inis 21(28): e5

Research Article

Reliability-Security Analysis for Harvest-to-Jam based Multi-hop Cluster MIMO Networks Using Cooperative Jamming Methods Under Impact of Hardware Impairments

Download43 downloads
  • @ARTICLE{10.4108/eai.17-9-2021.170963,
        author={Ngo The Anh and Nguyen Canh Minh and Tran Trung Duy and Tan Hanh and Hoang Dang Hai},
        title={Reliability-Security Analysis for Harvest-to-Jam based Multi-hop Cluster MIMO Networks Using Cooperative Jamming Methods Under Impact of Hardware Impairments},
        journal={EAI Endorsed Transactions on Industrial Networks and Intelligent Systems},
        volume={8},
        number={28},
        publisher={EAI},
        journal_a={INIS},
        year={2021},
        month={9},
        keywords={Multi-hop cluster relaying networks, physical-layer security, harvest-to-jam technique, outage probability, intercept probability, TAS/SC},
        doi={10.4108/eai.17-9-2021.170963}
    }
    
  • Ngo The Anh
    Nguyen Canh Minh
    Tran Trung Duy
    Tan Hanh
    Hoang Dang Hai
    Year: 2021
    Reliability-Security Analysis for Harvest-to-Jam based Multi-hop Cluster MIMO Networks Using Cooperative Jamming Methods Under Impact of Hardware Impairments
    INIS
    EAI
    DOI: 10.4108/eai.17-9-2021.170963
Ngo The Anh1, Nguyen Canh Minh1, Tran Trung Duy2,*, Tan Hanh2, Hoang Dang Hai2
  • 1: University of Transport and Communications, Vietnam
  • 2: Posts and Telecommunications Institute of Technology, Vietnam
*Contact email: trantrungduy@ptithcm.edu.vn.

Abstract

In this paper, we consider harvest-to-jam based secure multi-hop cluster multi-input multi-output networks, where a multi-antenna source sends its data to a multi-antenna destination via multi-antenna intermediate cluster heads. The data transmission at each hop is realized by using transmit antenna selection and selection combining techniques, and is overheard by a multi-antenna eavesdropper using selection combining. In addition, joint antenna and jammer selection methods are performed at each hop to reduce quality of the eavesdropping channels. The cluster members can harvest wireless energy from the previous cluster head, and use the harvested energy for emitting jamming noises on the eavesdropper. We propose three cooperative jamming algorithms, named best antenna and best jammer selection (BA-BJ), random antenna and all jammer selection (RA-AJ) and all antenna and all jammer selection (AA-AJ). Then, end-to-end outage probability and intercept probability of the proposed algorithms are evaluated via both simulation and analysis, under impact of hardware impairments, over Rayleigh fading channel.