2019
DOI: 10.3390/e21070700
|View full text |Cite
|
Sign up to set email alerts
|

Rateless Codes-Based Secure Communication Employing Transmit Antenna Selection and Harvest-To-Jam under Joint Effect of Interference and Hardware Impairments

Abstract: In this paper, we propose a rateless codes-based communication protocol to provide security for wireless systems. In the proposed protocol, a source uses the transmit antenna selection (TAS) technique to transmit Fountain-encoded packets to a destination in presence of an eavesdropper. Moreover, a cooperative jammer node harvests energy from radio frequency (RF) signals of the source and the interference sources to generate jamming noises on the eavesdropper. The data transmission terminates as soon as the des… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 44 publications
0
3
0
Order By: Relevance
“…A Monte Carlo simulation was conducted to validate the correctness of the system performance analysis in terms of the derived IP and OP expressions [36][37][38][39][40][41][42][43][44][45][46][47][48]. The analytical and simulation results should match to verify the correctness of our analysis.…”
Section: Numerical Results and Discussionmentioning
confidence: 99%
“…A Monte Carlo simulation was conducted to validate the correctness of the system performance analysis in terms of the derived IP and OP expressions [36][37][38][39][40][41][42][43][44][45][46][47][48]. The analytical and simulation results should match to verify the correctness of our analysis.…”
Section: Numerical Results and Discussionmentioning
confidence: 99%
“…This work can be enhanced in many ways. One of these possible ways is to deploy diversity techniques at the BSs and/or MUs to further enhance the Pcov and ASE [30]. Additionally, the application of reconfigurable intelligent surfaces (RIS) and NOMA into the ultra-dense cellular networks is also promising [31]- [33].…”
Section: Discussionmentioning
confidence: 99%
“…By substituting ( 18) into (17), and then by applying [32, eq.6.592.4], the closed-form expression of IP can be claimed by…”
Section: Intercept Probability (Ip) Analysismentioning
confidence: 99%