SlideShare a Scribd company logo
Bulletin of Electrical Engineering and Informatics
Vol. 9, No. 4, August 2020, pp. 1694~1700
ISSN: 2302-9285, DOI: 10.11591/eei.v9i4.2249  1694
Journal homepage: http://beei.org
Physical security layer with friendly jammer in half-duplex
relaying networks over rayleigh fading channel: Intercept
probability analysis
Phu Tran Tin1
, Duy Hung Ha2
, Minh Tran3
, Tran Thanh Trang4
1
Faculty of Electronics Technology, Industrial University of Ho Chi Minh City, Vietnam
2
Wireless Communications Research Group, Faculty of Electrical and Electronics Engineering,
Ton Duc Thang University, Vietnam
3
Optoelectronics Research Group, Faculty of Electrical and Electronics Engineering, Ton Duc Thang University, Vietnam
4
National Key Laboratory of Digital Control and System Engineering, Vietnam
Article Info ABSTRACT
Article history:
Received Dec 10, 2019
Revised Feb 17, 2020
Accepted Mar 23, 2020
In this research, thephysical security layer with a friendly jammerin
half-duplex (HD) relaying networksover the Rayleigh fading channel
is proposed and investigated. Firstly, we proposed the system model
and the time switching,power splitting protocolsfor the system
model. Then we conductedthe mathematical analysisfor deriving
theexact analysis and asymptotic analysisintegral forms for intercept
probability (IP). Finally, the analytical formulationis verified
by the Monte Carlo Simulation with all main system parameters.
From the results, we can show that the simulation and analytical values
are the same values.
Keywords:
Energy harvesting
Half-duplex
Intercept probability
Monte Carlo Simulation
Relaying network This is an open access article under the CC BY-SAlicense.
Corresponding Author:
Duy Hung Ha,
Wireless Communications Research Group,
Faculty of Electrical and Electronics Engineering,
Ton Duc Thang University,
Ho Chi Minh City, Vietnam.
Email: haduyhung@tdtu.edu.vn
1. INTRODUCTION
Nowadays, harvesting energy (EH) from green environmental sources such as sun, wind, etc
and converting this energy into the electrical energy for the communication network devices is the hot
reseach direction in both civil and industial purposes. In the series of the leading environmental green energy
sources, the radio frequency (RF) signals can be considered as the prospective energy source in the future.
RF signals can be proposed as the role of information transmission or harvesting energy in the sensor
nodes [1-8]. In the past, we used the traditional network security protocol, which is working based on
cryptographic technologies for security protecting wireless networks. For extensive research efforts,
the physical-layer security (PLS), which is opareting normal wihthout key negotiation and distribution,
is proposed and investigated in the modern communication network. Furthermore, PLS technology has
a huge advantage for protecting the confidential communication between a source node to its destination
as studied [9-10]. The PLS in the wireless networks with cooperative relaying, jamming, multiuser
scheduling, multiple-input-multiple-output (MIMO) ..etc have been proposed and investigated in [11-15].
Bulletin of Electr Eng & Inf ISSN: 2302-9285 
Physical security layer with friendly jammer in half-duplex relaying… (Phu Tran Tin)
1695
In this research, the physical security layer with a friendly jammer in half-duplex (HD) relaying
networks over the Rayleigh fading channel is proposed and investigated. In the first stage, we proposed
the system model and the time switching, power splitting protocols for the system model. Then we conducted
the mathematical analysis for deriving the exact analysis and asymptotic analysis integral forms for intercept
probability (IP). Finally, the analytical formulation is verified by the Monte Carlo Simulation with all main
system parameters. The research results show that the analytical and simulation are the same values.
2. SYSTEM MODEL
The system model, in which a source node (S) communicates with a destination node (D) via
the intermediate Relay node (R) in the presence of a passive eavesdropper (E) with the help of a friendly
jammer (J), is illustrated in Figure 1. The energy harvesting (EH) and information processing (IT) processes
of the system model are drwan in Figure 2. In this scheme, T is the block time in which the source fully
transmits the information data to the destination. In the first interval time (αT), the R and J harvest energy
from the S signal, where α is the time switching factor α ∈ (0, 1) In the two remaining intervals time
(1-α)T/2, the S and R node transfer information to the D node [5-7, 16-24].
IT Phase
EH Phase
S D
R
J E
SR
h RD
h
BS
h JE
h
RE
h
EH at J
2
IT
S R


IT
R D


T
T
 (1- )T/2
 (1- )T/2

EH at R
Figure 1. System model Figure 2. The EH and IT phases
2.1. Energy harvesting (EH) phase
In the first phase, the source will supply the energy for both jammer and relay nodes.
Hence, the harvested energy at the jammer and relay can be given as, respectively:
2
J S SJ
E P T h
 
 (1)
2
R S SR
E P T h
 
 (2)
where 0 1

  is energy conversion efficiency, PS is the average transmitted power at the source, and hSJ, hSR
are the channel gain of S-J link, S-R link, respectively.
The average transmitted power at the jammer and relay nodes can be obtained from(1)
and (2), respectively:
2
2
(1 ) / 2 (1 ) / 2
S SJ
J
J S SJ
P T h
E
P P h
T T
 

 
  
 
(3)
2
R S SR
P P h

 (4)
where
2
1





 ISSN:2302-9285
Bulletin of Electr Eng & Inf, Vol. 9, No. 4, August 2020 : 1694 – 1700
1696
2.2. Information transmission phase
In the second phase, the received signal at the R can be rewritten as:
r SR s r
y h x n
  (5)
wherehSR is the channel gain of S-R link, xs is the transmitted signal from the S and nr is additive white
Gaussian noise (AWGN) with variance N0.
In the third phase, the received signal at the destination can be given by:
d RD r d
y h x n
  (6)
wherehRD is the channel gain of R-D link, xr is the transmitted signal from relay and nd is (AWGN) with
variance N0.
Here, we consider amplify and forward (AF) mode at the relay. Hence, the amplifying factor can be
given as:
2
0
r R
r s SR
x P
y P h N
  

(7)
The received signal at the E can be given by:
(8)
wherehRE is the channel gain of R-E link and nE is AWGN with variance N0.
3. INTERCEPT PROBABILITY (IP)
The SNR at the eavesdropper can be expressed as:
 
 
2 2 2 2
2 2
2 2
0 0
SR RE s
E
RE JE J
signal h h P
h N h P N
noise




 
 

(9)
Substituting (3) into (9), we have:
2 2
2 2
2
2
1
SR RE
E
SJ JE
RE
h h
h h
h







(10)
where
0
s
P
N
 
After doing some algebra, the (10) can be reformulated as:
4 2
2 2 2 2 2 2 2
2
1
1
SR RE
E
SR RE SR SJ JE SJ JE
h h
h h h h h h h
X Y
XY XZ Z


  

  

  

  
(11)
Bulletin of Electr Eng & Inf ISSN: 2302-9285 
Physical security layer with friendly jammer in half-duplex relaying… (Phu Tran Tin)
1697
where
2 2 2 2
, ,
SR RE SJ JE
X h Y h Z h h
  
Lemma1.Please note that all channels are the Rayleigh fading channels, so the probability density
function (PDF) of
2
i
h can be given by:
2 ( ) i
i
x
i
h
f x e 
 
 (12)
where ( , )
i SR RE
 . Moreover, the cumulative distribution function (CDF) of
2
i
h also can be obtained by:
2 ( ) 1 i
i
x
h
F x e 

  (16)
where i
 is the mean value of the exponential random variable
2
i
h .
Lemma2.The CDF of Z can be computed as respectively:
2 2
2
2
0
( ) | ( )
JE
Sj
Z JE h
h
JE
a
F a F h x f x dx
h
  
 
 
 
 
 (13)
Utilizing the result in [25], the CDF of Z can be shown as the below equation, respectively:
 
1
( ) 1 2 2
Z SJ JE SJ JE
F a aK a
   
  (15)
where ( )
v
K  is the modified Bessel function of the second kind and vth
order and ,
SJ JE
  are mean
of the random variable (RV)
2 2
,
SJ JE
h h , respectively.
From (15), the PDF of Z can be calculated as, after applying the formula,
1
( )
( ) ( )
n
n n
K z n
K z K z
z z


  

 
0
( )
( ) 2 2
Z
Z SJ JE SJ JE
F a
f a K a
a
   

 

(16)
3.1. Exact analysis
The IP can be defined by:
 
Pr E th
IP  
  (17)
Substituting (11) into (17); finally, we have:
   
 
 
   
 
