Javascript must be enabled to continue!
Secrecy Performance of TAS/SC-Based Multi-Hop Harvest-to-Transmit Cognitive WSNs Under Joint Constraint of Interference and Hardware Imperfection
View through CrossRef
In this paper, we evaluate the secrecy performance of multi-hop cognitive wireless sensor networks (WSNs). In the secondary network, a source transmits its data to a destination via the multi-hop relaying model using the transmit antenna selection (TAS)/selection combining (SC) technique at each hop, in the presence of an eavesdropper who wants to receive the data illegally. The secondary transmitters, including the source and intermediate relays, have to harvest energy from radio-frequency signals of a power beacon for transmitting the source data. Moreover, their transmit power must be adjusted to satisfy the quality of service (QoS) of the primary network. Under the joint impact of hardware imperfection and interference constraint, expressions for the transmit power for the secondary transmitters are derived. We also derive exact and asymptotic expressions of secrecy outage probability (SOP) and probability of non-zero secrecy capacity (PNSC) for the proposed protocol over Rayleigh fading channel. The derivations are then verified by Monte Carlo simulations.
Title: Secrecy Performance of TAS/SC-Based Multi-Hop Harvest-to-Transmit Cognitive WSNs Under Joint Constraint of Interference and Hardware Imperfection
Description:
In this paper, we evaluate the secrecy performance of multi-hop cognitive wireless sensor networks (WSNs).
In the secondary network, a source transmits its data to a destination via the multi-hop relaying model using the transmit antenna selection (TAS)/selection combining (SC) technique at each hop, in the presence of an eavesdropper who wants to receive the data illegally.
The secondary transmitters, including the source and intermediate relays, have to harvest energy from radio-frequency signals of a power beacon for transmitting the source data.
Moreover, their transmit power must be adjusted to satisfy the quality of service (QoS) of the primary network.
Under the joint impact of hardware imperfection and interference constraint, expressions for the transmit power for the secondary transmitters are derived.
We also derive exact and asymptotic expressions of secrecy outage probability (SOP) and probability of non-zero secrecy capacity (PNSC) for the proposed protocol over Rayleigh fading channel.
The derivations are then verified by Monte Carlo simulations.
Related Results
Mix En Meng It Op: Emile YX?'s Alternative Race and Language Politics in South African Hip-Hop
Mix En Meng It Op: Emile YX?'s Alternative Race and Language Politics in South African Hip-Hop
This paper explores South African hip-hop activist Emile YX?'s work to suggest that he presents an alternative take on mainstream US and South African hip-hop. While it is arguable...
Báo cáo loạt ca: bướu sợi vỏ bào buồng trứng
Báo cáo loạt ca: bướu sợi vỏ bào buồng trứng
Mở đầu: Bướu sợi vỏ bào nằm trong nhóm bướu mô đệm-dây giới bào của buồng trứng, chiếm tỷ lệ thấp trong nhóm bướu tân sinh của buồng trứng. Bướu có dạng đặc và lành tính nhưng chẩn...
Enhancing Localization Efficiency and Accuracy in Wireless Sensor Networks
Enhancing Localization Efficiency and Accuracy in Wireless Sensor Networks
Accuracy is the vital indicator in location estimation used in many scenarios, such as warehousing, tracking, monitoring, security surveillance, etc., in a wireless sensor network ...
Multi-Interference Suppression Network: Joint Waveform and Filter Design for Radar Interference Suppression
Multi-Interference Suppression Network: Joint Waveform and Filter Design for Radar Interference Suppression
With the advancement of electromagnetic interference and counter-interference technology, complex and unpredictable interference signals greatly reduce radar detection, tracking, a...
An Adaptive Topology Management Scheme to Maintain Network Connectivity in Wireless Sensor Networks
An Adaptive Topology Management Scheme to Maintain Network Connectivity in Wireless Sensor Networks
The roots of Wireless Sensor Networks (WSNs) are tracked back to US military developments, and, currently, WSNs have paved their way into a vast domain of civil applications, espec...
Hop count limitation analysis in wireless multi-hop networks
Hop count limitation analysis in wireless multi-hop networks
Recent studies about wireless multi-hop networks mainly focus on two aspects, network performance and network strategy. A mass of models and algorithms about network connectivity, ...
Synthesis and evaluation of the acetylcholinesterase inhibitory effects of some new pentanamide derivatives bearing a Naphthalen-2-yl Scaffold
Synthesis and evaluation of the acetylcholinesterase inhibitory effects of some new pentanamide derivatives bearing a Naphthalen-2-yl Scaffold
Acetylcholinesterase (AChE) là một enzyme quan trọng trong khe synap của hệ thần kinh cholinergic, nhiều nghiên cứu đã chỉ ra rằng sự thiếu hụt enzyme này có thể dẫn đến suy giảm n...
Differential Diagnosis of Neurogenic Thoracic Outlet Syndrome: A Review
Differential Diagnosis of Neurogenic Thoracic Outlet Syndrome: A Review
Abstract
Thoracic outlet syndrome (TOS) is a complex and often overlooked condition caused by the compression of neurovascular structures as they pass through the thoracic outlet. ...

