Security Performance Analysis of Relay Networks Based on κ-μ Shadowed Channels with RHIs and CEEs
This paper mainly describes the transmission reliability and physical layer security of multiantenna decode-and-forward relay networks over the κ-μ shadowed fading distribution. We consider the existence of residual hardware impairments (RHIs) and channel estimation errors (CEEs) at the same time. F...
Gespeichert in:
Veröffentlicht in: | Wireless communications and mobile computing 2022-04, Vol.2022, p.1-12 |
---|---|
Hauptverfasser: | , , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 12 |
---|---|
container_issue | |
container_start_page | 1 |
container_title | Wireless communications and mobile computing |
container_volume | 2022 |
creator | Sun, Jiangfeng Wang, Xiaohong Fang, Yiwei Tian, Xinji Zhu, Mingfu Ou, Jiangtao Fan, Chengyuan |
description | This paper mainly describes the transmission reliability and physical layer security of multiantenna decode-and-forward relay networks over the κ-μ shadowed fading distribution. We consider the existence of residual hardware impairments (RHIs) and channel estimation errors (CEEs) at the same time. Firstly, we give the network model. On this basis, we analyze the reliability and security by deriving the exact expressions of outage probability (OP) and intercept probability (IP). To further verify and investigate the theoretical derivation, the approximate analysis of OP is obtained under the high signal-to-noise ratio. In addition, we also use an optimized antenna selection technology at the transmitter to improve the security performance. Finally, through the comparative study of theoretical simulation and Monte Carlo simulation results, the factors affecting network transmission and security are acquired. The interesting conclusion is that both RHIs and CEEs can increase OP and decrease IP; that is to say, the existence of RHIs and CEEs can reduce reliability and enhance security. |
doi_str_mv | 10.1155/2022/8593474 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2653902447</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2653902447</sourcerecordid><originalsourceid>FETCH-LOGICAL-c337t-f480d60e29c7878012dc784716811c6775b4551391f09d0d19a9914f8ad2c58f3</originalsourceid><addsrcrecordid>eNp9kM1KAzEUhYMoWKs7HyDgUscmmWSSLGuptlBUWl0PMT_M1HZSkynDvJr4DH0mp7S4dHUPh48L5wPgGqN7jBkbEETIQDCZUk5PQA-zFCUi4_z0L2fyHFzEuEQIpYjgHtALq7ehrFv4aoPzYa0qbeGwUqs2lhF6B-d2pVr4bOvGh88IH1S0BvoK7r6T3Q9cFMr4pmtGhaoqu4qwKesCzifTCFXV1eNxvARnTq2ivTrePnh_HL-NJsns5Wk6Gs4Snaa8ThwVyGTIEqm54AJhYrpAOc4ExrqbwT4oYziV2CFpkMFSSYmpE8oQzYRL--Dm8HcT_NfWxjpf-m3opsScZCyViFDKO-ruQOngYwzW5ZtQrlVoc4zyvcZ8rzE_auzw2wNelJVRTfk__QvhW3DS</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2653902447</pqid></control><display><type>article</type><title>Security Performance Analysis of Relay Networks Based on κ-μ Shadowed Channels with RHIs and CEEs</title><source>Wiley Online Library Open Access</source><source>EZB-FREE-00999 freely available EZB journals</source><source>Alma/SFX Local Collection</source><creator>Sun, Jiangfeng ; Wang, Xiaohong ; Fang, Yiwei ; Tian, Xinji ; Zhu, Mingfu ; Ou, Jiangtao ; Fan, Chengyuan</creator><contributor>Junhui, Zhao ; Zhao Junhui</contributor><creatorcontrib>Sun, Jiangfeng ; Wang, Xiaohong ; Fang, Yiwei ; Tian, Xinji ; Zhu, Mingfu ; Ou, Jiangtao ; Fan, Chengyuan ; Junhui, Zhao ; Zhao Junhui</creatorcontrib><description>This paper mainly describes the transmission reliability and physical layer security of multiantenna decode-and-forward relay networks over the κ-μ shadowed fading distribution. We consider the existence of residual hardware impairments (RHIs) and channel estimation errors (CEEs) at the same time. Firstly, we give the network model. On this basis, we analyze the reliability and security by deriving the exact expressions of outage probability (OP) and intercept probability (IP). To further verify and investigate the theoretical derivation, the approximate analysis of OP is obtained under the high signal-to-noise ratio. In addition, we also use an optimized antenna selection technology at the transmitter to improve the security performance. Finally, through the comparative study of theoretical simulation and Monte Carlo simulation results, the factors affecting network transmission and security are acquired. The interesting conclusion is that both RHIs and CEEs can increase OP and decrease IP; that is to say, the existence of RHIs and CEEs can reduce reliability and enhance security.