2
Pr
1
Pr
Pr ,
0 ,
th
th th th th
th th th th
th th th
th th
th
X Y
IP
XY XZ Z
Z X XY X
XY X
Z X and XY
X X
X or XY
X


  
    
    
    
 
  
 
 
 
  
 
    
  
 
 
  
  
 
  
 
 
  
 

(18)
where 2
2 1
R
th
   is the threshold of system and R: target rate.
The (20) can be rewritten by:
 ISSN:2302-9285
Bulletin of Electr Eng & Inf, Vol. 9, No. 4, August 2020 : 1694 – 1700
1698
 
 
 
 
( , )
0
Pr
( ) ( ) ( )
th th
th
th
th
th
th th
th th
g x y
X Y Z
x x
X
IP Y
X X
XY X
Z
X
f x dx f y dy f z dz
 
  



 
  
 
 


 



 



  
 
 

   
(19)
where
 
 
( , ) th th
th th
xy x
g x y
x
  
 
 


Applying (16) and (19) can be reformulated as:
   
 
 
( , )
0
0
2 exp exp 2
th th
th
g x y
SR RE SJ JE SR RE SJ JE
x x
IP x dx y dy K z dz
 
  
       
 

  
   (20)
3.2. Asymptotic analysis
Atthe high SNRregime, the (11)can be approximatedas
XY
E
Z



The IP can be computed as:
 
0
Pr Pr Pr | ( )
th
w
E th th Z W
th th
XY W W
IP Z F W w f w dw
Z

  
 
     
 
       
     
     
 (21)
where W XY
 .
Similar in Lemma2,the CDF and PDF ofW can be obtained as, respectively:
 
1
( ) 1 2 2
W SR RE SR RE
F b bK b
   
  (22)
 
0
( ) 2 2
W SR RE SR RE
f b K b
   
 (23)
Substituting (15) and(23) into (21), we have:
 
1 0
0
2 1 2 2 2
SJ JE SJ JE
SR RE SR RE
th th
w w
IP K K w dw
   
   
 


 
 
 
   
 
 
 
 
 
 (24)
4. NUMERICAL RESULTS AND DISCUSSION
The influence of ψ on the system IP is plotted in Figure 3 with the main system parameters is set up
as η=0.8, α=0.5, R= 0.5, 1.0, 1.5 bps/Hz respectively. From the results, we can state that the asymptotic IP
is convergence to the exact IP at the end of the ψ values, and the analytical values are the same
as the simulation values. The higher R, the worst IP values.
The influence of ψ on the system IP is presented in Figure4 with the main system parameters is set
up as ψ=15 dB, α=0.25, 0.5, 0.85, R= 0.5bps/Hz respectively. And the IP versus η and Ris illustrated in
Figures 5 and 6.Here we set up the primary system parameters asψ=15 dB,R= 0.5bps/Hz, α=0.25, 0.5, 0.85,
η=0.25, 0.5, 1 respectively. From the results, we can state that the analytical values are the same
as the simulation values. The better values of the IP is getting with the lower values of η,α, but with
the higher values of R. All the research results are convinced by analytical expressions.
Bulletin of Electr Eng & Inf ISSN: 2302-9285 
Physical security layer with friendly jammer in half-duplex relaying… (Phu Tran Tin)
1699
Figure 3. IP versus ψ Figure 4. IP versus α
Figure 5. IP versus η. Figure 6. IP versus R
5. CONCLUSION
In thisresearch, the physical security layer with a friendly jammer in half-duplex (HD) relaying
networks over the Rayleigh fading channel is proposed and investigated. In the first stage, we proposed
the system model and the time switching, power splitting protocols for the system model. Then we conducted
the mathematical analysis for deriving the exact analysis and asymptotic analysis integral forms for Intercept
probability (IP). Finally, the analytical formulation is verified by the Monte Carlo Simulation with all main
system parameters. The research results show that the analytical and simulation are the same values.
ACKNOWLEDGMENTS
This research was supported byNational Key Laboratory of Digital Control and System Engineering
(DCSELAB), HCMUT, VNU-HCM, Vietnam.
REFERENCES
[1] S. Bi, C. K. Ho and R. Zhang, "Wireless powered communication: opportunities and challenges," in IEEE
Communications Magazine, vol. 53, no. 4, pp. 117-125, 2015.
[2] D. Niyato, D. I. Kim, M. Maso and Z. Han, "Wireless Powered Communication Networks: Research Directions and
Technological Approaches," in IEEE Wireless Communications, vol. 24, no. 6, pp. 88-97, 2017.
[3] Yu, H., Lee, H., &Jeon, H., “What is 5G?Emerging 5G Mobile Services and Network
Requirements,”Sustainability,vol. 9, no. 10, 2017.
 ISSN:2302-9285
Bulletin of Electr Eng & Inf, Vol. 9, No. 4, August 2020 : 1694 – 1700
1700
[4] Zhou, Xun, Rui Zhang, and Chin Keong Ho., "Wireless Information and Power Transfer: Architecture Design and
Rate-Energy Tradeoff," in IEEE Transactions on Communications,vol. 61, no. 11,pp.4754-767, 2013.
[5] Tan N. Nguyen, T.H.Q.Minh, Phuong T.Tran, MiroslavVoznak, T.T.Duy, Thanh-Long Nguyen and Phu Tran
Tin,"Performance Enhancement for Energy Harvesting Based Two-Way Relay Protocols in Wireless Ad-hoc
Networks with Partial and Full Relay Selection Methods,"Ad hoc Networks, vol. 84, pp.178-187, 2019.
[6] Tan N. Nguyen, T.H.Q.Minh, Phuong T.Tran and MiroslavVoznak, “Energy Harvesting over Rician Fading
Channel:A Performance Analysis for Half-Duplex Bidirectional Sensor Networks under Hardware Impairments,”
Sensors,vol. 18, no. 6, 2018.
[7] Tan N. Nguyen, T.H.Q.Minh, Phuong T. Tran and MiroslavVoznak, “Adaptive Energy Harvesting Relaying
Protocol for Two-Way Half Duplex System Network over Rician Fading Channel,” Wireless Communications and
Mobile Computing, pp. 1-10, 2018.
[8] M. R. Bhatnagar, "On the Capacity of Decode-and-Forward Relaying over Rician Fading Channels," in IEEE
Communications Letters, vol. 17, no. 6, pp. 1100-1103, 2013.
[9] Shannon, C. E., "Communication Theory of Secrecy Systems," Bell System Technical Journal,vol. 28, no. 4,
pp. 656-715, 1949.
[10] Li, Bin, YulongZou, Jianjiang Zhou, Fei Wang, Weifeng Cao, and Yu-Dong Yao, "Secrecy Outage Probability
Analysis of Friendly Jammer Selection Aided Multiuser Scheduling for Wireless Networks," IEEE Transactions on
Communications,vol. 67, no. 5, pp. 3482-495, 2019.
[11] Alemdar, Ali, and Mohamed Ibnkahla, "A Survey of Wireless Sensor Networks: Technologies, Challenges, and
Future Trends," Adaptation and Cross Layer Design in Wireless Networks, pp. 243-62, 2018.
[12] Y. Zhang, T. Liang and A. Sun, "Joint transmit antenna selection and jamming for security enhancement in MIMO
wiretap channels," in IEEE/CIC International Conference on Communications in China (ICCC), pp. 1-6, 2015.
[13] Cumanan, et.al.,"Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Multiple-Antenna
Eavesdropper." IEEE Transactions on Vehicular Technology,vol. 63, no. 4, pp. 1678-690, 2014.
[14] P. Mukherjee and S. Ulukus, "Secrecy in MIMO Networks With No Eavesdropper CSIT," in IEEE Transactions on
Communications, vol. 65, no. 10, pp. 4382-4391, Oct. 2017.
[15] Chu, Zheng, et.al., "Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Cooperative Jammer,"
inIEEE Transactions on Vehicular Technology, vol. 64, no. 5, pp. 1833-847, 2015.
[16] Ju, E. Oh and D. Hong, "Catching resource-devouring worms in next-generation wireless relay systems: Two-way
relay and full-duplex relay," in IEEE Communications Magazine, vol. 47, no. 9, pp. 58-65, 2009.
[17] Riihonen, Taneli, Stefan Werner, RistoWichman, and JyriHamalainen. Outage Probabilities in infrastructure-based
Single-Frequency Relay Links. IEEE Wireless Communications and Networking Conference, 2009.
[18] D. W. K. Ng, E. S. Lo and R. Schober, "Dynamic Resource Allocation in MIMO-OFDMA Systems with Full-
Duplex and Hybrid Relaying," in IEEE Transactions on Communications, vol. 60, no. 5, pp. 1291-1304, 2012.
[19] I. Krikidis, H. A. Suraweera, P. J. Smith and C. Yuen, "Full-Duplex Relay Selection for Amplify-and-Forward
Cooperative Networks," in IEEE Transactions on Wireless Communications, vol. 11, no. 12, pp. 4381-4393, 2012.
[20] S. Luo, R. Zhang and T. J. Lim, "Optimal save-then-transmit protocol for energy harvesting wireless transmitters,"
in IEEE International Symposium on Information Theory Proceedings, pp. 955-959, 2012.
[21] H. A. Suraweera, G. K. Karagiannidis and P. J. Smith, "Performance analysis of the dual-hop asymmetric fading
channel," in IEEE Transactions on Wireless Communications, vol. 8, no. 6, pp. 2783-2788, 2009.
[22] SoukainaEssaghir, Mohamed Benchagra, Noureddine El barbri, "Comparison between PI and PR Current
Controllers of a Grid- Connected Photovoltaic System Under Load Variation,"International Journal of Power
Electronics and Drive Systems (IJPEDS),vol. 9, no. 3, pp. 1311-1320, 2018.
[23] Phu Tran Tin, Minh Tran, Tan N. Nguyen, Thanh-Long Nguyen, "System performance analysis of hybrid
timepower switching protocol of EH bidirectional relaying network in amplify-and-forward mode," Indonesian
Journal of Electrical Engineering and Computer Science, vol. 14, no. 1, pp. 118-126, 2019.
[24] Phu Tran Tin, Le Anh Vu, Tan N. Nguyen, Thanh-Long Nguyen, "User selection protocol in DF cooperative
networks with hybrid TSR-PSR protocol based full-duplex energy harvesting over rayleigh fading channel: system
performance analysis,"Indonesian Journal of Electrical Engineering and Computer Science, vol. 13, no. 2,
pp. 534-542, 2019.
[25] Phu Tran Tin, Minh Tran, Tan N. Nguyen, Thanh-Long Nguyen, "A new look at energy harvesting half-duplex DF
power splitting protocol relay network over rician channel in case of maximizing capacity,"Indonesian Journal of
Electrical Engineering and Computer Science, vol. 13, no. 1, pp. 249-257, 2019.

