Performance Comparison between Fountain Codes-Based Secure MIMO Protocols with and without Using Non-Orthogonal Multiple Access

In this paper, we propose and evaluate the performance of fountain codes (FCs) based secure transmission protocols in multiple-input-multiple-output (MIMO) wireless systems, in presence of a passive eavesdropper. In the proposed protocols, a source selects its best antenna to transmit fountain encod...

Full description

Bibliographic Details
Main Authors: Dang The Hung, Tran Trung Duy, Phuong T. Tran, Do Quoc Trinh, Tan Hanh
Format: Article
Language:English
Published: MDPI AG 2019-10-01
Series:Entropy
Subjects:
Online Access:https://www.mdpi.com/1099-4300/21/10/982
id doaj-b1e51b1759664401b1eaacae2f9bb0c9
record_format Article
spelling doaj-b1e51b1759664401b1eaacae2f9bb0c92020-11-25T02:53:58ZengMDPI AGEntropy1099-43002019-10-01211098210.3390/e21100982e21100982Performance Comparison between Fountain Codes-Based Secure MIMO Protocols with and without Using Non-Orthogonal Multiple AccessDang The Hung0Tran Trung Duy1Phuong T. Tran2Do Quoc Trinh3Tan Hanh4Faculty of Radio-Electronics Engineering, Le Quy Don Technical University, Ha Noi 100000, VietnamDepartment of Telecommunications, and Department of Information Technology, Posts and Telecommunications Institute of Technology, Ho Chi Minh City 700000, VietnamWireless Communications Research Group, Faculty of Electrical and Electronics Engineering, Ton Duc Thang University, Ho Chi Minh City 700000, VietnamFaculty of Radio-Electronics Engineering, Le Quy Don Technical University, Ha Noi 100000, VietnamDepartment of Telecommunications, and Department of Information Technology, Posts and Telecommunications Institute of Technology, Ho Chi Minh City 700000, VietnamIn this paper, we propose and evaluate the performance of fountain codes (FCs) based secure transmission protocols in multiple-input-multiple-output (MIMO) wireless systems, in presence of a passive eavesdropper. In the proposed protocols, a source selects its best antenna to transmit fountain encoded packets to a destination that employs selection combining (SC) or maximal ratio combing (MRC) to enhance reliability of the decoding. The transmission is terminated when the destination has a required number of the encoded packets to reconstruct the original data of the source. Similarly, the eavesdropper also has the ability to recover the source data if it can intercept a sufficient number of the encoded packets. To reduce the number of time slots used, the source can employ non-orthogonal multiple access (NOMA) to send two encoded packets to the destination at each time slot. For performance analysis, exact formulas of average number of time slots (TS) and intercept probability (IP) over Rayleigh fading channel are derived and then verified by Monte-Carlo simulations. The results presented that the protocol using NOMA not only reduces TS but also obtains lower IP at medium and high transmit signal-to-noise ratios (SNRs), as compared with the corresponding protocol without using NOMA.https://www.mdpi.com/1099-4300/21/10/982physical-layer securityfountain codesnon-orthogonal multiple accessintercept probability
collection DOAJ
language English
format Article
sources DOAJ
author Dang The Hung
Tran Trung Duy
Phuong T. Tran
Do Quoc Trinh
Tan Hanh
spellingShingle Dang The Hung
Tran Trung Duy
Phuong T. Tran
Do Quoc Trinh
Tan Hanh
Performance Comparison between Fountain Codes-Based Secure MIMO Protocols with and without Using Non-Orthogonal Multiple Access
Entropy
physical-layer security
fountain codes
non-orthogonal multiple access
intercept probability
author_facet Dang The Hung
Tran Trung Duy
Phuong T. Tran
Do Quoc Trinh
Tan Hanh
author_sort Dang The Hung
title Performance Comparison between Fountain Codes-Based Secure MIMO Protocols with and without Using Non-Orthogonal Multiple Access
title_short Performance Comparison between Fountain Codes-Based Secure MIMO Protocols with and without Using Non-Orthogonal Multiple Access
title_full Performance Comparison between Fountain Codes-Based Secure MIMO Protocols with and without Using Non-Orthogonal Multiple Access
title_fullStr Performance Comparison between Fountain Codes-Based Secure MIMO Protocols with and without Using Non-Orthogonal Multiple Access
title_full_unstemmed Performance Comparison between Fountain Codes-Based Secure MIMO Protocols with and without Using Non-Orthogonal Multiple Access
title_sort performance comparison between fountain codes-based secure mimo protocols with and without using non-orthogonal multiple access
publisher MDPI AG
series Entropy
issn 1099-4300
publishDate 2019-10-01
description In this paper, we propose and evaluate the performance of fountain codes (FCs) based secure transmission protocols in multiple-input-multiple-output (MIMO) wireless systems, in presence of a passive eavesdropper. In the proposed protocols, a source selects its best antenna to transmit fountain encoded packets to a destination that employs selection combining (SC) or maximal ratio combing (MRC) to enhance reliability of the decoding. The transmission is terminated when the destination has a required number of the encoded packets to reconstruct the original data of the source. Similarly, the eavesdropper also has the ability to recover the source data if it can intercept a sufficient number of the encoded packets. To reduce the number of time slots used, the source can employ non-orthogonal multiple access (NOMA) to send two encoded packets to the destination at each time slot. For performance analysis, exact formulas of average number of time slots (TS) and intercept probability (IP) over Rayleigh fading channel are derived and then verified by Monte-Carlo simulations. The results presented that the protocol using NOMA not only reduces TS but also obtains lower IP at medium and high transmit signal-to-noise ratios (SNRs), as compared with the corresponding protocol without using NOMA.
topic physical-layer security
fountain codes
non-orthogonal multiple access
intercept probability
url https://www.mdpi.com/1099-4300/21/10/982
work_keys_str_mv AT dangthehung performancecomparisonbetweenfountaincodesbasedsecuremimoprotocolswithandwithoutusingnonorthogonalmultipleaccess
AT trantrungduy performancecomparisonbetweenfountaincodesbasedsecuremimoprotocolswithandwithoutusingnonorthogonalmultipleaccess
AT phuongttran performancecomparisonbetweenfountaincodesbasedsecuremimoprotocolswithandwithoutusingnonorthogonalmultipleaccess
AT doquoctrinh performancecomparisonbetweenfountaincodesbasedsecuremimoprotocolswithandwithoutusingnonorthogonalmultipleaccess
AT tanhanh performancecomparisonbetweenfountaincodesbasedsecuremimoprotocolswithandwithoutusingnonorthogonalmultipleaccess
_version_ 1724723305978527744