JOURNAL BROWSE
Search
Advanced SearchSearch Tips
The Impact of Hardware Impairments and Imperfect Channel State Information on Physical Layer Security
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
The Impact of Hardware Impairments and Imperfect Channel State Information on Physical Layer Security
Shim, Kyusung; Do, Nhu Tri; An, Beongku;
  PDF(new window)
 Abstract
Physical layer security is cryptography technique to protect information by using physical nature of signals. Currently, many works on physical layer security have been actively researching while those researching models still have some problems to be solved. Eavesdropper does not share its channel state information with legitimate users to hide its presence. And when node transmits signal, hardware impairments are occurred, whereas many current researches assume that node model is ideal node and does not consider hardware impairments. The main features and contributions of this paper to solve these problems are as follows. First, our proposed system model deploys torch node around legitimate user to obtain channel state information of eavesdropper and considers hardware impairments by using channel state information of torch node. Second, we derive closed-form expression of intercept probability for the proposed system model. The results of the performance evaluation through various simulations to find out the effects on proposed system model in physical layer security show that imperfect channel state information does not effect on intercept probability while imperfect node model effects on intercept probability, Ergodic secrecy capacity and secrecy capacity.
 Keywords
Physical layer security;Hardware impairment;Imperfect channel state information;Torch node;Intercept probability;
 Language
Korean
 Cited by
 References
1.
Shannon, C.E., "Communication theory of secrecy systems," The Bell System Technical Journal, vol.28, no.4, pp.656-715, October 1949. crossref(new window)

2.
Wyner, A.D., "The wire-tap channel," The Bell System Technical Journal, vol.54, no.8, pp.1355-1387, October 1975. crossref(new window)

3.
N. T. Do and B. An, "Secure transmission using decode-and-forward protocol for underlay cognitive radio networks," Proc. of IEEE ICUFN2015, pp. 914-918, Sapporo, Japan, July 2015.

4.
K. Shim, N. T. Do, B. An, S. Nam, "Outage performance of physical layer security for multi-hop underlay cognitive radio networks with imperfect channel state information," Proc.of ICEIC 2016, Danang, Vietnam, January 2016.

5.
Yulong Zou, Xianbin Wang, Weiming Shen, "Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks," IEEE Journal in Selected Areas in Communications, vol.31, no.10, pp.2099-2111, October 2013. crossref(new window)

6.
Vo Nguyen Quoc Bao, Linh-Trung N., Debbah M., "Relay Selection Schemes for Dual-Hop Networks under Security Constraints with Multiple Eavesdroppers," IEEE Transactions in Wireless Communications, vol.12, no.12, pp.6076-6085, December 2013. crossref(new window)

7.
Alotaibi E.R., Hamdi K.A., "Secrecy outage probability of relay networking in multiple destination and eavesdropper scenarios," Proc. of IEEE WCNC2014., pp.2390-2395, April 2014.

8.
Alves, H., Souza, R.D., Debbah, M., Bennis, M., "Performance of Transmit Antenna Selection Physical Layer Security Schemes," IEEE in Signal Processing Letters, vol.19, no.6, pp.372-375, June 2012. crossref(new window)

9.
Y. Choi and D. Kim, "Performance analysis with and without torch node in secure communications," Proc. of ATC2015, Hanoi, Vietnam, October 2015.

10.
Bjornson Emil, Matthaiou Michail, Debbah Merouane, "A New Look at Dual-Hop Relaying: Performance Limits with Hardware Impairments," IEEE Trans. Communications, vol.61, no.11, pp.4512-4525, November 2013. crossref(new window)

11.
Harri Holma, Antti Toskala, "LTE for UMTS: Evolution to LTE-Advanced, 2nd Edition," Wiley, 2011.

12.
Suraweera H.A., Smith P.J., Shafi M., "Capacity Limits and Performance Analysis of Cognitive Radio With Imperfect Channel Knowledge," IEEE Transactions in Vehicular Technology, vol.59, no.4, pp.1811-1822, May 2010. crossref(new window)

13.
I. S. Gradshteyn, I. M. Ryzhik, A. Jeffrey, D. Zwillinger, "Table of integrals, series and products(7th ed)," Elsevier, 2007.