More Related Content

What's hot

Hybrid TSR-PSR in nonlinear EH half duplex network: system performance analy...
Hybrid TSR-PSR in nonlinear EH half duplex  network: system performance analy...Hybrid TSR-PSR in nonlinear EH half duplex  network: system performance analy...
Hybrid TSR-PSR in nonlinear EH half duplex network: system performance analy...
IJECEIAES
 
Reduction of PAPR and Efficient detection ordering scheme for MIMO Transmissi...
Reduction of PAPR and Efficient detection ordering scheme for MIMO Transmissi...Reduction of PAPR and Efficient detection ordering scheme for MIMO Transmissi...
Reduction of PAPR and Efficient detection ordering scheme for MIMO Transmissi...
IJERA Editor
 
Intercept probability analysis in DF time switching full-duplex relaying netw...
Intercept probability analysis in DF time switching full-duplex relaying netw...Intercept probability analysis in DF time switching full-duplex relaying netw...
Intercept probability analysis in DF time switching full-duplex relaying netw...
TELKOMNIKA JOURNAL
 
Prediction of a reliable code for wireless communication systems
Prediction of a reliable code for wireless communication systemsPrediction of a reliable code for wireless communication systems
Prediction of a reliable code for wireless communication systems
iaemedu
 
Multi carrier equalization by restoration of redundanc y (merry) for adaptive...
Multi carrier equalization by restoration of redundanc y (merry) for adaptive...Multi carrier equalization by restoration of redundanc y (merry) for adaptive...
Multi carrier equalization by restoration of redundanc y (merry) for adaptive...
IJNSA Journal
 
Analysis of Space Time Codes Using Modulation Techniques
Analysis of Space Time Codes Using Modulation TechniquesAnalysis of Space Time Codes Using Modulation Techniques
Analysis of Space Time Codes Using Modulation Techniques
IOSR Journals
 
Introduction to Network Coding
Introduction to Network CodingIntroduction to Network Coding
A Novel Architecture for Different DSP Applications Using Field Programmable ...
A Novel Architecture for Different DSP Applications Using Field Programmable ...A Novel Architecture for Different DSP Applications Using Field Programmable ...
A Novel Architecture for Different DSP Applications Using Field Programmable ...
journal ijme
 
IRJET- Implementation of Reversible Radix-2 FFT VLSI Architecture using P...
IRJET-  	  Implementation of Reversible Radix-2 FFT VLSI Architecture using P...IRJET-  	  Implementation of Reversible Radix-2 FFT VLSI Architecture using P...
IRJET- Implementation of Reversible Radix-2 FFT VLSI Architecture using P...
IRJET Journal
 
Adaptive transmit diversity selection (atds) based on stbc and sfbc fir 2 x1 ...
Adaptive transmit diversity selection (atds) based on stbc and sfbc fir 2 x1 ...Adaptive transmit diversity selection (atds) based on stbc and sfbc fir 2 x1 ...
Adaptive transmit diversity selection (atds) based on stbc and sfbc fir 2 x1 ...
eSAT Publishing House
 
Outage performance of underlay cognitive radio networks over mix fading envir...
Outage performance of underlay cognitive radio networks over mix fading envir...Outage performance of underlay cognitive radio networks over mix fading envir...
Outage performance of underlay cognitive radio networks over mix fading envir...
IJECEIAES
 
A1080111
A1080111A1080111
A1080111
IJERD Editor
 
Investigation on energy harvesting enabled device-to-device networks in prese...
Investigation on energy harvesting enabled device-to-device networks in prese...Investigation on energy harvesting enabled device-to-device networks in prese...
Investigation on energy harvesting enabled device-to-device networks in prese...
TELKOMNIKA JOURNAL
 
PERFORMANCE ANALYSIS OF QOS PARAMETERS LIKE PSNR, MAE & RMSE USED IN IMAGE TR...
PERFORMANCE ANALYSIS OF QOS PARAMETERS LIKE PSNR, MAE & RMSE USED IN IMAGE TR...PERFORMANCE ANALYSIS OF QOS PARAMETERS LIKE PSNR, MAE & RMSE USED IN IMAGE TR...
PERFORMANCE ANALYSIS OF QOS PARAMETERS LIKE PSNR, MAE & RMSE USED IN IMAGE TR...
Journal For Research
 
Cnq1
Cnq1Cnq1
Optimization of Packet Length for Two Way Relaying with Energy Harvesting
Optimization of Packet Length for Two Way Relaying with Energy HarvestingOptimization of Packet Length for Two Way Relaying with Energy Harvesting
Optimization of Packet Length for Two Way Relaying with Energy Harvesting
IJCNCJournal
 
Ecg signal compression for diverse transforms
Ecg signal compression for diverse transformsEcg signal compression for diverse transforms
Ecg signal compression for diverse transforms
Alexander Decker
 
IRJET- VLSI Architecture for Reversible Radix-2 FFT Algorithm using Programma...
IRJET- VLSI Architecture for Reversible Radix-2 FFT Algorithm using Programma...IRJET- VLSI Architecture for Reversible Radix-2 FFT Algorithm using Programma...
IRJET- VLSI Architecture for Reversible Radix-2 FFT Algorithm using Programma...
IRJET Journal
 

What's hot (18)

Hybrid TSR-PSR in nonlinear EH half duplex network: system performance analy...
Hybrid TSR-PSR in nonlinear EH half duplex  network: system performance analy...Hybrid TSR-PSR in nonlinear EH half duplex  network: system performance analy...
Hybrid TSR-PSR in nonlinear EH half duplex network: system performance analy...
 
Reduction of PAPR and Efficient detection ordering scheme for MIMO Transmissi...
Reduction of PAPR and Efficient detection ordering scheme for MIMO Transmissi...Reduction of PAPR and Efficient detection ordering scheme for MIMO Transmissi...
Reduction of PAPR and Efficient detection ordering scheme for MIMO Transmissi...
 
Intercept probability analysis in DF time switching full-duplex relaying netw...
Intercept probability analysis in DF time switching full-duplex relaying netw...Intercept probability analysis in DF time switching full-duplex relaying netw...
Intercept probability analysis in DF time switching full-duplex relaying netw...
 
