Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Physical layer security performance analysis of the time reversal transmission system

View through CrossRef
Thanks to its characteristics of temporal compression and spatial focusing, the time reversal (TR) transmission system has the intrinsic capability of anti‐eavesdropping. This study analyses the physical layer security performance of the TR transmission system. The probability density functions and cumulative distribution functions of the signal‐to‐noise ratio of the legitimate user and eavesdropper are given. On this basis, the theoretical expressions of the ergodic capacities of the legitimate channel and the wiretap channel, and the achievable ergodic secrecy rate are derived. The bit error rates of the legitimate user and eavesdropper for binary phase‐shift keying modulation are given too. The correctness of the theoretical derivation is verified by simulation. For the legitimate user, the signal power increases as the number of paths increases, which indicates a higher diversity gain can be obtained, and the inter‐symbol interference power decreases as the up‐sampling factor increases. So, the signal‐to‐interference‐plus‐noise ratio (SINR) of the received signal can be significantly improved by appropriately reducing the spectral efficiency. However, the received signal's SINR of the eavesdropper cannot be promoted obviously. That is to say, compared with the eavesdropper, the legitimate user can achieve a higher rate and a lower BER, so secure transmission can be realised.
Institution of Engineering and Technology (IET)
Title: Physical layer security performance analysis of the time reversal transmission system
Description:
Thanks to its characteristics of temporal compression and spatial focusing, the time reversal (TR) transmission system has the intrinsic capability of anti‐eavesdropping.
This study analyses the physical layer security performance of the TR transmission system.
The probability density functions and cumulative distribution functions of the signal‐to‐noise ratio of the legitimate user and eavesdropper are given.
On this basis, the theoretical expressions of the ergodic capacities of the legitimate channel and the wiretap channel, and the achievable ergodic secrecy rate are derived.
The bit error rates of the legitimate user and eavesdropper for binary phase‐shift keying modulation are given too.
The correctness of the theoretical derivation is verified by simulation.
For the legitimate user, the signal power increases as the number of paths increases, which indicates a higher diversity gain can be obtained, and the inter‐symbol interference power decreases as the up‐sampling factor increases.
So, the signal‐to‐interference‐plus‐noise ratio (SINR) of the received signal can be significantly improved by appropriately reducing the spectral efficiency.
However, the received signal's SINR of the eavesdropper cannot be promoted obviously.
That is to say, compared with the eavesdropper, the legitimate user can achieve a higher rate and a lower BER, so secure transmission can be realised.

Related Results

Evaluating the Science to Inform the Physical Activity Guidelines for Americans Midcourse Report
Evaluating the Science to Inform the Physical Activity Guidelines for Americans Midcourse Report
Abstract The Physical Activity Guidelines for Americans (Guidelines) advises older adults to be as active as possible. Yet, despite the well documented benefits of physical a...
EPD Electronic Pathogen Detection v1
EPD Electronic Pathogen Detection v1
Electronic pathogen detection (EPD) is a non - invasive, rapid, affordable, point- of- care test, for Covid 19 resulting from infection with SARS-CoV-2 virus. EPD scanning techno...
Time-reversal equivariant neural network potential and Hamiltonian for magnetic materials
Time-reversal equivariant neural network potential and Hamiltonian for magnetic materials
This work presents Time-reversal Equivariant Neural Network (TENN) framework. With TENN, the time-reversal symmetry is considered in the equivariant neural network (ENN), which gen...
Synchronizability and eigenvalues of two-layer star networks
Synchronizability and eigenvalues of two-layer star networks
From the study of multilayer networks, scientists have found that the properties of the multilayer networks show great difference from those of the traditional complex networks. In...
THE SECURITY AND PRIVACY MEASURING SYSTEM FOR THE INTERNET OF THINGS DEVICES
THE SECURITY AND PRIVACY MEASURING SYSTEM FOR THE INTERNET OF THINGS DEVICES
The purpose of the article: elimination of the gap in existing need in the set of clear and objective security and privacy metrics for the IoT devices users and manufacturers and a...
Perturbed solution and analyses for single photon transmission equation in optical fiber
Perturbed solution and analyses for single photon transmission equation in optical fiber
As is well known, quantum optics has developed significantly in recent years and advanced several hot research topics, such as quantum communications, quantum sensing, quantum calc...
Penetrative convection in Nocturnal ABL: Numerical Simulations
Penetrative convection in Nocturnal ABL: Numerical Simulations
<p>After the sunset, under calm and clear sky conditions, aerosol laden surface air-layer, cools rapidly due to radiative cooling<sup>[1, 2, & 3...
Public budget security administration: development of primary mechanisms
Public budget security administration: development of primary mechanisms
The current state of public administration of budget security indicates its actual absence. With the extremely important role of budget security, both in the life of the country as...

Back to Top