</description><identifier>ISSN: 1530-8669</identifier><identifier>EISSN: 1530-8677</identifier><identifier>DOI: 10.1155/2022/8593474</identifier><language>eng</language><publisher>Oxford: Hindawi</publisher><subject>Antennas ; Communications networks ; Communications systems ; Comparative studies ; Energy efficiency ; Influence ; Network reliability ; Radio networks ; Relay networks ; Reliability analysis ; Security ; Signal to noise ratio ; Wireless communications ; Wireless networks</subject><ispartof>Wireless communications and mobile computing, 2022-04, Vol.2022, p.1-12</ispartof><rights>Copyright © 2022 Jiangfeng Sun et al.</rights><rights>Copyright © 2022 Jiangfeng Sun et al. This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c337t-f480d60e29c7878012dc784716811c6775b4551391f09d0d19a9914f8ad2c58f3</citedby><cites>FETCH-LOGICAL-c337t-f480d60e29c7878012dc784716811c6775b4551391f09d0d19a9914f8ad2c58f3</cites><orcidid>0000-0002-3448-300X ; 0000-0002-6737-3026 ; 0000-0003-4904-1471 ; 0000-0003-2099-8464 ; 0000-0002-3445-5762 ; 0000-0002-3695-1751 ; 0000-0002-7891-9426</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27903,27904</link.rule.ids></links><search><contributor>Junhui, Zhao</contributor><contributor>Zhao Junhui</contributor><creatorcontrib>Sun, Jiangfeng</creatorcontrib><creatorcontrib>Wang, Xiaohong</creatorcontrib><creatorcontrib>Fang, Yiwei</creatorcontrib><creatorcontrib>Tian, Xinji</creatorcontrib><creatorcontrib>Zhu, Mingfu</creatorcontrib><creatorcontrib>Ou, Jiangtao</creatorcontrib><creatorcontrib>Fan, Chengyuan</creatorcontrib><title>Security Performance Analysis of Relay Networks Based on κ-μ Shadowed Channels with RHIs and CEEs</title><title>Wireless communications and mobile computing</title><description>This paper mainly describes the transmission reliability and physical layer security of multiantenna decode-and-forward relay networks over the κ-μ shadowed fading distribution. We consider the existence of residual hardware impairments (RHIs) and channel estimation errors (CEEs) at the same time. Firstly, we give the network model. On this basis, we analyze the reliability and security by deriving the exact expressions of outage probability (OP) and intercept probability (IP). To further verify and investigate the theoretical derivation, the approximate analysis of OP is obtained under the high signal-to-noise ratio. In addition, we also use an optimized antenna selection technology at the transmitter to improve the security performance. Finally, through the comparative study of theoretical simulation and Monte Carlo simulation results, the factors affecting network transmission and security are acquired. The interesting conclusion is that both RHIs and CEEs can increase OP and decrease IP; that is to say, the existence of RHIs and CEEs can reduce reliability and enhance security.</description><subject>Antennas</subject><subject>Communications networks</subject><subject>Communications systems</subject><subject>Comparative studies</subject><subject>Energy efficiency</subject><subject>Influence</subject><subject>Network reliability</subject><subject>Radio networks</subject><subject>Relay networks</subject><subject>Reliability analysis</subject><subject>Security</subject><subject>Signal to noise ratio</subject><subject>Wireless communications</subject><subject>Wireless networks</subject><issn>1530-8669</issn><issn>1530-8677</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>RHX</sourceid><sourceid>BENPR</sourceid><recordid>eNp9kM1KAzEUhYMoWKs7HyDgUscmmWSSLGuptlBUWl0PMT_M1HZSkynDvJr4DH0mp7S4dHUPh48L5wPgGqN7jBkbEETIQDCZUk5PQA-zFCUi4_z0L2fyHFzEuEQIpYjgHtALq7ehrFv4aoPzYa0qbeGwUqs2lhF6B-d2pVr4bOvGh88IH1S0BvoK7r6T3Q9cFMr4pmtGhaoqu4qwKesCzifTCFXV1eNxvARnTq2ivTrePnh_HL-NJsns5Wk6Gs4Snaa8ThwVyGTIEqm54AJhYrpAOc4ExrqbwT4oYziV2CFpkMFSSYmpE8oQzYRL--Dm8HcT_NfWxjpf-m3opsScZCyViFDKO-ruQOngYwzW5ZtQrlVoc4zyvcZ8rzE_auzw2wNelJVRTfk__QvhW3DS</recordid><startdate>20220413</startdate><enddate>20220413</enddate><creator>Sun, Jiangfeng</creator><creator>Wang, Xiaohong</creator><creator>Fang, Yiwei</creator><creator>Tian, Xinji</creator><creator>Zhu, Mingfu</creator><creator>Ou, Jiangtao</creator><creator>Fan, Chengyuan</creator><general>Hindawi</general><general>Hindawi Limited</general><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7XB</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope><orcidid>https://orcid.org/0000-0002-3448-300X</orcidid><orcidid>https://orcid.org/0000-0002-6737-3026</orcidid><orcidid>https://orcid.org/0000-0003-4904-1471</orcidid><orcidid>https://orcid.org/0000-0003-2099-8464</orcidid><orcidid>https://orcid.org/0000-0002-3445-5762</orcidid><orcidid>https://orcid.org/0000-0002-3695-1751</orcidid><orcidid>https://orcid.org/0000-0002-7891-9426</orcidid></search><sort><creationdate>20220413</creationdate><title>Security Performance Analysis of Relay Networks Based on κ-μ Shadowed Channels with RHIs and