https://www.mdu.se/

mdu.sePublications
Change search
Link to record
Permanent link

Direct link
Tran, Hung
Alternative names
Publications (10 of 27) Show all publications
Nhan Vo, V., Tran, H., Dao, V.-L., So-In, C., Tran, D. D. & Uhlemann, E. (2020). On Communication Performance in Energy Harvesting WSNs Under a Cooperative Jamming Attack. IEEE Systems Journal, 14(4), 4955-4966, Article ID 9000803.
Open this publication in new window or tab >>On Communication Performance in Energy Harvesting WSNs Under a Cooperative Jamming Attack
Show others...
2020 (English)In: IEEE Systems Journal, ISSN 1932-8184, E-ISSN 1937-9234, Vol. 14, no 4, p. 4955-4966, article id 9000803Article in journal (Refereed) Published
Abstract [en]

In this article, we consider the system performance of an energy harvesting (EH) wireless sensor network in terms of reliable communications when subjected to a cooperative jamming attack. A set of strategically located nodes acting as cluster heads (CHs) transfer energy to the wireless sensors within range, forming a cluster. The sensors use this energy to transmit data to the CHs, which, in turn, deliver the information to a base station (BS) using nonorthogonal multiple access. The BS processes the collected information and synchronizes the operation of all CHs. Furthermore, there exist two adversaries, namely, a jamming attacker and an eavesdropper, who cooperate to attack the considered system. To protect against this attack, the CHs should be controlled by suitable power allocation coefficients obtained from the security constraints of the CHs. Using these constraints, closed-form expressions are derived to find the power allocation coefficients that will enable reliable and secure communication. In addition, we propose an interference channel selection policy for the sensor-to-CHs links and CHs-to-BS links to improve the reliability of communication while enhancing energy utilization. Finally, an algorithm for finding the optimal EH time is also proposed.

National Category
Engineering and Technology Computer Systems
Identifiers
urn:nbn:se:mdh:diva-52542 (URN)10.1109/JSYST.2020.2967779 (DOI)000596009700032 ()2-s2.0-85097046956 (Scopus ID)
Projects
Serendipity - Secure and dependable platforms for autonomy
Available from: 2020-11-11 Created: 2020-11-11 Last updated: 2024-05-03Bibliographically approved
Vo, V. N., Nguyen, T. G., So-In, C. & Tran, H. (2020). Outage Performance Analysis of Energy Harvesting Wireless Sensor Networks for NOMA Transmissions. Mobile Networks and Applications, 25(1), 23-41
Open this publication in new window or tab >>Outage Performance Analysis of Energy Harvesting Wireless Sensor Networks for NOMA Transmissions
2020 (English)In: Mobile Networks and Applications, ISSN 1383-469X, E-ISSN 1572-8153, Vol. 25, no 1, p. 23-41Article in journal (Refereed) Published
Abstract [en]

In this paper, we investigate radio frequency (RF) energy harvesting (EH) in wireless sensor networks (WSNs) using non-orthogonal multiple access (NOMA) uplink transmission with regard to a probable secrecy outage during the transmission between sensor nodes (SNs) and base station (BS) in the presence of eavesdroppers (EAVs). In particular, the communication protocol is divided into two phases: 1) first, the SNs harvest energy from multiple power transfer stations (PTSs), and then, 2) the cluster heads are elected to transmit information to the BS using the harvested energy. In the first phase, we derive a 2D RF energy model to harvest energy for the SNs. During the second phase, the communication faces multiple EAVs who attempt to capture the information of legitimate users; thus, we propose a strategy to select cluster heads and implement the NOMA technique in the transmission of the cluster heads to enhance the secrecy performance. For the performance evaluation, the exact closed-form expressions for the secrecy outage probability (SOP) at the cluster heads are derived. A nearly optimal EH time algorithm for the cluster head is also proposed. In addition, the impacts of system parameters, such as the EH time, the EH efficiency coefficient, the distance between the cluster heads and the BS, and the number of SNs as well as EAVs on the SOP, are investigated. Finally, Monte Carlo simulations are performed to show the accuracy of the theoretical analysis; it is also shown that the secrecy performance of NOMA in RF EH WSN can be improved using the optimal EH time.

Place, publisher, year, edition, pages
SPRINGER, 2020
Keywords
Energy harvesting, Wireless sensor networks, Non-orthogonal multiple access, Physical layer security
National Category
Earth and Related Environmental Sciences
Identifiers
urn:nbn:se:mdh:diva-47223 (URN)10.1007/s11036-018-1188-7 (DOI)000513451700004 ()2-s2.0-85058946391 (Scopus ID)
Available from: 2020-03-05 Created: 2020-03-05 Last updated: 2024-05-03Bibliographically approved
Vo, V. N., So-In, C., Tran, H., Tran, D.-D. & Huu, T. P. (2020). Performance Analysis of an Energy-Harvesting IoT System Using a UAV Friendly Jammer and NOMA Under Cooperative Attack. IEEE Access, 8, 221986-222000
Open this publication in new window or tab >>Performance Analysis of an Energy-Harvesting IoT System Using a UAV Friendly Jammer and NOMA Under Cooperative Attack
Show others...
2020 (English)In: IEEE Access, E-ISSN 2169-3536, Vol. 8, p. 221986-222000Article in journal (Refereed) Published
Abstract [en]

