Performance Comparison between Fountain Codes-Based Secure MIMO Protocols with and without Using Non-Orthogonal Multiple Access
In this paper, we propose and evaluate the performance of fountain codes (FCs) based secure transmission protocols in multiple-input-multiple-output (MIMO) wireless systems, in presence of a passive eavesdropper. In the proposed protocols, a source selects its best antenna to transmit fountain encod...
Main Authors: | Dang The Hung, Tran Trung Duy, Phuong T. Tran, Do Quoc Trinh, Tan Hanh |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2019-10-01
|
Series: | Entropy |
Subjects: | |
Online Access: | https://www.mdpi.com/1099-4300/21/10/982 |
Similar Items
-
Security-Reliability Analysis of Multi-hop LEACH Protocol with Fountain Codes and Cooperative Jamming
by: Dang Hung, et al.
Published: (2019-03-01) -
Intercept Probability Analysis of Cooperative Cognitive Networks Using Fountain Codes and Cooperative Jamming
by: Tran Duy, et al.
Published: (2021-04-01) -
Security-Reliability Analysis of Noma-Based Multi-Hop Relay Networks in Presence of an Active Eavesdropper with Imperfect Eavesdropping CSI
by: Tran Tin Phu, et al.
Published: (2017-01-01) -
Security-Reliability Trade-Off Analysis for Rateless Codes-Based Relaying Protocols Using NOMA, Cooperative Jamming and Partial Relay Selection
by: Duy-Hung Ha, et al.
Published: (2021-01-01) -
Outage Performance of Cooperative Cognitive Radio Networks under Joint Constraints of Co-Channel Interference, Intercept Probability and Hardware Imperfection
by: Pham Thi Dan Ngoc, et al.
Published: (2019-06-01)