CEEs</title><author>Sun, Jiangfeng ; Wang, Xiaohong ; Fang, Yiwei ; Tian, Xinji ; Zhu, Mingfu ; Ou, Jiangtao ; Fan, Chengyuan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c337t-f480d60e29c7878012dc784716811c6775b4551391f09d0d19a9914f8ad2c58f3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Antennas</topic><topic>Communications networks</topic><topic>Communications systems</topic><topic>Comparative studies</topic><topic>Energy efficiency</topic><topic>Influence</topic><topic>Network reliability</topic><topic>Radio networks</topic><topic>Relay networks</topic><topic>Reliability analysis</topic><topic>Security</topic><topic>Signal to noise ratio</topic><topic>Wireless communications</topic><topic>Wireless networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Sun, Jiangfeng</creatorcontrib><creatorcontrib>Wang, Xiaohong</creatorcontrib><creatorcontrib>Fang, Yiwei</creatorcontrib><creatorcontrib>Tian, Xinji</creatorcontrib><creatorcontrib>Zhu, Mingfu</creatorcontrib><creatorcontrib>Ou, Jiangtao</creatorcontrib><creatorcontrib>Fan, Chengyuan</creatorcontrib><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>Wireless communications and mobile computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Sun, Jiangfeng</au><au>Wang, Xiaohong</au><au>Fang, Yiwei</au><au>Tian, Xinji</au><au>Zhu, Mingfu</au><au>Ou, Jiangtao</au><au>Fan, Chengyuan</au><au>Junhui, Zhao</au><au>Zhao Junhui</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Security Performance Analysis of Relay Networks Based on κ-μ Shadowed Channels with RHIs and CEEs</atitle><jtitle>Wireless communications and mobile computing</jtitle><date>2022-04-13</date><risdate>2022</risdate><volume>2022</volume><spage>1</spage><epage>12</epage><pages>1-12</pages><issn>1530-8669</issn><eissn>1530-8677</eissn><abstract>This paper mainly describes the transmission reliability and physical layer security of multiantenna decode-and-forward relay networks over the κ-μ shadowed fading distribution. We consider the existence of residual hardware impairments (RHIs) and channel estimation errors (CEEs) at the same time. Firstly, we give the network model. On this basis, we analyze the reliability and security by deriving the exact expressions of outage probability (OP) and intercept probability (IP). To further verify and investigate the theoretical derivation, the approximate analysis of OP is obtained under the high signal-to-noise ratio. In addition, we also use an optimized antenna selection technology at the transmitter to improve the security performance. Finally, through the comparative study of theoretical simulation and Monte Carlo simulation results, the factors affecting network transmission and security are acquired. The interesting conclusion is that both RHIs and CEEs can increase OP and decrease IP; that is to say, the existence of RHIs and CEEs can reduce reliability and enhance security.</abstract><cop>Oxford</cop><pub>Hindawi</pub><doi>10.1155/2022/8593474</doi><tpages>12</tpages><orcidid>https://orcid.org/0000-0002-3448-300X</orcidid><orcidid>https://orcid.org/0000-0002-6737-3026</orcidid><orcidid>https://orcid.org/0000-0003-4904-1471</orcidid><orcidid>https://orcid.org/0000-0003-2099-8464</orcidid><orcidid>https://orcid.org/0000-0002-3445-5762</orcidid><orcidid>https://orcid.org/0000-0002-3695-1751</orcidid><orcidid>https://orcid.org/0000-0002-7891-9426</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1530-8669 |
ispartof | Wireless communications and mobile computing, 2022-04, Vol.2022, p.1-12 |
issn | 1530-8669 1530-8677 |
language | eng |
recordid | cdi_proquest_journals_2653902447 |
source | Wiley Online Library Open Access; EZB-FREE-00999 freely available EZB journals; Alma/SFX Local Collection |
subjects | Antennas Communications networks Communications systems Comparative studies Energy efficiency Influence Network reliability Radio networks Relay networks Reliability analysis Security Signal to noise ratio Wireless communications Wireless networks |
title | Security Performance Analysis of Relay Networks Based on κ-μ Shadowed Channels with RHIs and CEEs |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-27T16%3A51%3A26IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Security%20Performance%20Analysis%20of%20Relay%20Networks%20Based%20on%20%CE%BA-%CE%BC%20Shadowed%20Channels%20with%20RHIs%20and%20CEEs&rft.jtitle=Wireless%20communications%20and%20mobile%20computing&rft.au=Sun,%20Jiangfeng&rft.date=2022-04-13&rft.volume=2022&rft.spage=1&rft.epage=12&rft.pages=1-12&rft.issn=1530-8669&rft.eissn=1530-8677&rft_id=info:doi/10.1155/2022/8593474&rft_dat=%3Cproquest_cross%3E2653902447%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2653902447&rft_id=info:pmid/&rfr_iscdi=true |