AI Article Synopsis

  • This paper examines how to secure communications in energy harvesting untrusted relay networks using jamming signals from the destination.
  • Four transmission and reception schemes (MRT, TAS for transmission; MRC, RAS for reception) are analyzed, leading to the derivation of secrecy outage probability (SOP) and connection outage probability (COP) for each scheme.
  • Simulation results show that the MRT and MRC scheme generally performs better in terms of effective secrecy throughput (EST), but under high signal-to-noise ratio conditions, TAS outperforms MRT, and there is an optimal number of antennas for maximizing EST.

Article Abstract

This paper investigates secure communications of energy harvesting untrusted relay networks, where the destination assists jamming signal to prevent the untrusted relay from eavesdropping and to improve the forwarding ability of the energy constrained relay. Firstly, the source and the destination transmit the signals to the relay with maximal ratio transmission (MRT) technique or transmit antenna selection (TAS) technique. Then, the destination utilizes maximal ratio combining (MRC) technique or receive antenna selection (RAS) technique to receive the forwarded information. Therefore, four transmission and reception schemes are considered. For each scheme, the closed-form expressions of the secrecy outage probability (SOP) and the connection outage probability (COP) are derived. Besides, the effective secrecy throughput (EST) metric is analyzed to achieve a good tradeoff between security and reliability. In addition, the asymptotic performance of EST is also considered at the high signal-to-noise ratio (SNR). Finally, simulation results illustrate that: (1) the EST of the system with MRT and MRC scheme are superior to other schemes, however, in the high SNR regime, the EST of the system with MRT scheme is inferior to TAS; and (2) for the source node, there exists an optimal number of antennas to maximize the EST of the proposed schemes.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC6338946PMC
http://dx.doi.org/10.3390/s19010076DOI Listing

Publication Analysis

Top Keywords

untrusted relay
12
relay networks
8
maximal ratio
8
antenna selection
8
technique receive
8
outage probability
8
est system
8
system mrt
8
relay
5
est
5

Similar Publications

Cooperative Jamming-Based Physical-Layer Group Secret and Private Key Generation.

Entropy (Basel)

September 2024

College of Computer Science, Chongqing University, Chongqing 400044, China.

This paper explores physical layer group key generation in wireless relay networks with a star topology. In this setup, the relay node plays the role of either a trusted or untrusted central node, while one legitimate node (Alice) acts as the reference node. The channel between the relay and Alice serves as the reference channel.

View Article and Find Full Text PDF

The integration of terrestrial- and satellite-based quantum key distribution (QKD) experiments has markedly advanced global-scale quantum networks, showcasing the growing maturity of quantum technologies. Notably, the use of unmanned aerial vehicles (UAVs) as relay nodes has emerged as a promising method to overcome the inherent limitations of fiber-based and low-Earth orbit (LEO) satellite connections. This paper introduces a protocol for measurement-device-independent QKD (MDI-QKD) using photon orbital angular momentum (OAM) encoding, with UAVs as relay platforms.

View Article and Find Full Text PDF

Cost-Optimization-Based Quantum Key Distribution over Quantum Key Pool Optical Networks.

Entropy (Basel)

April 2023

Guangdong Provincial Key Laboratory of Nanophotonic Functional Materials and Devices, Guangdong Provincial Key Laboratory of Quantum Engineering and Quantum Materials, South China Normal University, Guangzhou 510006, China.

The Measurement-Device-Independent-Quantum Key Distribution (MDI-QKD) has the advantage of extending the secure transmission distances. The MDI-QKD combined with the Hybrid-Trusted and Untrusted Relay (HTUR) is used to deploy large-scale QKD networks, which effectively saves deployment cost. We propose an improved scheme for the QKD network architecture and cost analysis, which simplifies the number of QKD transmitters and incorporates the quantum key pool (QKP) in the QKD network.

View Article and Find Full Text PDF

Free-space quantum key distribution (QKD) has been gaining popularity in recent years due to its advantages in creating networking options for the quantum internet. One of the main challenges to be addressed in QKD is the achievable secret key rate, which must meet current and future demand. Some of the existing solutions include the use of higher bandwidth electronics, untrusted relay architectures such as Twin-Field QKD, or high dimensional QKD.

View Article and Find Full Text PDF

A continuous variable (CV), measurement device independent (MDI) quantum key distribution (QKD) protocol is analyzed, enabling three parties to connect for quantum conferencing. We utilise a generalised Bell detection at an untrusted relay and a postselection procedure, in which distant parties reconcile on the signs of the displacements of the quadratures of their prepared coherent states. We derive the rate of the protocol under a collective pure-loss attack, demonstrating improved rate-distance performance compared to the equivalent non-post-selected protocol.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!