Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ IEEE Accessarrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
IEEE Access
Article . 2023 . Peer-reviewed
License: CC BY
Data sources: Crossref
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
IEEE Access
Article . 2023
Data sources: VIRTA
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
IEEE Access
Article . 2023
Data sources: DOAJ
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
ZENODO
Journal . 2023
License: CC BY
Data sources: ZENODO
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
Aaltodoc Publication Archive
Article . 2023 . Peer-reviewed
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
IEEE Access
Article . 2023 . Peer-reviewed
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
Research.fi
Article . 2023 . Peer-reviewed
Data sources: Research.fi
https://dx.doi.org/10.60692/qd...
Other literature type . 2023
Data sources: Datacite
https://dx.doi.org/10.60692/7t...
Other literature type . 2023
Data sources: Datacite
DBLP
Article . 2023
Data sources: DBLP
versions View all 11 versions
addClaim

Ergodic Secrecy Rate Analysis and Optimal Power Allocation for Symbiotic Radio Networks

تحليل معدل السرية Ergodic وتخصيص الطاقة الأمثل لشبكات الراديو التكافلية
Authors: Jantti, Riku; Zheng, Gan; Mishra, Deepak; Nie; Mingcheng; Al-nahari, Azzam;

Ergodic Secrecy Rate Analysis and Optimal Power Allocation for Symbiotic Radio Networks

Abstract

Dans cet article, nous abordons le défi d'établir une communication sécurisée au sein d'un réseau radio symbiotique (RS). Ce réseau comprend un émetteur primaire (PT), un récepteur primaire (PR), un dispositif de rétrodiffusion passive (BD) et un dispositif d'écoute (ED) qui tente d'intercepter le signal d'information transmis par le BD. Le PT transmet simultanément un signal porteur d'informations au PR et un bruit artificiel (AN) pour confondre l'ED. L'objectif est que le BD transmette des informations confidentielles au PR en tirant parti du signal du PT. Le PR effectue un décodage conjoint des deux symboles transmis par le PT et le BD. Dans cette configuration du système, nous dérivons une expression de forme fermée pour le taux de secret ergodique du BD, fournissant un cadre analytique pour évaluer ses performances de sécurité. De plus, nous dérivons une expression pour le taux de secret dans le régime asymptotique caractérisé par un grand nombre d'antennes d'émission. Ces expressions dérivées nous permettent d'optimiser à la fois le coefficient de réflexion et le facteur d'allocation de puissance, ce qui permet de maximiser le taux de secret ergodique du BD tout en tenant compte des exigences de qualité de service (QoS) du système primaire. Les résultats analytiques dérivés fournissent des informations précieuses sur l'influence des paramètres clés du système sur la performance de confidentialité. Notamment, les résultats analytiques dérivés quantifient l'effet des paramètres clés du système sur la performance de confidentialité. En particulier, nous montrons que l'utilisation de l'AN peut toujours améliorer le taux de confidentialité compte tenu des contraintes de QoS de l'utilisateur principal. De plus, nous montrons que le taux de secret peut être amélioré en augmentant le coefficient de réflexion au BD même avec une meilleure condition de canal pour l'ED que le lien légitime.

En este documento, abordamos el desafío de establecer una comunicación segura dentro de una red de radio simbiótica (SR). Esta red comprende un transmisor primario (PT), un receptor primario (PR), un dispositivo de retrodispersión pasiva (BD) y un espía (ED) que intenta interceptar la señal de información transmitida del BD. El PT transmite simultáneamente una señal portadora de información al PR y ruido artificial (AN) para confundir al ED. El objetivo es que el BD transmita información confidencial al PR aprovechando la señal del PT. El PR realiza la decodificación conjunta de los símbolos transmitidos por el PT y el BD. En esta configuración del sistema, derivamos una expresión de forma cerrada para la tasa de secreto ergódico del BD, proporcionando un marco analítico para evaluar su rendimiento de seguridad. Además, derivamos una expresión para la tasa de secreto en el régimen asintótico caracterizado por un gran número de antenas de transmisión. Estas expresiones derivadas nos permiten optimizar tanto el coeficiente de reflexión como el factor de asignación de potencia, lo que permite maximizar la tasa de secreto ergódico del BD al tiempo que se consideran los requisitos de calidad de servicio (QoS) del sistema primario. Los resultados analíticos derivados proporcionan información valiosa sobre la influencia de los parámetros clave del sistema en el rendimiento del secreto. En particular, los resultados analíticos derivados cuantifican el efecto de los parámetros clave del sistema en el rendimiento del secreto. En particular, mostramos que el uso de AN siempre puede mejorar la tasa de secreto dadas las restricciones de QoS del usuario principal. Además, mostramos que la tasa de secreto se puede mejorar aumentando el coeficiente de reflexión en el BD incluso con una mejor condición del canal para el ED que el enlace legítimo.

