Browse > Article
http://dx.doi.org/10.5573/ieie.2016.53.4.079

The Impact of Hardware Impairments and Imperfect Channel State Information on Physical Layer Security  

Shim, Kyusung (Information System, Graduate School of Smart City Science Management, Hongik University)
Do, Nhu Tri (Dept. of Electronic and Computer Engineering in Graduate School, Hongik University)
An, Beongku (Dept. of Computer & information Communication Engineering, Hongik University)
Publication Information
Journal of the Institute of Electronics and Information Engineers / v.53, no.4, 2016 , pp. 79-86 More about this Journal
Abstract
Physical layer security is cryptography technique to protect information by using physical nature of signals. Currently, many works on physical layer security have been actively researching while those researching models still have some problems to be solved. Eavesdropper does not share its channel state information with legitimate users to hide its presence. And when node transmits signal, hardware impairments are occurred, whereas many current researches assume that node model is ideal node and does not consider hardware impairments. The main features and contributions of this paper to solve these problems are as follows. First, our proposed system model deploys torch node around legitimate user to obtain channel state information of eavesdropper and considers hardware impairments by using channel state information of torch node. Second, we derive closed-form expression of intercept probability for the proposed system model. The results of the performance evaluation through various simulations to find out the effects on proposed system model in physical layer security show that imperfect channel state information does not effect on intercept probability while imperfect node model effects on intercept probability, Ergodic secrecy capacity and secrecy capacity.
Keywords
Physical layer security; Hardware impairment; Imperfect channel state information; Torch node; Intercept probability;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Suraweera H.A., Smith P.J., Shafi M., "Capacity Limits and Performance Analysis of Cognitive Radio With Imperfect Channel Knowledge," IEEE Transactions in Vehicular Technology, vol.59, no.4, pp.1811-1822, May 2010.   DOI
2 I. S. Gradshteyn, I. M. Ryzhik, A. Jeffrey, D. Zwillinger, "Table of integrals, series and products(7th ed)," Elsevier, 2007.
3 Shannon, C.E., "Communication theory of secrecy systems," The Bell System Technical Journal, vol.28, no.4, pp.656-715, October 1949.   DOI
4 Wyner, A.D., "The wire-tap channel," The Bell System Technical Journal, vol.54, no.8, pp.1355-1387, October 1975.   DOI
5 N. T. Do and B. An, "Secure transmission using decode-and-forward protocol for underlay cognitive radio networks," Proc. of IEEE ICUFN2015, pp. 914-918, Sapporo, Japan, July 2015.
6 K. Shim, N. T. Do, B. An, S. Nam, "Outage performance of physical layer security for multi-hop underlay cognitive radio networks with imperfect channel state information," Proc.of ICEIC 2016, Danang, Vietnam, January 2016.
7 Yulong Zou, Xianbin Wang, Weiming Shen, "Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks," IEEE Journal in Selected Areas in Communications, vol.31, no.10, pp.2099-2111, October 2013.   DOI
8 Vo Nguyen Quoc Bao, Linh-Trung N., Debbah M., "Relay Selection Schemes for Dual-Hop Networks under Security Constraints with Multiple Eavesdroppers," IEEE Transactions in Wireless Communications, vol.12, no.12, pp.6076-6085, December 2013.   DOI
9 Alotaibi E.R., Hamdi K.A., "Secrecy outage probability of relay networking in multiple destination and eavesdropper scenarios," Proc. of IEEE WCNC2014., pp.2390-2395, April 2014.
10 Alves, H., Souza, R.D., Debbah, M., Bennis, M., "Performance of Transmit Antenna Selection Physical Layer Security Schemes," IEEE in Signal Processing Letters, vol.19, no.6, pp.372-375, June 2012.   DOI
11 Y. Choi and D. Kim, "Performance analysis with and without torch node in secure communications," Proc. of ATC2015, Hanoi, Vietnam, October 2015.
12 Bjornson Emil, Matthaiou Michail, Debbah Merouane, "A New Look at Dual-Hop Relaying: Performance Limits with Hardware Impairments," IEEE Trans. Communications, vol.61, no.11, pp.4512-4525, November 2013.   DOI
13 Harri Holma, Antti Toskala, "LTE for UMTS: Evolution to LTE-Advanced, 2nd Edition," Wiley, 2011.