Research Article
Reliability-Security Analysis for Harvest-to-Jam based Multi-hop Cluster MIMO Networks Using Cooperative Jamming Methods Under Impact of Hardware Impairments
@ARTICLE{10.4108/eai.17-9-2021.170963, author={Ngo The Anh and Nguyen Canh Minh and Tran Trung Duy and Tan Hanh and Hoang Dang Hai}, title={Reliability-Security Analysis for Harvest-to-Jam based Multi-hop Cluster MIMO Networks Using Cooperative Jamming Methods Under Impact of Hardware Impairments}, journal={EAI Endorsed Transactions on Industrial Networks and Intelligent Systems}, volume={8}, number={28}, publisher={EAI}, journal_a={INIS}, year={2021}, month={9}, keywords={Multi-hop cluster relaying networks, physical-layer security, harvest-to-jam technique, outage probability, intercept probability, TAS/SC}, doi={10.4108/eai.17-9-2021.170963} }
- Ngo The Anh
Nguyen Canh Minh
Tran Trung Duy
Tan Hanh
Hoang Dang Hai
Year: 2021
Reliability-Security Analysis for Harvest-to-Jam based Multi-hop Cluster MIMO Networks Using Cooperative Jamming Methods Under Impact of Hardware Impairments
INIS
EAI
DOI: 10.4108/eai.17-9-2021.170963
Abstract
In this paper, we consider harvest-to-jam based secure multi-hop cluster multi-input multi-output networks, where a multi-antenna source sends its data to a multi-antenna destination via multi-antenna intermediate cluster heads. The data transmission at each hop is realized by using transmit antenna selection and selection combining techniques, and is overheard by a multi-antenna eavesdropper using selection combining. In addition, joint antenna and jammer selection methods are performed at each hop to reduce quality of the eavesdropping channels. The cluster members can harvest wireless energy from the previous cluster head, and use the harvested energy for emitting jamming noises on the eavesdropper. We propose three cooperative jamming algorithms, named best antenna and best jammer selection (BA-BJ), random antenna and all jammer selection (RA-AJ) and all antenna and all jammer selection (AA-AJ). Then, end-to-end outage probability and intercept probability of the proposed algorithms are evaluated via both simulation and analysis, under impact of hardware impairments, over Rayleigh fading channel.
Copyright © 2021 Ngo The Anh et al., licensed to EAI. This is an open access article distributed under the terms of the Creative Commons Attribution license, which permits unlimited use, distribution and reproduction in any medium so long as the original work is properly cited.