-
Hardware Impaired Ambient Backscatter NOMA Systems: Reliability and Security
Authors:
Xingwang Li,
Mengle Zhao,
Ming Zeng,
Shahid Mumtaz,
Varun G Menon,
Zhiguo Ding,
Octavia A. Dobre
Abstract:
Non-orthogonal multiple access (NOMA) and ambient backscatter communication have been envisioned as two promising technologies for the Internet-of-things due to their high spectral efficiency and energy efficiency. Motivated by this fact, we consider an ambient backscatter NOMA system in the presence of a malicious eavesdropper. Under some realistic assumptions of residual hardware impairments (RH…
▽ More
Non-orthogonal multiple access (NOMA) and ambient backscatter communication have been envisioned as two promising technologies for the Internet-of-things due to their high spectral efficiency and energy efficiency. Motivated by this fact, we consider an ambient backscatter NOMA system in the presence of a malicious eavesdropper. Under some realistic assumptions of residual hardware impairments (RHIs), channel estimation errors (CEEs) and imperfect successive interference cancellation (ipSIC), we investigate the physical layer security (PLS) of the ambient backscatter NOMA systems focusing on reliability and security. In order to further improve the security of the considered system, an artificial noise scheme is proposed where the radio frequency (RF) source acts as a jammer that transmits interference signal to the legitimate receivers and eavesdropper. On this basis, the analytical expressions for the outage probability (OP) and the intercept probability (IP) are derived. To gain more insights, the asymptotic analysis and diversity orders for the OP in the high signal-to-noise ratio (SNR) regime are carried out, and the asymptotic behaviors of the IP in the high main-to-eavesdropper ratio (MER) region are explored as well. Numerical results show that: 1) RHIs, CEEs and ipSIC have negative effects on the OP but positive effects on the IP; 2) Compared with CEEs, RHIs have a more serious impact on the reliability and security of the considered system; 3) There exists a trade-off between reliability and security, and this trade-off can be optimized by reducing the power coefficient of the artificial noise or increasing the interfering factor of readers; 4) There are error floors for the OP due to the CEEs and the reflection coefficient; 5) As MER grows large, the security for Rnand Rf is improved, while the security for T is reduced.
△ Less
Submitted 13 August, 2020;
originally announced August 2020.
-
I/Q Imbalance Aware Nonlinear Wireless-Powered Relaying of B5G Networks: Security and Reliability Analysis
Authors:
Xingwang Li,
Mengyan Huang,
Yuanwei Liu,
Varun G Menon,
Anand Paul,
Zhiguo Ding
Abstract:
Physical layer security is known as a promising paradigm to ensure security for the beyond 5G (B5G) networks in the presence of eavesdroppers. In this paper, we elaborate on a tractable analysis framework to evaluate the reliability and security of wireless-powered decode-and-forward (DF) multi-relay networks. The nonlinear energy harvesters, in-phase and quadrature-phase imbalance (IQI) and chann…
▽ More
Physical layer security is known as a promising paradigm to ensure security for the beyond 5G (B5G) networks in the presence of eavesdroppers. In this paper, we elaborate on a tractable analysis framework to evaluate the reliability and security of wireless-powered decode-and-forward (DF) multi-relay networks. The nonlinear energy harvesters, in-phase and quadrature-phase imbalance (IQI) and channel estimation errors (CEEs) are taken into account in the considered system. To further improve the secure performance, two relay selection strategies are presented: 1) suboptimal relay selection (SRS); 2) optimal relay selection (ORS). Specifically, exact analytical expressions for the outage probability (OP) and the intercept probability (IP) are derived in closed-form. For the IP, we consider that the eavesdropper can wiretap the signal from the source or the relay. In order to obtain more useful insights, we carry out the asymptotic analysis and diversity orders for the OP in the high signal-to-noise ratio (SNR) regime under non-ideal and ideal conditions. Numerical results show that: 1) Although the mismatches of amplitude/phase of transmitter (TX)/receiver (RX) limit the OP performance, it can enhance IP performance; 2) Large number of relays yields better OP performance; 3) There are error floors for the OP because of the CEEs; 4) There is a trade-off for the OP and IO to obtain the balance between reliability and security.
△ Less
Submitted 6 June, 2020;
originally announced June 2020.
-
Role of Site-selective Do** on Melting Point of CuTi Alloys: A Classical Molecular Dynamics Simulation Study
Authors:
Karabi Ghosh,
Manoranjan Ghosh,
S. V. G. Menon
Abstract:
Effect of site-selective substitution of Ti in Cu on the thermal stability of CuTi alloy is investigated using classical molecular dynamics simulations with Embedded Atom Method potentials. It has been observed experimentally that melting point of all the naturally occurring stable phases of CuTi alloys do not show a definite trend with gradual increase in Ti concentration. To understand the pheno…
▽ More
Effect of site-selective substitution of Ti in Cu on the thermal stability of CuTi alloy is investigated using classical molecular dynamics simulations with Embedded Atom Method potentials. It has been observed experimentally that melting point of all the naturally occurring stable phases of CuTi alloys do not show a definite trend with gradual increase in Ti concentration. To understand the phenomenon, super cells of CuTi alloy are constructed where Cu atom is substituted by Ti randomly and at selective sites. For random substitution, the melting point decreases linearly with increase in Ti concentration. A non-monotonous dependence is seen when Cu atoms at selective sites are replaced by Ti. For a particular do** concentration, the melting point shows a wide range of variation depending on the order of atomic arrangement, and can be fine tuned by selecting the sites for substitution. The variations in melting points in different cases are explained in terms of the peak height, width and position of the corresponding radial distribution functions. Finally, it is verified that initial structures of the naturally occurring CuTi alloys are responsible for the non-definite trend in their melting points.
△ Less
Submitted 17 August, 2011;
originally announced August 2011.
-
Convergence of Implicit Difference Scheme for 1D Lagrangian Hydrodynamics coupled to Radiation Transport Equation
Authors:
Karabi Ghosh,
S. V. G. Menon
Abstract:
A fully implicit finite difference scheme has been developed to solve the hydrodynamic equations coupled with radiation transport. Solution of the time dependent radiation transport equation is obtained using the discrete ordinates method and the energy flow into the Lagrangian meshes as a result of radiation interaction is fully accounted for. A tridiagonal matrix system is solved at each time…
▽ More
A fully implicit finite difference scheme has been developed to solve the hydrodynamic equations coupled with radiation transport. Solution of the time dependent radiation transport equation is obtained using the discrete ordinates method and the energy flow into the Lagrangian meshes as a result of radiation interaction is fully accounted for. A tridiagonal matrix system is solved at each time step to determine the hydrodynamic variables implicitly. The results obtained from this fully implicit radiation hydrodynamics code in the planar geometry agrees well with the scaling law for radiation driven strong shock propagation in aluminium. For the point explosion problem the self similar solutions are compared with results for pure hydrodynamic case in spherical geometry and the effect of radiation energy transfer is determined. Having, thus, benchmarked the code, convergence of the method w.r.t. time step is studied in detail and compared with the results of commonly used semi-implicit method. It is shown that significant error reduction is feasible in the implicit method in comparison to the semi-implicit method, though at the cost of slightly more CPU time.
△ Less
Submitted 11 July, 2008;
originally announced July 2008.
-
A Critique on `Quantum No-Deleting Principle'
Authors:
K. V. Bhagwat,
D. C. Khandekar,
S. V. G. Menon,
R. R. Puri,
D. C. Sahni
Abstract:
The argument used, in a recent letter to Nature (Nature 130 vol 404, 2000) to arrive at the `quantum-no-deleting principle' is erroneous. It is pointed out here that there may not be anything like such a principle. In any case, the claims made in the letter are beyond its working premise.
The argument used, in a recent letter to Nature (Nature 130 vol 404, 2000) to arrive at the `quantum-no-deleting principle' is erroneous. It is pointed out here that there may not be anything like such a principle. In any case, the claims made in the letter are beyond its working premise.
△ Less
Submitted 17 May, 2000; v1 submitted 1 May, 2000;
originally announced May 2000.