In this article, a land mobile satellite communication network with an external jammer to fight against the eavesdropper is investigated, where the hardware impairments are introduced to make the analyses more practical. It is worth noting that three jamming schemes, that is, the Gaussian noise jamming, the friendly jamming, and the scheme without jamming, are taken into account to explore the effect of the jammer comprehensively. The secrecy metrics such as the connectivity outage probability (COP), the security outage probability, and the secrecy throughput (ST), are derived for the passive eavesdropping scenario, while the ergodic secrecy capacity is analyzed for the active eavesdropping scenario. Moreover, to get intuitive insight from the closed-form expressions, the asymptotic ST and the asymptotic COP under the condition of high signal-to-noise ratio are also considered. Finally, all the derivations are validated by Monte Carlo simulations, and the effects of different parameters on the performance of the network are analyzed.
Simultaneous wireless information and power transfer (SWIPT) is a major breakthrough in the field of low-power wireless information transmissions. In this paper, the secrecy performance of the SWIPT-enabled relay network with full-duplex destination-aided jamming is assessed, where both the power-splitting (PS) and time-switching (TS) schemes at the relay are considered with the linear and nonlinear energy harvesting models. The relay harvests energy from the confidential signal and artificial noise sent by the source and destination, respectively, and forwards the amplified signal to the destination, in the presence of an eavesdropper. The analytical closed-form expressions of the connection outage probability (COP), secrecy outage probability (SOP), and transmission outage probability (TOP) for PS- and TS-based schemes are derived, and the closed-form expression of the lower bound of ergodic secrecy capacity (ESC) is calculated. The asymptotic-form expressions of the COP, SOP, TOP, and ESC are further analyzed to capture the valuable information in the high SNR regime. Numerical results verify the correctness of analytical results, reveal the effects of the PS/TS ratio, and transmit the signal-to-noise ratio on secrecy performance.
A blind direction-of-arrival (DOA) estimation algorithm based on the estimation of signal parameters via rotational invariance techniques (ESPRIT) is proposed for a uniform circular array (UCA) when strong electromagnetic mutual coupling is present. First, an updated UCA model with mutual coupling in a discrete Fourier transform (DFT) beam space is deduced, and the new manifold matrix is equal to the product of a centrosymmetric diagonal matrix and a Vandermonde-structure matrix. Then we carry out blind DOA estimation through a modified ESPRIT method, thus avoiding the need for spatial angular searching. In addition, two mutual coupling parameter estimation methods are presented after the DOAs have been estimated. Simulation results show that the new algorithm is reliable and effective especially for closely spaced signals.
This work investigates the proactive eavesdropping through a friendly full-duplex (FD) relay and a legitimate monitor over the wireless-powered suspicious communication network, where one suspect source performs energy harvesting (EH) from one dedicated power beacon and then communicates with one suspect destination. Under this setup, a relay-aided proactive eavesdropping scheme is designed to improve the surveillance performance of the system. The closed-form expressions are derived under linear and nonlinear EH models, including the decoding outage probability for the suspicious link, the eavesdropping outage probability for the eavesdropping link, and the average eavesdropping rate (AER). Based on these obtained expressions, an optimization problem to maximize the AER is formulated by jointly optimizing the power and location of the relay. The existence of the optimal solution is carefully analyzed. Moreover, the separate optimization issues of the power and location are first established, and then a bisection-based searching algorithm is presented for the joint optimization problem with the linear EH model. Furthermore, to reduce the complexity of joint optimization, a low-complexity learning-based iteration algorithm is further proposed by employing the well-fitting characteristic of the deep feedforward neural network. Numerical results verify the effectiveness of the proposed algorithm, and show that the optimized FD relay-aided proactive eavesdropping scheme outperforms the reference schemes. Finally, the application scenarios of the proposed proactive eavesdropping scheme are discussed. INDEX TERMS Proactive eavesdropping, wireless power transfer, average eavesdropping rate, deep feedforward neural network, power optimization.
scite is a Brooklyn-based startup that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.