In this paper, we address the challenge of establishing secure communication within a symbiotic radio (SR) network. This network comprises a primary transmitter (PT), a primary receiver (PR), a passive backscatter device (BD), and an eavesdropper (ED) attempting to intercept the BD's transmitted information signal. The PT simultaneously transmits an information-bearing signal to the PR and artificial noise (AN) to confound the ED. The objective is that the BD conveys confidential information to the PR by leveraging the PT's signal. The PR performs joint decoding of both the symbols transmitted by the PT and the BD. In this system configuration, we derive a closed-form expression for the ergodic secrecy rate of the BD, providing an analytical framework for evaluating its security performance. Furthermore, we derive an expression for the secrecy rate in the asymptotic regime characterized by a large number of transmit antennas. These derived expressions allow us to optimize both the reflection coefficient and power allocation factor, enabling the maximization of the BD's ergodic secrecy rate while considering the quality of service (QoS) requirements of the primary system. The derived analytical results provide valuable insights into the influence of key system parameters on the secrecy performance. Notably, the derived analytical results quantify the effect of key system parameters on the secrecy performance. In particular, we show that the using AN can always improve the secrecy rate given the QoS constraints of the primary user. Moreover, we show that the secrecy rate can be improved by increasing the reflection coefficient at the BD even with better channel condition for the ED than the legitimate link.

في هذه الورقة، نتناول التحدي المتمثل في إنشاء اتصال آمن داخل شبكة راديو تكافلية (SR). تتكون هذه الشبكة من جهاز إرسال أولي (PT)، وجهاز استقبال أولي (PR)، وجهاز تشتت ارتدادي سلبي (BD)، وجهاز تنصت (ED) يحاول اعتراض إشارة المعلومات المرسلة من BD. يرسل PT في وقت واحد إشارة تحمل معلومات إلى PR والضوضاء الاصطناعية (AN) لإرباك ED. الهدف هو أن ينقل المدير التنفيذي معلومات سرية إلى مدير العلاقات العامة من خلال الاستفادة من إشارة مدير العلاقات العامة. يقوم طلب الشراء بإجراء فك تشفير مشترك لكل من الرموز المرسلة من قبل PT و BD. في تكوين النظام هذا، نستمد تعبيرًا مغلقًا لمعدل السرية الإرجودي لـ BD، مما يوفر إطارًا تحليليًا لتقييم أدائه الأمني. علاوة على ذلك، نستمد تعبيرًا عن معدل السرية في النظام المقارب الذي يتميز بعدد كبير من هوائيات الإرسال. تسمح لنا هذه التعبيرات المشتقة بتحسين كل من معامل الانعكاس وعامل تخصيص الطاقة، مما يتيح تعظيم معدل السرية الإرجودية لـ BD مع مراعاة متطلبات جودة الخدمة (QoS) للنظام الأساسي. توفر النتائج التحليلية المشتقة رؤى قيمة حول تأثير معلمات النظام الرئيسية على أداء السرية. ومن الجدير بالذكر أن النتائج التحليلية المشتقة تحدد تأثير معلمات النظام الرئيسية على أداء السرية. على وجه الخصوص، نظهر أن استخدام AN يمكن أن يحسن دائمًا معدل السرية نظرًا لقيود جودة الخدمة للمستخدم الأساسي. علاوة على ذلك، نظهر أنه يمكن تحسين معدل السرية من خلال زيادة معامل الانعكاس عند BD حتى مع وجود حالة قناة أفضل لـ ED من الرابط الشرعي.

Country
Finland
Keywords

ergodic secrecy rate, Secrecy Capacity, Wireless Energy Harvesting and Information Transfer, Secrecy, Encryption, Ergodic theory, Receivers, Symbols, Mathematical analysis, Communication systems, Backscatter, Symbiotic radio, Engineering, Quality of service, Computer security, artificial noise, FOS: Electrical engineering, electronic engineering, information engineering, FOS: Mathematics, Electrical and Electronic Engineering, Symbiosis, Key (lock), ta113, Signal-to-noise ratio (imaging), Computer network, Physical Layer Security in Wireless Communications, Resource management, physical layer security, Transmitter, Next Generation 5G Wireless Networks, Computer science, TK1-9971, Artificial noise, Channel (broadcasting), Secure communication, Physical Sciences, Telecommunications, Electrical engineering. Electronics. Nuclear engineering, Decoding methods, Mathematics

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    8
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Top 10%
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Top 10%
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
8
Top 10%
Average
Top 10%
Green
gold