Prediction of a reliable code for wireless communication systems
Prediction of a reliable code for wireless communication systemsPrediction of a reliable code for wireless communication systems
Prediction of a reliable code for wireless communication systems
 
Multi carrier equalization by restoration of redundanc y (merry) for adaptive...
Multi carrier equalization by restoration of redundanc y (merry) for adaptive...Multi carrier equalization by restoration of redundanc y (merry) for adaptive...
Multi carrier equalization by restoration of redundanc y (merry) for adaptive...
 
Analysis of Space Time Codes Using Modulation Techniques
Analysis of Space Time Codes Using Modulation TechniquesAnalysis of Space Time Codes Using Modulation Techniques
Analysis of Space Time Codes Using Modulation Techniques
 
Introduction to Network Coding
Introduction to Network CodingIntroduction to Network Coding
Introduction to Network Coding
 
A Novel Architecture for Different DSP Applications Using Field Programmable ...
A Novel Architecture for Different DSP Applications Using Field Programmable ...A Novel Architecture for Different DSP Applications Using Field Programmable ...
A Novel Architecture for Different DSP Applications Using Field Programmable ...
 
IRJET- Implementation of Reversible Radix-2 FFT VLSI Architecture using P...
IRJET-  	  Implementation of Reversible Radix-2 FFT VLSI Architecture using P...IRJET-  	  Implementation of Reversible Radix-2 FFT VLSI Architecture using P...
IRJET- Implementation of Reversible Radix-2 FFT VLSI Architecture using P...
 
Adaptive transmit diversity selection (atds) based on stbc and sfbc fir 2 x1 ...
Adaptive transmit diversity selection (atds) based on stbc and sfbc fir 2 x1 ...Adaptive transmit diversity selection (atds) based on stbc and sfbc fir 2 x1 ...
Adaptive transmit diversity selection (atds) based on stbc and sfbc fir 2 x1 ...
 
Outage performance of underlay cognitive radio networks over mix fading envir...
Outage performance of underlay cognitive radio networks over mix fading envir...Outage performance of underlay cognitive radio networks over mix fading envir...
Outage performance of underlay cognitive radio networks over mix fading envir...
 
A1080111
A1080111A1080111
A1080111
 
Investigation on energy harvesting enabled device-to-device networks in prese...
Investigation on energy harvesting enabled device-to-device networks in prese...Investigation on energy harvesting enabled device-to-device networks in prese...
Investigation on energy harvesting enabled device-to-device networks in prese...
 
PERFORMANCE ANALYSIS OF QOS PARAMETERS LIKE PSNR, MAE & RMSE USED IN IMAGE TR...
PERFORMANCE ANALYSIS OF QOS PARAMETERS LIKE PSNR, MAE & RMSE USED IN IMAGE TR...PERFORMANCE ANALYSIS OF QOS PARAMETERS LIKE PSNR, MAE & RMSE USED IN IMAGE TR...
PERFORMANCE ANALYSIS OF QOS PARAMETERS LIKE PSNR, MAE & RMSE USED IN IMAGE TR...
 
Cnq1
Cnq1Cnq1
Cnq1
 
Optimization of Packet Length for Two Way Relaying with Energy Harvesting
Optimization of Packet Length for Two Way Relaying with Energy HarvestingOptimization of Packet Length for Two Way Relaying with Energy Harvesting
Optimization of Packet Length for Two Way Relaying with Energy Harvesting
 
Ecg signal compression for diverse transforms
Ecg signal compression for diverse transformsEcg signal compression for diverse transforms
Ecg signal compression for diverse transforms
 
IRJET- VLSI Architecture for Reversible Radix-2 FFT Algorithm using Programma...
IRJET- VLSI Architecture for Reversible Radix-2 FFT Algorithm using Programma...IRJET- VLSI Architecture for Reversible Radix-2 FFT Algorithm using Programma...
IRJET- VLSI Architecture for Reversible Radix-2 FFT Algorithm using Programma...
 

Similar to Physical security layer with friendly jammer in half-duplex relaying networks over rayleigh fading channel: Intercept probability analysis

Physical layer security in DF full-duplex relaying network: performance analysis
Physical layer security in DF full-duplex relaying network: performance analysisPhysical layer security in DF full-duplex relaying network: performance analysis
Physical layer security in DF full-duplex relaying network: performance analysis
nooriasukmaningtyas
 
Performance analysis for power-splitting energy harvesting based two-way full...
Performance analysis for power-splitting energy harvesting based two-way full...Performance analysis for power-splitting energy harvesting based two-way full...
Performance analysis for power-splitting energy harvesting based two-way full...
TELKOMNIKA JOURNAL
 
Security performance analysis for power domain NOMA employing in cognitive ra...
Security performance analysis for power domain NOMA employing in cognitive ra...Security performance analysis for power domain NOMA employing in cognitive ra...
Security performance analysis for power domain NOMA employing in cognitive ra...
journalBEEI
 
Outage performance analysis of non-orthogonal multiple access systems with RF...
Outage performance analysis of non-orthogonal multiple access systems with RF...Outage performance analysis of non-orthogonal multiple access systems with RF...
Outage performance analysis of non-orthogonal multiple access systems with RF...
IJECEIAES
 
Hybrid Time-power Switching Protocol of Energy Harvesting Bidirectional Relay...
Hybrid Time-power Switching Protocol of Energy Harvesting Bidirectional Relay...Hybrid Time-power Switching Protocol of Energy Harvesting Bidirectional Relay...
Hybrid Time-power Switching Protocol of Energy Harvesting Bidirectional Relay...
TELKOMNIKA JOURNAL
 
Study on outage performance gap of two destinations on CR-NOMA network
Study on outage performance gap of two destinations on CR-NOMA networkStudy on outage performance gap of two destinations on CR-NOMA network
Study on outage performance gap of two destinations on CR-NOMA network
TELKOMNIKA JOURNAL
 
User selection protocols in FD PSP EH cooperative network over rayleigh fadin...
User selection protocols in FD PSP EH cooperative network over rayleigh fadin...User selection protocols in FD PSP EH cooperative network over rayleigh fadin...
User selection protocols in FD PSP EH cooperative network over rayleigh fadin...
International Journal of Power Electronics and Drive Systems
 
Average Channel Capacity of Amplify-and-forward MIMO/FSO Systems Over Atmosph...
Average Channel Capacity of Amplify-and-forward MIMO/FSO Systems Over Atmosph...Average Channel Capacity of Amplify-and-forward MIMO/FSO Systems Over Atmosph...
Average Channel Capacity of Amplify-and-forward MIMO/FSO Systems Over Atmosph...
IJECEIAES
 
Performance enhancement of wireless sensor network by using non-orthogonal mu...
Performance enhancement of wireless sensor network by using non-orthogonal mu...Performance enhancement of wireless sensor network by using non-orthogonal mu...
Performance enhancement of wireless sensor network by using non-orthogonal mu...
nooriasukmaningtyas
 
Adaptive Relay Scheme Based on Channel State in Dual-Hop System
Adaptive Relay Scheme Based on Channel State in Dual-Hop SystemAdaptive Relay Scheme Based on Channel State in Dual-Hop System
Adaptive Relay Scheme Based on Channel State in Dual-Hop System
IJERA Editor
 
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMAExact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
TELKOMNIKA JOURNAL
 
Exact secure outage probability performance of uplinkdownlink multiple access...
Exact secure outage probability performance of uplinkdownlink multiple access...Exact secure outage probability performance of uplinkdownlink multiple access...
Exact secure outage probability performance of uplinkdownlink multiple access...
journalBEEI
 
Performance Analysis of Differential Beamforming in Decentralized Networks
Performance Analysis of Differential Beamforming in Decentralized NetworksPerformance Analysis of Differential Beamforming in Decentralized Networks
Performance Analysis of Differential Beamforming in Decentralized Networks
IJECEIAES
 
Enabling relay selection in non-orthogonal multiple access networks: direct a...
Enabling relay selection in non-orthogonal multiple access networks: direct a...Enabling relay selection in non-orthogonal multiple access networks: direct a...
Enabling relay selection in non-orthogonal multiple access networks: direct a...
TELKOMNIKA JOURNAL
 
Kanal wireless dan propagasi
Kanal wireless dan propagasiKanal wireless dan propagasi
Kanal wireless dan propagasi
Mochamad Guntur Hady Putra
 
Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...
Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...
Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...
TELKOMNIKA JOURNAL
 
New proposed spherical slotted antenna covered by the layers of dielectric ma...
New proposed spherical slotted antenna covered by the layers of dielectric ma...New proposed spherical slotted antenna covered by the layers of dielectric ma...
New proposed spherical slotted antenna covered by the layers of dielectric ma...
IJECEIAES
 
