong, T.Q. Outage Performance of Cognitive Cooperative Networks with Relay Selection over Double-Rayleigh Fading Channels. IET Commun. 2016, 2, 57–64. [Google Scholar] [CrossRef]
Figure 1. System model of the proposed scheme.
Figure 1. System model of the proposed scheme.
Entropy 21 00700 g001
Figure 2. ρ D and ρ E as a function of Q S in dB when M = 3 , α = 0.3 , κ D 2 = κ E 2 = 0.1 and C th = 0.75 .
Figure 2. ρ D and ρ E as a function of Q S in dB when M = 3 , α = 0.3 , κ D 2 = κ E 2 = 0.1 and C th = 0.75 .
Entropy 21 00700 g002
Figure 3. OP as a function of Q S in dB when Q I = 7.5 dB, M = 2 , α = 0.1 , κ D 2 = κ E 2 = 0 and C th = 1 .
Figure 3. OP as a function of Q S in dB when Q I = 7.5 dB, M = 2 , α = 0.1 , κ D 2 = κ E 2 = 0 and C th = 1 .
Entropy 21 00700 g003
Figure 4. SS as a function of Q S in dB when Q I = 10 dB, α = 0.1 , κ D 2 = 0.1 , κ D 2 = 0 , N th = 20 and C th = 1.5 .
Figure 4. SS as a function of Q S in dB when Q I = 10 dB, α = 0.1 , κ D 2 = 0.1 , κ D 2 = 0 , N th = 20 and C th = 1.5 .
Entropy 21 00700 g004
Figure 5. SS as a function of α when Q S = Q I = 15 dB, M = 3 , κ E 2 = 0.1 , N th = 15 and C th = 0.7 .
Figure 5. SS as a function of α when Q S = Q I = 15 dB, M = 3 , κ E 2 = 0.1 , N th = 15 and C th = 0.7 .
Entropy 21 00700 g005
Figure 6. IP as a function of M when Q S = Q I = 20 dB, κ D 2 = 0.2 , α = 0.3 , N th = 20 and C th = 0.5 .
Figure 6. IP as a function of M when Q S = Q I = 20 dB, κ D 2 = 0.2 , α = 0.3 , N th = 20 and C th = 0.5 .
Entropy 21 00700 g006
Figure 7. IP as a function of N th when Q S = Q I = 20 dB, M = 2 , κ D 2 = κ E 2 = 0 and C th = 0.5 .
Figure 7. IP as a function of N th when Q S = Q I = 20 dB, M = 2 , κ D 2 = κ E 2 = 0 and C th = 0.5 .
Entropy 21 00700 g007
Figure 8. OP and IP as a function of α when Q S = Q I = 15 dB, M = 4 , κ D 2 = κ E 2 = 0 and N th = 16 .
Figure 8. OP and IP as a function of α when Q S = Q I = 15 dB, M = 4 , κ D 2 = κ E 2 = 0 and N th = 16 .
Entropy 21 00700 g008
Figure 9. OP and IP as a function of N th when Q S = Q I = 15 dB, M = 3 , κ D 2 = κ E 2 = 0.1 and C th = 0.75 .
Figure 9. OP and IP as a function of N th when Q S = Q I = 15 dB, M = 3 , κ D 2 = κ E 2 = 0.1 and C th = 0.75 .
Entropy 21 00700 g009
Figure 10. Average number of time slots as a function of Q S in dB when Q I = 10 dB, α = 0.2 , κ D 2 = κ E 2 = 0.05 , N th = 17 and C th = 1 .
Figure 10. Average number of time slots as a function of Q S in dB when Q I = 10 dB, α = 0.2 , κ D 2 = κ E 2 = 0.05 , N th = 17 and C th = 1 .
Entropy 21 00700 g010

Share and Cite

MDPI and ACS Style

Tran Tin, P.; Nguyen, T.N.; Sang, N.Q.; Trung Duy, T.; Tran, P.T.; Voznak, M. Rateless Codes-Based Secure Communication Employing Transmit Antenna Selection and Harvest-To-Jam under Joint Effect of Interference and Hardware Impairments. Entropy 2019, 21, 700. https://doi.org/10.3390/e21070700

AMA Style

Tran Tin P, Nguyen TN, Sang NQ, Trung Duy T, Tran PT, Voznak M. Rateless Codes-Based Secure Communication Employing Transmit Antenna Selection and Harvest-To-Jam under Joint Effect of Interference and Hardware Impairments. Entropy. 2019; 21(7):700. https://doi.org/10.3390/e21070700

Chicago/Turabian Style

Tran Tin, Phu, Tan N. Nguyen, Nguyen Q. Sang, Tran Trung Duy, Phuong T. Tran, and Miroslav Voznak. 2019. "Rateless Codes-Based Secure Communication Employing Transmit Antenna Selection and Harvest-To-Jam under Joint Effect of Interference and Hardware Impairments" Entropy 21, no. 7: 700. https://doi.org/10.3390/e21070700

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop