https://www.mdu.se/

mdh.sePublikasjoner
Endre søk
Link to record
Permanent link

Direct link
Tran, Hung
Alternativa namn
Publikasjoner (10 av 26) Visa alla publikasjoner
Nhan Vo, V., Tran, H., Dao, V.-L., So-In, C., Tran, D. D. & Uhlemann, E. (2020). On Communication Performance in Energy Harvesting WSNs Under a Cooperative Jamming Attack. IEEE Systems Journal, 14(4), 4955-4966, Article ID 9000803.
Åpne denne publikasjonen i ny fane eller vindu >>On Communication Performance in Energy Harvesting WSNs Under a Cooperative Jamming Attack
Vise andre…
2020 (engelsk)Inngår i: IEEE Systems Journal, ISSN 1932-8184, E-ISSN 1937-9234, Vol. 14, nr 4, s. 4955-4966, artikkel-id 9000803Artikkel i tidsskrift (Fagfellevurdert) Published
Abstract [en]

In this article, we consider the system performance of an energy harvesting (EH) wireless sensor network in terms of reliable communications when subjected to a cooperative jamming attack. A set of strategically located nodes acting as cluster heads (CHs) transfer energy to the wireless sensors within range, forming a cluster. The sensors use this energy to transmit data to the CHs, which, in turn, deliver the information to a base station (BS) using nonorthogonal multiple access. The BS processes the collected information and synchronizes the operation of all CHs. Furthermore, there exist two adversaries, namely, a jamming attacker and an eavesdropper, who cooperate to attack the considered system. To protect against this attack, the CHs should be controlled by suitable power allocation coefficients obtained from the security constraints of the CHs. Using these constraints, closed-form expressions are derived to find the power allocation coefficients that will enable reliable and secure communication. In addition, we propose an interference channel selection policy for the sensor-to-CHs links and CHs-to-BS links to improve the reliability of communication while enhancing energy utilization. Finally, an algorithm for finding the optimal EH time is also proposed.

HSV kategori
Identifikatorer
urn:nbn:se:mdh:diva-52542 (URN)10.1109/JSYST.2020.2967779 (DOI)000596009700032 ()2-s2.0-85097046956 (Scopus ID)
Prosjekter
Serendipity - Secure and dependable platforms for autonomy
Tilgjengelig fra: 2020-11-11 Laget: 2020-11-11 Sist oppdatert: 2024-05-03bibliografisk kontrollert
Vo, V. N., Nguyen, T. G., So-In, C. & Tran, H. (2020). Outage Performance Analysis of Energy Harvesting Wireless Sensor Networks for NOMA Transmissions. Mobile Networks and Applications, 25(1), 23-41
Åpne denne publikasjonen i ny fane eller vindu >>Outage Performance Analysis of Energy Harvesting Wireless Sensor Networks for NOMA Transmissions
2020 (engelsk)Inngår i: Mobile Networks and Applications, ISSN 1383-469X, E-ISSN 1572-8153, Vol. 25, nr 1, s. 23-41Artikkel i tidsskrift (Fagfellevurdert) Published
Abstract [en]

In this paper, we investigate radio frequency (RF) energy harvesting (EH) in wireless sensor networks (WSNs) using non-orthogonal multiple access (NOMA) uplink transmission with regard to a probable secrecy outage during the transmission between sensor nodes (SNs) and base station (BS) in the presence of eavesdroppers (EAVs). In particular, the communication protocol is divided into two phases: 1) first, the SNs harvest energy from multiple power transfer stations (PTSs), and then, 2) the cluster heads are elected to transmit information to the BS using the harvested energy. In the first phase, we derive a 2D RF energy model to harvest energy for the SNs. During the second phase, the communication faces multiple EAVs who attempt to capture the information of legitimate users; thus, we propose a strategy to select cluster heads and implement the NOMA technique in the transmission of the cluster heads to enhance the secrecy performance. For the performance evaluation, the exact closed-form expressions for the secrecy outage probability (SOP) at the cluster heads are derived. A nearly optimal EH time algorithm for the cluster head is also proposed. In addition, the impacts of system parameters, such as the EH time, the EH efficiency coefficient, the distance between the cluster heads and the BS, and the number of SNs as well as EAVs on the SOP, are investigated. Finally, Monte Carlo simulations are performed to show the accuracy of the theoretical analysis; it is also shown that the secrecy performance of NOMA in RF EH WSN can be improved using the optimal EH time.

sted, utgiver, år, opplag, sider
SPRINGER, 2020
Emneord
Energy harvesting, Wireless sensor networks, Non-orthogonal multiple access, Physical layer security
HSV kategori
Identifikatorer
urn:nbn:se:mdh:diva-47223 (URN)10.1007/s11036-018-1188-7 (DOI)000513451700004 ()2-s2.0-85058946391 (Scopus ID)
Tilgjengelig fra: 2020-03-05 Laget: 2020-03-05 Sist oppdatert: 2025-02-07bibliografisk kontrollert
Vo, V. N., So-In, C., Tran, H., Tran, D.-D. & Huu, T. P. (2020). Performance Analysis of an Energy-Harvesting IoT System Using a UAV Friendly Jammer and NOMA Under Cooperative Attack. IEEE Access, 8, 221986-222000
Åpne denne publikasjonen i ny fane eller vindu >>Performance Analysis of an Energy-Harvesting IoT System Using a UAV Friendly Jammer and NOMA Under Cooperative Attack
Vise andre…
2020 (engelsk)Inngår i: IEEE Access, E-ISSN 2169-3536, Vol. 8, s. 221986-222000Artikkel i tidsskrift (Fagfellevurdert) Published
Abstract [en]

In this article, we consider the information leakage and outage probabilities of a multiple-input single-output (MISO) energy-harvesting (EH) Internet of Things (IoT) system in which a multiantenna ground base station (GBS) transmits messages to legitimate IoT destinations (LIDs) with the help of IoT relays (IRs) using non-orthogonal multiple access (NOMA) in the presence of a malicious jammer (MJ) and eavesdroppers (EAVs). The communication protocol is separated into two phases. In the EH phase, the IRs harvest energy from a power beacon (PB). In the information transmission (IT) phase, the communication process is further divided into two subphases: 1) The GBS broadcasts signals to the IRs using NOMA. Simultaneously, the MJ sends interfering signals to attack the IRs while the EAVs steal the confidential signals from the GBS, in a process called a cooperative attack. On the other hand, to protect the legitimate communication, an unmanned aerial vehicle (UAV) is used as a friendly jammer to defend against the EAVs. 2) A selected IR employs the time-switching-based relaying (TSR) technique to forward the received signal to the LIDs using NOMA. Similar to the first subphase, the LIDs are subjected to a cooperative attack, and the UAV attacks the EAVs in return. The secrecy performance of this communication protocol is characterized by deriving expressions for the information leakage probabilities (ILPs) for the LIDs' signals. A UAV altitude optimization algorithm is also proposed to achieve the best possible secrecy performance. Furthermore, we evaluate the system performance by deriving closed-form expressions for the outage probabilities (OPs). Accordingly, an algorithm is proposed to guarantee both the secrecy and system performance (in terms of the ILPs and OPs). Monte Carlo simulations are presented to verify our analytical results.

sted, utgiver, år, opplag, sider
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 2020
Emneord
Cooperative attack, energy harvesting, information leakage probability, Internet of Things, NOMA, UAV friendly jammer
HSV kategori
Identifikatorer
urn:nbn:se:mdh:diva-53114 (URN)10.1109/ACCESS.2020.3044760 (DOI)000603733400001 ()2-s2.0-85098292094 (Scopus ID)
Tilgjengelig fra: 2021-01-21 Laget: 2021-01-21 Sist oppdatert: 2024-05-03bibliografisk kontrollert
Nhan Vo, V., Nguyen, G. T., So-In, C., Tran, H. & Surasak, S. (2020). Secrecy Performance in the Internet of Things: Optimal Energy Harvesting Time Under Constraints of Sensors and Eavesdroppers. Software, practice & experience, 25(1), 193-210
Åpne denne publikasjonen i ny fane eller vindu >>Secrecy Performance in the Internet of Things: Optimal Energy Harvesting Time Under Constraints of Sensors and Eavesdroppers
Vise andre…
2020 (engelsk)Inngår i: Software, practice & experience, ISSN 0038-0644, E-ISSN 1097-024X, Vol. 25, nr 1, s. 193-210Artikkel i tidsskrift (Fagfellevurdert) Published
Abstract [en]

In this paper, we investigate the physical layer security (PLS) performance for the Internet of Things (IoT), which is modeled as an IoT sensor network (ISN). The considered system consists of multiple power transfer stations (PTSs), multiple IoT sensor nodes (SNs), one legitimate fusion center (LFC) and multiple eavesdropping fusion centers (EFCs), which attempt to extract the transmitted information at SNs without an active attack. The SNs and the EFCs are equipped with a single antenna, while the LFC is equipped with multiple antennas. Specifically, the SNs harvest energy from the PTSs and then use the harvested energy to transmit the information to the LFC. In this research, the energy harvesting (EH) process is considered in the following two strategies: 1) the SN harvests energy from all PTSs, and 2) the SN harvests energy from the best PTS. To guarantee security for the considered system before the SN sends the packet, the SN’s power is controlled by a suitable power policy that is based on the channel state information (CSI), harvested energy, and security constraints. An algorithm for the nearly optimal EH time is implemented. Accordingly, the analytical expressions for the existence probability of secrecy capacity and secrecy outage probability (SOP) are derived by using the statistical characteristics of the signal-to-noise ratio (SNR). In addition, we analyze the secrecy performance for various system parameters, such as the location of system elements, the number of PTSs, and the number of EFCs. Finally, the results of Monte Carlo simulations are provided to confirm the correctness of our analysis and derivation.

sted, utgiver, år, opplag, sider
Sweden: Springer, 2020
HSV kategori
Identifikatorer
urn:nbn:se:mdh:diva-43929 (URN)10.1007/s11036-019-01217-7 (DOI)000513451700021 ()2-s2.0-85061196802 (Scopus ID)
Prosjekter
Serendipity - Secure and dependable platforms for autonomy
Tilgjengelig fra: 2019-06-11 Laget: 2019-06-11 Sist oppdatert: 2024-05-03bibliografisk kontrollert
Quach, T. X., Tran, H., Uhlemann, E. & Truc, M. T. (2020). Secrecy performance of cooperative cognitive radio networks under joint secrecy outage and primary user interference constraints. IEEE Access, 8, 18442-18455, Article ID 8964376.
Åpne denne publikasjonen i ny fane eller vindu >>Secrecy performance of cooperative cognitive radio networks under joint secrecy outage and primary user interference constraints
2020 (engelsk)Inngår i: IEEE Access, E-ISSN 2169-3536, Vol. 8, s. 18442-18455, artikkel-id 8964376Artikkel i tidsskrift (Fagfellevurdert) Published
Abstract [en]

In this paper, we investigate the secrecy performance of a Cooperative Cognitive Radio Network (CCRN) in the presence of an eavesdropper (EAV). The secondary users (SUs) are subject to three constraints which include peak transmit power level and interference limitation with respect to the primary user (PU) as well as secrecy outage constraints due to the EAV. Secrecy outage is achieved when the EAV cannot decode the targeted signal, but communications in the secondary network is still possible (non-zero capacity exists). Approximation expressions of the secrecy outage probability and the probability of non-zero secrecy capacity are derived to evaluate the secrecy performance. Monte Carlo simulations are provided to examine the accuracy of the derived approximation expressions. Based on this, power allocation policies for the SUs are derived, satisfying all the constraints while maximizing the secrecy performance as well as the quality of service performance of the secondary network. It can be concluded that with knowledge of the channel state information (CSI) of the EAV it is possible to calculate the optimal value for the secrecy outage threshold of the secondary user (SU) which in turn allows maximizing the secrecy performance. Most interestingly, our numerical results illustrate that the secrecy performance of the system is much improved when the parameters obtained using the CSI of the EAV are calculated optimally. Thence, the system can adjust the power allocation so that no eavesdropping occurs even without reducing quality of service (QoS) performance compared to a network without any EAV.