Propagation Model for Tree Blockage in Mobile Communication Systems using Uni...
Propagation Model for Tree Blockage in Mobile Communication Systems using Uni...Propagation Model for Tree Blockage in Mobile Communication Systems using Uni...
Propagation Model for Tree Blockage in Mobile Communication Systems using Uni...
IJEEE
 
Decimal convertor application for optical wireless communication by generatin...
Decimal convertor application for optical wireless communication by generatin...Decimal convertor application for optical wireless communication by generatin...
Decimal convertor application for optical wireless communication by generatin...
University of Malaya (UM)
 
Decimal Convertor Application for Optical Wireless Communication by Generatin...
Decimal Convertor Application for Optical Wireless Communication by Generatin...Decimal Convertor Application for Optical Wireless Communication by Generatin...
Decimal Convertor Application for Optical Wireless Communication by Generatin...
University of Malaya (UM)
 

Similar to Physical security layer with friendly jammer in half-duplex relaying networks over rayleigh fading channel: Intercept probability analysis (20)

Physical layer security in DF full-duplex relaying network: performance analysis
Physical layer security in DF full-duplex relaying network: performance analysisPhysical layer security in DF full-duplex relaying network: performance analysis
Physical layer security in DF full-duplex relaying network: performance analysis
 
Performance analysis for power-splitting energy harvesting based two-way full...
Performance analysis for power-splitting energy harvesting based two-way full...Performance analysis for power-splitting energy harvesting based two-way full...
Performance analysis for power-splitting energy harvesting based two-way full...
 
Security performance analysis for power domain NOMA employing in cognitive ra...
Security performance analysis for power domain NOMA employing in cognitive ra...Security performance analysis for power domain NOMA employing in cognitive ra...
Security performance analysis for power domain NOMA employing in cognitive ra...
 
Outage performance analysis of non-orthogonal multiple access systems with RF...
Outage performance analysis of non-orthogonal multiple access systems with RF...Outage performance analysis of non-orthogonal multiple access systems with RF...
Outage performance analysis of non-orthogonal multiple access systems with RF...
 
Hybrid Time-power Switching Protocol of Energy Harvesting Bidirectional Relay...
Hybrid Time-power Switching Protocol of Energy Harvesting Bidirectional Relay...Hybrid Time-power Switching Protocol of Energy Harvesting Bidirectional Relay...
Hybrid Time-power Switching Protocol of Energy Harvesting Bidirectional Relay...
 
Study on outage performance gap of two destinations on CR-NOMA network
Study on outage performance gap of two destinations on CR-NOMA networkStudy on outage performance gap of two destinations on CR-NOMA network
Study on outage performance gap of two destinations on CR-NOMA network
 
User selection protocols in FD PSP EH cooperative network over rayleigh fadin...
User selection protocols in FD PSP EH cooperative network over rayleigh fadin...User selection protocols in FD PSP EH cooperative network over rayleigh fadin...
User selection protocols in FD PSP EH cooperative network over rayleigh fadin...
 
Average Channel Capacity of Amplify-and-forward MIMO/FSO Systems Over Atmosph...
Average Channel Capacity of Amplify-and-forward MIMO/FSO Systems Over Atmosph...Average Channel Capacity of Amplify-and-forward MIMO/FSO Systems Over Atmosph...
Average Channel Capacity of Amplify-and-forward MIMO/FSO Systems Over Atmosph...
 
Performance enhancement of wireless sensor network by using non-orthogonal mu...
Performance enhancement of wireless sensor network by using non-orthogonal mu...Performance enhancement of wireless sensor network by using non-orthogonal mu...
Performance enhancement of wireless sensor network by using non-orthogonal mu...
 
Adaptive Relay Scheme Based on Channel State in Dual-Hop System
Adaptive Relay Scheme Based on Channel State in Dual-Hop SystemAdaptive Relay Scheme Based on Channel State in Dual-Hop System
Adaptive Relay Scheme Based on Channel State in Dual-Hop System
 
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMAExact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
Exact Outage Performance Analysis of Amplify-and-forward-aware Cooperative NOMA
 
Exact secure outage probability performance of uplinkdownlink multiple access...
Exact secure outage probability performance of uplinkdownlink multiple access...Exact secure outage probability performance of uplinkdownlink multiple access...
Exact secure outage probability performance of uplinkdownlink multiple access...
 
Performance Analysis of Differential Beamforming in Decentralized Networks
Performance Analysis of Differential Beamforming in Decentralized NetworksPerformance Analysis of Differential Beamforming in Decentralized Networks
Performance Analysis of Differential Beamforming in Decentralized Networks
 
Enabling relay selection in non-orthogonal multiple access networks: direct a...
Enabling relay selection in non-orthogonal multiple access networks: direct a...Enabling relay selection in non-orthogonal multiple access networks: direct a...
Enabling relay selection in non-orthogonal multiple access networks: direct a...
 
Kanal wireless dan propagasi
Kanal wireless dan propagasiKanal wireless dan propagasi
Kanal wireless dan propagasi
 
Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...
Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...
Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...
 
New proposed spherical slotted antenna covered by the layers of dielectric ma...
New proposed spherical slotted antenna covered by the layers of dielectric ma...New proposed spherical slotted antenna covered by the layers of dielectric ma...
New proposed spherical slotted antenna covered by the layers of dielectric ma...
 
Propagation Model for Tree Blockage in Mobile Communication Systems using Uni...
Propagation Model for Tree Blockage in Mobile Communication Systems using Uni...Propagation Model for Tree Blockage in Mobile Communication Systems using Uni...
Propagation Model for Tree Blockage in Mobile Communication Systems using Uni...
 
Decimal convertor application for optical wireless communication by generatin...
Decimal convertor application for optical wireless communication by generatin...Decimal convertor application for optical wireless communication by generatin...
Decimal convertor application for optical wireless communication by generatin...
 
Decimal Convertor Application for Optical Wireless Communication by Generatin...
Decimal Convertor Application for Optical Wireless Communication by Generatin...Decimal Convertor Application for Optical Wireless Communication by Generatin...
Decimal Convertor Application for Optical Wireless Communication by Generatin...
 

More from journalBEEI

Square transposition: an approach to the transposition process in block cipher
Square transposition: an approach to the transposition process in block cipherSquare transposition: an approach to the transposition process in block cipher
Square transposition: an approach to the transposition process in block cipher
journalBEEI
 
Hyper-parameter optimization of convolutional neural network based on particl...
Hyper-parameter optimization of convolutional neural network based on particl...Hyper-parameter optimization of convolutional neural network based on particl...
Hyper-parameter optimization of convolutional neural network based on particl...
journalBEEI
 
Supervised machine learning based liver disease prediction approach with LASS...
Supervised machine learning based liver disease prediction approach with LASS...Supervised machine learning based liver disease prediction approach with LASS...
Supervised machine learning based liver disease prediction approach with LASS...
journalBEEI
 
A secure and energy saving protocol for wireless sensor networks
A secure and energy saving protocol for wireless sensor networksA secure and energy saving protocol for wireless sensor networks
A secure and energy saving protocol for wireless sensor networks
journalBEEI
 
Plant leaf identification system using convolutional neural network
Plant leaf identification system using convolutional neural networkPlant leaf identification system using convolutional neural network
Plant leaf identification system using convolutional neural network
journalBEEI
 
Customized moodle-based learning management system for socially disadvantaged...
Customized moodle-based learning management system for socially disadvantaged...Customized moodle-based learning management system for socially disadvantaged...
Customized moodle-based learning management system for socially disadvantaged...
journalBEEI
 
Understanding the role of individual learner in adaptive and personalized e-l...
Understanding the role of individual learner in adaptive and personalized e-l...Understanding the role of individual learner in adaptive and personalized e-l...
Understanding the role of individual learner in adaptive and personalized e-l...
journalBEEI
 
Prototype mobile contactless transaction system in traditional markets to sup...
Prototype mobile contactless transaction system in traditional markets to sup...Prototype mobile contactless transaction system in traditional markets to sup...
Prototype mobile contactless transaction system in traditional markets to sup...
journalBEEI
 
Wireless HART stack using multiprocessor technique with laxity algorithm
Wireless HART stack using multiprocessor technique with laxity algorithmWireless HART stack using multiprocessor technique with laxity algorithm
Wireless HART stack using multiprocessor technique with laxity algorithm
journalBEEI
 
Implementation of double-layer loaded on octagon microstrip yagi antenna
Implementation of double-layer loaded on octagon microstrip yagi antennaImplementation of double-layer loaded on octagon microstrip yagi antenna
Implementation of double-layer loaded on octagon microstrip yagi antenna
journalBEEI
 
The calculation of the field of an antenna located near the human head
The calculation of the field of an antenna located near the human headThe calculation of the field of an antenna located near the human head
The calculation of the field of an antenna located near the human head
journalBEEI
 
Design of a dual-band antenna for energy harvesting application
Design of a dual-band antenna for energy harvesting applicationDesign of a dual-band antenna for energy harvesting application
Design of a dual-band antenna for energy harvesting application
journalBEEI
 
Transforming data-centric eXtensible markup language into relational database...
Transforming data-centric eXtensible markup language into relational database...Transforming data-centric eXtensible markup language into relational database...
Transforming data-centric eXtensible markup language into relational database...
journalBEEI
 
Key performance requirement of future next wireless networks (6G)
Key performance requirement of future next wireless networks (6G)Key performance requirement of future next wireless networks (6G)
Key performance requirement of future next wireless networks (6G)
journalBEEI
 
Noise resistance territorial intensity-based optical flow using inverse confi...
Noise resistance territorial intensity-based optical flow using inverse confi...Noise resistance territorial intensity-based optical flow using inverse confi...
Noise resistance territorial intensity-based optical flow using inverse confi...
journalBEEI
 
Modeling climate phenomenon with software grids analysis and display system i...
Modeling climate phenomenon with software grids analysis and display system i...Modeling climate phenomenon with software grids analysis and display system i...
Modeling climate phenomenon with software grids analysis and display system i...
journalBEEI
 
An approach of re-organizing input dataset to enhance the quality of emotion ...
An approach of re-organizing input dataset to enhance the quality of emotion ...An approach of re-organizing input dataset to enhance the quality of emotion ...
An approach of re-organizing input dataset to enhance the quality of emotion ...
journalBEEI
 
Parking detection system using background subtraction and HSV color segmentation
Parking detection system using background subtraction and HSV color segmentationParking detection system using background subtraction and HSV color segmentation
Parking detection system using background subtraction and HSV color segmentation
journalBEEI
 
Quality of service performances of video and voice transmission in universal ...
Quality of service performances of video and voice transmission in universal ...Quality of service performances of video and voice transmission in universal ...
Quality of service performances of video and voice transmission in universal ...
journalBEEI
 
A multi-task learning based hybrid prediction algorithm for privacy preservin...
A multi-task learning based hybrid prediction algorithm for privacy preservin...A multi-task learning based hybrid prediction algorithm for privacy preservin...
A multi-task learning based hybrid prediction algorithm for privacy preservin...
journalBEEI
 

More from journalBEEI (20)

Square transposition: an approach to the transposition process in block cipher
Square transposition: an approach to the transposition process in block cipherSquare transposition: an approach to the transposition process in block cipher
Square transposition: an approach to the transposition process in block cipher
 
Hyper-parameter optimization of convolutional neural network based on particl...
Hyper-parameter optimization of convolutional neural network based on particl...Hyper-parameter optimization of convolutional neural network based on particl...
Hyper-parameter optimization of convolutional neural network based on particl...
 
Supervised machine learning based liver disease prediction approach with LASS...
Supervised machine learning based liver disease prediction approach with LASS...Supervised machine learning based liver disease prediction approach with LASS...
Supervised machine learning based liver disease prediction approach with LASS...
 
A secure and energy saving protocol for wireless sensor networks
A secure and energy saving protocol for wireless sensor networksA secure and energy saving protocol for wireless sensor networks
A secure and energy saving protocol for wireless sensor networks
 
Plant leaf identification system using convolutional neural network
Plant leaf identification system using convolutional neural networkPlant leaf identification system using convolutional neural network
Plant leaf identification system using convolutional neural network
 
Customized moodle-based learning management system for socially disadvantaged...
Customized moodle-based learning management system for socially disadvantaged...Customized moodle-based learning management system for socially disadvantaged...
Customized moodle-based learning management system for socially disadvantaged...
 
Understanding the role of individual learner in adaptive and personalized e-l...
Understanding the role of individual learner in adaptive and personalized e-l...Understanding the role of individual learner in adaptive and personalized e-l...
Understanding the role of individual learner in adaptive and personalized e-l...
 
Prototype mobile contactless transaction system in traditional markets to sup...
Prototype mobile contactless transaction system in traditional markets to sup...Prototype mobile contactless transaction system in traditional markets to sup...
Prototype mobile contactless transaction system in traditional markets to sup...
 
Wireless HART stack using multiprocessor technique with laxity algorithm
Wireless HART stack using multiprocessor technique with laxity algorithmWireless HART stack using multiprocessor technique with laxity algorithm
Wireless HART stack using multiprocessor technique with laxity algorithm
 
Implementation of double-layer loaded on octagon microstrip yagi antenna
Implementation of double-layer loaded on octagon microstrip yagi antennaImplementation of double-layer loaded on octagon microstrip yagi antenna
Implementation of double-layer loaded on octagon microstrip yagi antenna
 
The calculation of the field of an antenna located near the human head
The calculation of the field of an antenna located near the human headThe calculation of the field of an antenna located near the human head
The calculation of the field of an antenna located near the human head
 
Design of a dual-band antenna for energy harvesting application
Design of a dual-band antenna for energy harvesting applicationDesign of a dual-band antenna for energy harvesting application
Design of a dual-band antenna for energy harvesting application
 
Transforming data-centric eXtensible markup language into relational database...
Transforming data-centric eXtensible markup language into relational database...Transforming data-centric eXtensible markup language into relational database...
Transforming data-centric eXtensible markup language into relational database...
 
Key performance requirement of future next wireless networks (6G)
Key performance requirement of future next wireless networks (6G)Key performance requirement of future next wireless networks (6G)
Key performance requirement of future next wireless networks (6G)
 
Noise resistance territorial intensity-based optical flow using inverse confi...
Noise resistance territorial intensity-based optical flow using inverse confi...Noise resistance territorial intensity-based optical flow using inverse confi...
Noise resistance territorial intensity-based optical flow using inverse confi...
 
Modeling climate phenomenon with software grids analysis and display system i...
Modeling climate phenomenon with software grids analysis and display system i...Modeling climate phenomenon with software grids analysis and display system i...
Modeling climate phenomenon with software grids analysis and display system i...
 
An approach of re-organizing input dataset to enhance the quality of emotion ...
An approach of re-organizing input dataset to enhance the quality of emotion ...An approach of re-organizing input dataset to enhance the quality of emotion ...
An approach of re-organizing input dataset to enhance the quality of emotion ...
 
Parking detection system using background subtraction and HSV color segmentation
Parking detection system using background subtraction and HSV color segmentationParking detection system using background subtraction and HSV color segmentation
Parking detection system using background subtraction and HSV color segmentation
 
Quality of service performances of video and voice transmission in universal ...
Quality of service performances of video and voice transmission in universal ...Quality of service performances of video and voice transmission in universal ...
Quality of service performances of video and voice transmission in universal ...
 
A multi-task learning based hybrid prediction algorithm for privacy preservin...
A multi-task learning based hybrid prediction algorithm for privacy preservin...A multi-task learning based hybrid prediction algorithm for privacy preservin...
A multi-task learning based hybrid prediction algorithm for privacy preservin...
 

Recently uploaded

Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
wisnuprabawa3
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
KrishnaveniKrishnara1
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMTIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
HODECEDSIET
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
mahammadsalmanmech
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
RadiNasr
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
zubairahmad848137
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
University of Maribor
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
nooriasukmaningtyas
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 

Recently uploaded (20)

Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMTIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 

Physical security layer with friendly jammer in half-duplex relaying networks over rayleigh fading channel: Intercept probability analysis