sted, utgiver, år, opplag, sider
Institute of Electrical and Electronics Engineers Inc., 2020
Emneord
cooperative cognitive radio networks, Physical layer security, power allocation, secrecy capacity, secrecy outage probability, Channel state information, Cognitive radio, Intelligent systems, Monte Carlo methods, Network layers, Probability, Quality of service, Radio, Radio interference, Radio systems, Power allocations, Secrecy outage probabilities, Outages
HSV kategori
Identifikatorer
urn:nbn:se:mdh:diva-47226 (URN)10.1109/ACCESS.2020.2968325 (DOI)000524754700046 ()2-s2.0-85079762873 (Scopus ID)
Tilgjengelig fra: 2020-03-05 Laget: 2020-03-05 Sist oppdatert: 2024-05-03bibliografisk kontrollert
Nhan Vo, V., So-In, C., Tran, H., Tran, D. D., HENG, S., PHET, A. & ANH-NHAT, N. (2019). On Security and Throughput for Energy Harvesting Untrusted Relays in IoT Systems Using NOMA. IEEE Access, 2(1), 1-30
Åpne denne publikasjonen i ny fane eller vindu >>On Security and Throughput for Energy Harvesting Untrusted Relays in IoT Systems Using NOMA
Vise andre…
2019 (engelsk)Inngår i: IEEE Access, E-ISSN 2169-3536, Vol. 2, nr 1, s. 1-30Artikkel i tidsskrift (Fagfellevurdert) Published
Abstract [en]

In this paper, we analyze the secrecy and throughput of multiple-input single-output (MISO) energy harvesting (EH) Internet of Things (IoT) systems, in which a multi-antenna base station (BS) transmits signals to IoT devices (IoTDs) with the help of relays. Specifically, the communication process is separated into two phases. In the first phase, the BS applies transmit antenna selection (TAS) to broadcast the signal to the relays and IoTDs by using non-orthogonal multiple access (NOMA). Here, the relays use power-splitting-based relaying (PSR) for EH and information processing. In the second phase, the selected relay employs the amplify-and-forward (AF) technique to forward the received signal to the IoTDs using NOMA. The information transmitted from the BS to the IoTD risks leakage by the relay, which is able to act as an eavesdropper (EAV) (i.e., an untrusted relay). To analyze the secrecy performance, we investigate three schemes: random-BS-best-relay (RBBR), best-BS-random-relay (BBRR), and best-BS-best-relay (BBBR). The physical layer secrecy (PLS) performance is characterized by deriving closed-form expressions of secrecy outage probability (SOP) for the IoTDs. A BS transmit power optimization algorithm is also proposed to achieve the best secrecy performance. Based on this, we then evaluate the system performance of the considered system, i.e., the outage probability and throughput. In addition, the impacts of the EH time, the power-splitting ratio, the numbers of BS antennas, and the numbers of untrusted relays on the SOP and throughput are investigated. The Monte Carlo approach is applied to verify our analytical results. Finally, the numerical examples indicate that the system performance of BBBR is greater than that of RBBR and BBRR.

sted, utgiver, år, opplag, sider
United States: IEEE, 2019
HSV kategori
Identifikatorer
urn:nbn:se:mdh:diva-46267 (URN)10.1109/ACCESS.2019.2946600 (DOI)000497160500028 ()2-s2.0-85077742175 (Scopus ID)
Prosjekter
Serendipity - Secure and dependable platforms for autonomy
Tilgjengelig fra: 2019-12-12 Laget: 2019-12-12 Sist oppdatert: 2024-05-03bibliografisk kontrollert
Vo, V. N., So-In, C., Tran, D.-D. -. & Tran, H. (2019). Optimal System Performance in Multihop Energy Harvesting WSNs Using Cooperative NOMA and Friendly Jammers. IEEE Access, 7, 125494-125510, Article ID 8824086.
Åpne denne publikasjonen i ny fane eller vindu >>Optimal System Performance in Multihop Energy Harvesting WSNs Using Cooperative NOMA and Friendly Jammers
2019 (engelsk)Inngår i: IEEE Access, E-ISSN 2169-3536, Vol. 7, s. 125494-125510, artikkel-id 8824086Artikkel i tidsskrift (Fagfellevurdert) Published
Abstract [en]

In this paper, we investigate the system performance of multihop energy harvesting (EH) wireless sensor networks (WSNs) with imperfect channel state information (CSI) using cooperative non-orthogonal multiple access (NOMA) and friendly jammers in the presence of multiple passive eavesdroppers (EAVs). Specifically, we propose a two-phase communication protocol consisting of EH and information transmission (IT). In the first phase, relays in all clusters harvest energy from power transfer station (PTS) signals. In the first time slot of the second phase, the gateway simultaneously broadcasts information and interference signals. In the subsequent time slots, a relay acting as a friendly jammer in each cluster uses the harvested energy to send an interference signal. Simultaneously, another EH relay applies the NOMA technique to transmit the information signal according to an optimal scheduling scheme based on the maximum signal-to-interference-plus-noise ratio (SINR) of a far user (MSm) and a near user (MSn). To ensure security performance, we propose an algorithm for determining the EH time constraint for a friendly jammer. Additionally, closed-form expressions for the outage probability and throughput of the considered system are derived. Accordingly, an optimal power allocation coefficient algorithm is proposed to achieve throughput fairness for pairs of users. The results of the mathematical analysis are verified by Monte Carlo simulations. Finally, the numerical results demonstrate that the MSn scheme is recommended for guaranteeing throughput fairness for pairs of users. 

Emneord
Energy harvesting, friendly jammer, imperfect CSI, multihop wireless sensor networks, NOMA
HSV kategori
Identifikatorer
urn:nbn:se:mdh:diva-45369 (URN)10.1109/ACCESS.2019.2939385 (DOI)000487080300003 ()2-s2.0-85072584427 (Scopus ID)
Tilgjengelig fra: 2019-10-03 Laget: 2019-10-03 Sist oppdatert: 2024-05-03bibliografisk kontrollert
Quach, T., Tran, H., Uhlemann, E., Kaddoum, G. & Tran, Q. (2019). Power allocation policy and performance analysis of secure and reliable communication in cognitive radio networks. Wireless networks, 25(4), 1477-1489
Åpne denne publikasjonen i ny fane eller vindu >>Power allocation policy and performance analysis of secure and reliable communication in cognitive radio networks
Vise andre…
2019 (engelsk)Inngår i: Wireless networks, ISSN 1022-0038, E-ISSN 1572-8196, Vol. 25, nr 4, s. 1477-1489Artikkel i tidsskrift (Fagfellevurdert) Published
Abstract [en]

This paper investigates the problem of secure and reliable communications for cognitive radio networks. More specifically, we consider a single input multiple output cognitive model where the secondary user (SU) faces an eavesdropping attack while being subject to the normal interference constraint imposed by the primary user (PU). Thus, the SU must have a suitable power allocation policy which does not only satisfy the constraints of the PU but also the security constraints such that it obtains a reasonable performance for the SU, without exposing information to the eavesdropper. We derive four power allocation policies for different scenarios corresponding to whether or not the channel state information of the PU and the eavesdropper are available at the SU. Further, we introduce the concept secure and reliable communication probability (SRCP) as a performance metric to evaluate the considered system, as well as the efficiency of the four power allocation policies. Finally, we present numerical examples to illustrate the power allocation polices, and the impact of these policies on the SRCP of the SU. 

HSV kategori
Identifikatorer
urn:nbn:se:mdh:diva-43118 (URN)10.1007/s11276-017-1605-z (DOI)000463885400004 ()2-s2.0-85033487528 (Scopus ID)
Prosjekter
SafeCOP - Safe Cooperating Cyber-Physical Systems using Wireless Communication
Forskningsfinansiär
EU, Horizon 2020, 692529 
Tilgjengelig fra: 2019-04-16 Laget: 2019-04-16 Sist oppdatert: 2024-05-03bibliografisk kontrollert
Dao, V.-L., Tran, H., Girs, S. & Uhlemann, E. (2019). Reliability and Fairness for UAV Communication Based on Non-Orthogonal Multiple Access. In: 2019 IEEE International Conference on Communications Workshops (ICC Workshops): . Paper presented at IEEE International Conference on Communications IEEEICC, 20 May 2019, Shanghai, China. (53)
Åpne denne publikasjonen i ny fane eller vindu >>Reliability and Fairness for UAV Communication Based on Non-Orthogonal Multiple Access
2019 (engelsk)Inngår i: 2019 IEEE International Conference on Communications Workshops (ICC Workshops), 2019, nr 53Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

Recently, communication using unmanned aerial vehicles (UAVs) as relay nodes has been considered beneficial for a number of applications. Moreover, non-orthogonal multiple access (NOMA) with users being assigned different signal power levels while sharing the same time-frequency domain has been found effective to enhance spectrum utilization and provide predictable access to the channel. Thus, in this paper we consider an UAV communication system with NOMA and propose a solution to find the optimal values for the user’s power allocation coefficients (PACs) needed to achieve the required levels of communication reliability. We present a closed-form expression for the PAC of each user and also propose an algorithm for finding the optimal altitude of the UAV required to satisfy the fairness condition for all users. Finally, we provide numerical examples and compare the results for three types of communication environments.

HSV kategori
Identifikatorer
urn:nbn:se:mdh:diva-45066 (URN)10.1109/ICCW.2019.8757160 (DOI)2-s2.0-85070266057 (Scopus ID)978-1-7281-2373-8 (ISBN)
Konferanse
IEEE International Conference on Communications IEEEICC, 20 May 2019, Shanghai, China
Prosjekter
FORA - Fog Computing for Robotics and Industrial Automation
Tilgjengelig fra: 2019-08-22 Laget: 2019-08-22 Sist oppdatert: 2024-06-20bibliografisk kontrollert
Vo, V. N., Tran, H., Uhlemann, E., Truong, Q. X., So-In, C. & Balador, A. (2019). Reliable Communication Performance for Energy Harvesting Wireless Sensor Networks. In: 2019 IEEE 89TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2019-SPRING): . Paper presented at 89th IEEE Vehicular Technology Conference (VTC Spring), APR 28-MAY 01, 2019, Kuala Lumpur, MALAYSIA. IEEE
Åpne denne publikasjonen i ny fane eller vindu >>Reliable Communication Performance for Energy Harvesting Wireless Sensor Networks
Vise andre…
2019 (engelsk)Inngår i: 2019 IEEE 89TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2019-SPRING), IEEE , 2019Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

In this paper, we study the problem of how to provide reliable communications for energy harvesting (EH) wireless sensor network (WSN). Using the example of an autonomous quarry, where self-driving trucks autonomously collect and transport goods, there is a need for multiple wireless sensors collecting data about where and when goods can be collected, while guaranteeing reliable operation of the quarry. The vehicles transfer energy to the wireless sensors within range, forming a cluster. The sensors use this energy to transmit data to the vehicles. Finally, the vehicles relay information to an access point (AP). The AP processes the collected information and synchronize the operation of all vehicles. We propose an interference channel selection policy for the sensors-to-vehicles links and vehicles-to-AP links to improve the reliability of the communications, while enhancing the energy utilization. Accordingly, closed-form expression on how to achieve reliable communication within the considered system is derived and numerical results show that the proposed channel selection strategy not only improves the probability of achieving sufficiently reliable communication but also enhances the energy utilization.

sted, utgiver, år, opplag, sider
IEEE, 2019
Serie
IEEE Vehicular Technology Conference Proceedings, ISSN 1550-2252
Emneord
Energy Harvesting, Wireless Sensor Networks, Interference Level, Reliable Communication Probability
HSV kategori
Identifikatorer
urn:nbn:se:mdh:diva-45266 (URN)10.1109/VTCSpring.2019.8746317 (DOI)000482655600031 ()2-s2.0-85068972186 (Scopus ID)978-1-7281-1217-6 (ISBN)
Konferanse
89th IEEE Vehicular Technology Conference (VTC Spring), APR 28-MAY 01, 2019, Kuala Lumpur, MALAYSIA
Tilgjengelig fra: 2019-09-19 Laget: 2019-09-19 Sist oppdatert: 2024-05-03bibliografisk kontrollert
Organisasjoner