  • 1. Bulletin of Electrical Engineering and Informatics Vol. 9, No. 4, August 2020, pp. 1694~1700 ISSN: 2302-9285, DOI: 10.11591/eei.v9i4.2249  1694 Journal homepage: http://beei.org Physical security layer with friendly jammer in half-duplex relaying networks over rayleigh fading channel: Intercept probability analysis Phu Tran Tin1 , Duy Hung Ha2 , Minh Tran3 , Tran Thanh Trang4 1 Faculty of Electronics Technology, Industrial University of Ho Chi Minh City, Vietnam 2 Wireless Communications Research Group, Faculty of Electrical and Electronics Engineering, Ton Duc Thang University, Vietnam 3 Optoelectronics Research Group, Faculty of Electrical and Electronics Engineering, Ton Duc Thang University, Vietnam 4 National Key Laboratory of Digital Control and System Engineering, Vietnam Article Info ABSTRACT Article history: Received Dec 10, 2019 Revised Feb 17, 2020 Accepted Mar 23, 2020 In this research, thephysical security layer with a friendly jammerin half-duplex (HD) relaying networksover the Rayleigh fading channel is proposed and investigated. Firstly, we proposed the system model and the time switching,power splitting protocolsfor the system model. Then we conductedthe mathematical analysisfor deriving theexact analysis and asymptotic analysisintegral forms for intercept probability (IP). Finally, the analytical formulationis verified by the Monte Carlo Simulation with all main system parameters. From the results, we can show that the simulation and analytical values are the same values. Keywords: Energy harvesting Half-duplex Intercept probability Monte Carlo Simulation Relaying network This is an open access article under the CC BY-SAlicense. Corresponding Author: Duy Hung Ha, Wireless Communications Research Group, Faculty of Electrical and Electronics Engineering, Ton Duc Thang University, Ho Chi Minh City, Vietnam. Email: haduyhung@tdtu.edu.vn 1. INTRODUCTION Nowadays, harvesting energy (EH) from green environmental sources such as sun, wind, etc and converting this energy into the electrical energy for the communication network devices is the hot reseach direction in both civil and industial purposes. In the series of the leading environmental green energy sources, the radio frequency (RF) signals can be considered as the prospective energy source in the future. RF signals can be proposed as the role of information transmission or harvesting energy in the sensor nodes [1-8]. In the past, we used the traditional network security protocol, which is working based on cryptographic technologies for security protecting wireless networks. For extensive research efforts, the physical-layer security (PLS), which is opareting normal wihthout key negotiation and distribution, is proposed and investigated in the modern communication network. Furthermore, PLS technology has a huge advantage for protecting the confidential communication between a source node to its destination as studied [9-10]. The PLS in the wireless networks with cooperative relaying, jamming, multiuser scheduling, multiple-input-multiple-output (MIMO) ..etc have been proposed and investigated in [11-15].
  • 2. Bulletin of Electr Eng & Inf ISSN: 2302-9285  Physical security layer with friendly jammer in half-duplex relaying… (Phu Tran Tin) 1695 In this research, the physical security layer with a friendly jammer in half-duplex (HD) relaying networks over the Rayleigh fading channel is proposed and investigated. In the first stage, we proposed the system model and the time switching, power splitting protocols for the system model. Then we conducted the mathematical analysis for deriving the exact analysis and asymptotic analysis integral forms for intercept probability (IP). Finally, the analytical formulation is verified by the Monte Carlo Simulation with all main system parameters. The research results show that the analytical and simulation are the same values. 2. SYSTEM MODEL The system model, in which a source node (S) communicates with a destination node (D) via the intermediate Relay node (R) in the presence of a passive eavesdropper (E) with the help of a friendly jammer (J), is illustrated in Figure 1. The energy harvesting (EH) and information processing (IT) processes of the system model are drwan in Figure 2. In this scheme, T is the block time in which the source fully transmits the information data to the destination. In the first interval time (αT), the R and J harvest energy from the S signal, where α is the time switching factor α ∈ (0, 1) In the two remaining intervals time (1-α)T/2, the S and R node transfer information to the D node [5-7, 16-24]. IT Phase EH Phase S D R J E SR h RD h BS h JE h RE h EH at J 2 IT S R   IT R D   T T  (1- )T/2  (1- )T/2  EH at R Figure 1. System model Figure 2. The EH and IT phases 2.1. Energy harvesting (EH) phase In the first phase, the source will supply the energy for both jammer and relay nodes. Hence, the harvested energy at the jammer and relay can be given as, respectively: 2 J S SJ E P T h    (1) 2 R S SR E P T h    (2) where 0 1    is energy conversion efficiency, PS is the average transmitted power at the source, and hSJ, hSR are the channel gain of S-J link, S-R link, respectively. The average transmitted power at the jammer and relay nodes can be obtained from(1) and (2), respectively: 2 2 (1 ) / 2 (1 ) / 2 S SJ J J S SJ P T h E P P h T T           (3) 2 R S SR P P h   (4) where 2 1     
  • 3.  ISSN:2302-9285 Bulletin of Electr Eng & Inf, Vol. 9, No. 4, August 2020 : 1694 – 1700 1696 2.2. Information transmission phase In the second phase, the received signal at the R can be rewritten as: r SR s r y h x n   (5) wherehSR is the channel gain of S-R link, xs is the transmitted signal from the S and nr is additive white Gaussian noise (AWGN) with variance N0. In the third phase, the received signal at the destination can be given by: d RD r d y h x n   (6) wherehRD is the channel gain of R-D link, xr is the transmitted signal from relay and nd is (AWGN) with variance N0. Here, we consider amplify and forward (AF) mode at the relay. Hence, the amplifying factor can be given as: 2 0 r R r s SR x P y P h N     (7) The received signal at the E can be given by: (8) wherehRE is the channel gain of R-E link and nE is AWGN with variance N0. 3. INTERCEPT PROBABILITY (IP) The SNR at the eavesdropper can be expressed as:     2 2 2 2 2 2 2 2 0 0 SR RE s E RE JE J signal h h P h N h P N noise          (9) Substituting (3) into (9), we have: 2 2 2 2 2 2 1 SR RE E SJ JE RE h h h h h        (10) where 0 s P N   After doing some algebra, the (10) can be reformulated as: 4 2 2 2 2 2 2 2 2 2 1 1 SR RE E SR RE SR SJ JE SJ JE h h h h h h h h h X Y XY XZ Z                  (11)
  • 4. Bulletin of Electr Eng & Inf ISSN: 2302-9285  Physical security layer with friendly jammer in half-duplex relaying… (Phu Tran Tin) 1697 where 2 2 2 2 , , SR RE SJ JE X h Y h Z h h    Lemma1.Please note that all channels are the Rayleigh fading channels, so the probability density function (PDF) of 2 i h can be given by: 2 ( ) i i x i h f x e     (12) where ( , ) i SR RE  . Moreover, the cumulative distribution function (CDF) of 2 i h also can be obtained by: 2 ( ) 1 i i x h F x e     (16) where i  is the mean value of the exponential random variable 2 i h . Lemma2.The CDF of Z can be computed as respectively: 2 2 2 2 0 ( ) | ( ) JE Sj Z JE h h JE a F a F h x f x dx h             (13) Utilizing the result in [25], the CDF of Z can be shown as the below equation, respectively:   1 ( ) 1 2 2 Z SJ JE SJ JE F a aK a       (15) where ( ) v K  is the modified Bessel function of the second kind and vth order and , SJ JE   are mean of the random variable (RV) 2 2 , SJ JE h h , respectively. From (15), the PDF of Z can be calculated as, after applying the formula, 1 ( ) ( ) ( ) n n n K z n K z K z z z         0 ( ) ( ) 2 2 Z Z SJ JE SJ JE F a f a K a a         (16) 3.1. Exact analysis The IP can be defined by:   Pr E th IP     (17) Substituting (11) into (17); finally, we have:               2 Pr 1 Pr Pr , 0 , th th th th th th th th th th th th th th th X Y IP XY XZ Z Z X XY X XY X Z X and XY X X X or XY X                                                                      (18) where 2 2 1 R th    is the threshold of system and R: target rate. The (20) can be rewritten by:
  • 5.  ISSN:2302-9285 Bulletin of Electr Eng & Inf, Vol. 9, No. 4, August 2020 : 1694 – 1700 1698         ( , ) 0 Pr ( ) ( ) ( ) th th th th th th th th th th g x y X Y Z x x X IP Y X X XY X Z X f x dx f y dy f z dz                                          (19) where     ( , ) th th th th xy x g x y x          Applying (16) and (19) can be reformulated as:         ( , ) 0 0 2 exp exp 2 th th th g x y SR RE SJ JE SR RE SJ JE x x IP x dx y dy K z dz                       (20) 3.2. Asymptotic analysis Atthe high SNRregime, the (11)can be approximatedas XY E Z    The IP can be computed as:   0 Pr Pr Pr | ( ) th w E th th Z W th th XY W W IP Z F W w f w dw Z                                    (21) where W XY  . Similar in Lemma2,the CDF and PDF ofW can be obtained as, respectively:   1 ( ) 1 2 2 W SR RE SR RE F b bK b       (22)   0 ( ) 2 2 W SR RE SR RE f b K b      (23) Substituting (15) and(23) into (21), we have:   1 0 0 2 1 2 2 2 SJ JE SJ JE SR RE SR RE th th w w IP K K w dw                                  (24) 4. NUMERICAL RESULTS AND DISCUSSION The influence of ψ on the system IP is plotted in Figure 3 with the main system parameters is set up as η=0.8, α=0.5, R= 0.5, 1.0, 1.5 bps/Hz respectively. From the results, we can state that the asymptotic IP is convergence to the exact IP at the end of the ψ values, and the analytical values are the same as the simulation values. The higher R, the worst IP values. The influence of ψ on the system IP is presented in Figure4 with the main system parameters is set up as ψ=15 dB, α=0.25, 0.5, 0.85, R= 0.5bps/Hz respectively. And the IP versus η and Ris illustrated in Figures 5 and 6.Here we set up the primary system parameters asψ=15 dB,R= 0.5bps/Hz, α=0.25, 0.5, 0.85, η=0.25, 0.5, 1 respectively. From the results, we can state that the analytical values are the same as the simulation values. The better values of the IP is getting with the lower values of η,α, but with the higher values of R. All the research results are convinced by analytical expressions.
  • 6. Bulletin of Electr Eng & Inf ISSN: 2302-9285  Physical security layer with friendly jammer in half-duplex relaying… (Phu Tran Tin) 1699 Figure 3. IP versus ψ Figure 4. IP versus α Figure 5. IP versus η. Figure 6. IP versus R 5. CONCLUSION In thisresearch, the physical security layer with a friendly jammer in half-duplex (HD) relaying networks over the Rayleigh fading channel is proposed and investigated. In the first stage, we proposed the system model and the time switching, power splitting protocols for the system model. Then we conducted the mathematical analysis for deriving the exact analysis and asymptotic analysis integral forms for Intercept probability (IP). Finally, the analytical formulation is verified by the Monte Carlo Simulation with all main system parameters. The research results show that the analytical and simulation are the same values. ACKNOWLEDGMENTS This research was supported byNational Key Laboratory of Digital Control and System Engineering (DCSELAB), HCMUT, VNU-HCM, Vietnam. REFERENCES [1] S. Bi, C. K. Ho and R. Zhang, "Wireless powered communication: opportunities and challenges," in IEEE Communications Magazine, vol. 53, no. 4, pp. 117-125, 2015. [2] D. Niyato, D. I. Kim, M. Maso and Z. Han, "Wireless Powered Communication Networks: Research Directions and Technological Approaches," in IEEE Wireless Communications, vol. 24, no. 6, pp. 88-97, 2017. [3] Yu, H., Lee, H., &Jeon, H., “What is 5G?Emerging 5G Mobile Services and Network Requirements,”Sustainability,vol. 9, no. 10, 2017.
  • 7.  ISSN:2302-9285 Bulletin of Electr Eng & Inf, Vol. 9, No. 4, August 2020 : 1694 – 1700 1700 [4] Zhou, Xun, Rui Zhang, and Chin Keong Ho., "Wireless Information and Power Transfer: Architecture Design and Rate-Energy Tradeoff," in IEEE Transactions on Communications,vol. 61, no. 11,pp.4754-767, 2013. [5] Tan N. Nguyen, T.H.Q.Minh, Phuong T.Tran, MiroslavVoznak, T.T.Duy, Thanh-Long Nguyen and Phu Tran Tin,"Performance Enhancement for Energy Harvesting Based Two-Way Relay Protocols in Wireless Ad-hoc Networks with Partial and Full Relay Selection Methods,"Ad hoc Networks, vol. 84, pp.178-187, 2019. [6] Tan N. Nguyen, T.H.Q.Minh, Phuong T.Tran and MiroslavVoznak, “Energy Harvesting over Rician Fading Channel:A Performance Analysis for Half-Duplex Bidirectional Sensor Networks under Hardware Impairments,” Sensors,vol. 18, no. 6, 2018. [7] Tan N. Nguyen, T.H.Q.Minh, Phuong T. Tran and MiroslavVoznak, “Adaptive Energy Harvesting Relaying Protocol for Two-Way Half Duplex System Network over Rician Fading Channel,” Wireless Communications and Mobile Computing, pp. 1-10, 2018. [8] M. R. Bhatnagar, "On the Capacity of Decode-and-Forward Relaying over Rician Fading Channels," in IEEE Communications Letters, vol. 17, no. 6, pp. 1100-1103, 2013. [9] Shannon, C. E., "Communication Theory of Secrecy Systems," Bell System Technical Journal,vol. 28, no. 4, pp. 656-715, 1949. [10] Li, Bin, YulongZou, Jianjiang Zhou, Fei Wang, Weifeng Cao, and Yu-Dong Yao, "Secrecy Outage Probability Analysis of Friendly Jammer Selection Aided Multiuser Scheduling for Wireless Networks," IEEE Transactions on Communications,vol. 67, no. 5, pp. 3482-495, 2019. [11] Alemdar, Ali, and Mohamed Ibnkahla, "A Survey of Wireless Sensor Networks: Technologies, Challenges, and Future Trends," Adaptation and Cross Layer Design in Wireless Networks, pp. 243-62, 2018. [12] Y. Zhang, T. Liang and A. Sun, "Joint transmit antenna selection and jamming for security enhancement in MIMO wiretap channels," in IEEE/CIC International Conference on Communications in China (ICCC), pp. 1-6, 2015. [13] Cumanan, et.al.,"Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Multiple-Antenna Eavesdropper." IEEE Transactions on Vehicular Technology,vol. 63, no. 4, pp. 1678-690, 2014. [14] P. Mukherjee and S. Ulukus, "Secrecy in MIMO Networks With No Eavesdropper CSIT," in IEEE Transactions on Communications, vol. 65, no. 10, pp. 4382-4391, Oct. 2017. [15] Chu, Zheng, et.al., "Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Cooperative Jammer," inIEEE Transactions on Vehicular Technology, vol. 64, no. 5, pp. 1833-847, 2015. [16] Ju, E. Oh and D. Hong, "Catching resource-devouring worms in next-generation wireless relay systems: Two-way relay and full-duplex relay," in IEEE Communications Magazine, vol. 47, no. 9, pp. 58-65, 2009. [17] Riihonen, Taneli, Stefan Werner, RistoWichman, and JyriHamalainen. Outage Probabilities in infrastructure-based Single-Frequency Relay Links. IEEE Wireless Communications and Networking Conference, 2009. [18] D. W. K. Ng, E. S. Lo and R. Schober, "Dynamic Resource Allocation in MIMO-OFDMA Systems with Full- Duplex and Hybrid Relaying," in IEEE Transactions on Communications, vol. 60, no. 5, pp. 1291-1304, 2012. [19] I. Krikidis, H. A. Suraweera, P. J. Smith and C. Yuen, "Full-Duplex Relay Selection for Amplify-and-Forward Cooperative Networks," in IEEE Transactions on Wireless Communications, vol. 11, no. 12, pp. 4381-4393, 2012. [20] S. Luo, R. Zhang and T. J. Lim, "Optimal save-then-transmit protocol for energy harvesting wireless transmitters," in IEEE International Symposium on Information Theory Proceedings, pp. 955-959, 2012. [21] H. A. Suraweera, G. K. Karagiannidis and P. J. Smith, "Performance analysis of the dual-hop asymmetric fading channel," in IEEE Transactions on Wireless Communications, vol. 8, no. 6, pp. 2783-2788, 2009. [22] SoukainaEssaghir, Mohamed Benchagra, Noureddine El barbri, "Comparison between PI and PR Current Controllers of a Grid- Connected Photovoltaic System Under Load Variation,"International Journal of Power Electronics and Drive Systems (IJPEDS),vol. 9, no. 3, pp. 1311-1320, 2018. [23] Phu Tran Tin, Minh Tran, Tan N. Nguyen, Thanh-Long Nguyen, "System performance analysis of hybrid timepower switching protocol of EH bidirectional relaying network in amplify-and-forward mode," Indonesian Journal of Electrical Engineering and Computer Science, vol. 14, no. 1, pp. 118-126, 2019. [24] Phu Tran Tin, Le Anh Vu, Tan N. Nguyen, Thanh-Long Nguyen, "User selection protocol in DF cooperative networks with hybrid TSR-PSR protocol based full-duplex energy harvesting over rayleigh fading channel: system performance analysis,"Indonesian Journal of Electrical Engineering and Computer Science, vol. 13, no. 2, pp. 534-542, 2019. [25] Phu Tran Tin, Minh Tran, Tan N. Nguyen, Thanh-Long Nguyen, "A new look at energy harvesting half-duplex DF power splitting protocol relay network over rician channel in case of maximizing capacity,"Indonesian Journal of Electrical Engineering and Computer Science, vol. 13, no. 1, pp. 249-257, 2019.