In this article, we consider the information leakage and outage probabilities of a multiple-input single-output (MISO) energy-harvesting (EH) Internet of Things (IoT) system in which a multiantenna ground base station (GBS) transmits messages to legitimate IoT destinations (LIDs) with the help of IoT relays (IRs) using non-orthogonal multiple access (NOMA) in the presence of a malicious jammer (MJ) and eavesdroppers (EAVs). The communication protocol is separated into two phases. In the EH phase, the IRs harvest energy from a power beacon (PB). In the information transmission (IT) phase, the communication process is further divided into two subphases: 1) The GBS broadcasts signals to the IRs using NOMA. Simultaneously, the MJ sends interfering signals to attack the IRs while the EAVs steal the confidential signals from the GBS, in a process called a cooperative attack. On the other hand, to protect the legitimate communication, an unmanned aerial vehicle (UAV) is used as a friendly jammer to defend against the EAVs. 2) A selected IR employs the time-switching-based relaying (TSR) technique to forward the received signal to the LIDs using NOMA. Similar to the first subphase, the LIDs are subjected to a cooperative attack, and the UAV attacks the EAVs in return. The secrecy performance of this communication protocol is characterized by deriving expressions for the information leakage probabilities (ILPs) for the LIDs' signals. A UAV altitude optimization algorithm is also proposed to achieve the best possible secrecy performance. Furthermore, we evaluate the system performance by deriving closed-form expressions for the outage probabilities (OPs). Accordingly, an algorithm is proposed to guarantee both the secrecy and system performance (in terms of the ILPs and OPs). Monte Carlo simulations are presented to verify our analytical results.

Place, publisher, year, edition, pages
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 2020
Keywords
Cooperative attack, energy harvesting, information leakage probability, Internet of Things, NOMA, UAV friendly jammer
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
urn:nbn:se:mdh:diva-53114 (URN)10.1109/ACCESS.2020.3044760 (DOI)000603733400001 ()2-s2.0-85098292094 (Scopus ID)
Available from: 2021-01-21 Created: 2021-01-21 Last updated: 2024-05-03Bibliographically approved
Nhan Vo, V., Nguyen, G. T., So-In, C., Tran, H. & Surasak, S. (2020). Secrecy Performance in the Internet of Things: Optimal Energy Harvesting Time Under Constraints of Sensors and Eavesdroppers. Software, practice & experience, 25(1), 193-210
Open this publication in new window or tab >>Secrecy Performance in the Internet of Things: Optimal Energy Harvesting Time Under Constraints of Sensors and Eavesdroppers
Show others...
2020 (English)In: Software, practice & experience, ISSN 0038-0644, E-ISSN 1097-024X, Vol. 25, no 1, p. 193-210Article in journal (Refereed) Published
Abstract [en]

In this paper, we investigate the physical layer security (PLS) performance for the Internet of Things (IoT), which is modeled as an IoT sensor network (ISN). The considered system consists of multiple power transfer stations (PTSs), multiple IoT sensor nodes (SNs), one legitimate fusion center (LFC) and multiple eavesdropping fusion centers (EFCs), which attempt to extract the transmitted information at SNs without an active attack. The SNs and the EFCs are equipped with a single antenna, while the LFC is equipped with multiple antennas. Specifically, the SNs harvest energy from the PTSs and then use the harvested energy to transmit the information to the LFC. In this research, the energy harvesting (EH) process is considered in the following two strategies: 1) the SN harvests energy from all PTSs, and 2) the SN harvests energy from the best PTS. To guarantee security for the considered system before the SN sends the packet, the SN’s power is controlled by a suitable power policy that is based on the channel state information (CSI), harvested energy, and security constraints. An algorithm for the nearly optimal EH time is implemented. Accordingly, the analytical expressions for the existence probability of secrecy capacity and secrecy outage probability (SOP) are derived by using the statistical characteristics of the signal-to-noise ratio (SNR). In addition, we analyze the secrecy performance for various system parameters, such as the location of system elements, the number of PTSs, and the number of EFCs. Finally, the results of Monte Carlo simulations are provided to confirm the correctness of our analysis and derivation.

Place, publisher, year, edition, pages
Sweden: Springer, 2020
National Category
Engineering and Technology Computer Systems
Identifiers
urn:nbn:se:mdh:diva-43929 (URN)10.1007/s11036-019-01217-7 (DOI)000513451700021 ()2-s2.0-85061196802 (Scopus ID)
Projects
Serendipity - Secure and dependable platforms for autonomy
Available from: 2019-06-11 Created: 2019-06-11 Last updated: 2024-05-03Bibliographically approved
Quach, T. X., Tran, H., Uhlemann, E. & Truc, M. T. (2020). Secrecy performance of cooperative cognitive radio networks under joint secrecy outage and primary user interference constraints. IEEE Access, 8, 18442-18455, Article ID 8964376.
Open this publication in new window or tab >>Secrecy performance of cooperative cognitive radio networks under joint secrecy outage and primary user interference constraints
2020 (English)In: IEEE Access, E-ISSN 2169-3536, Vol. 8, p. 18442-18455, article id 8964376Article in journal (Refereed) Published
Abstract [en]

In this paper, we investigate the secrecy performance of a Cooperative Cognitive Radio Network (CCRN) in the presence of an eavesdropper (EAV). The secondary users (SUs) are subject to three constraints which include peak transmit power level and interference limitation with respect to the primary user (PU) as well as secrecy outage constraints due to the EAV. Secrecy outage is achieved when the EAV cannot decode the targeted signal, but communications in the secondary network is still possible (non-zero capacity exists). Approximation expressions of the secrecy outage probability and the probability of non-zero secrecy capacity are derived to evaluate the secrecy performance. Monte Carlo simulations are provided to examine the accuracy of the derived approximation expressions. Based on this, power allocation policies for the SUs are derived, satisfying all the constraints while maximizing the secrecy performance as well as the quality of service performance of the secondary network. It can be concluded that with knowledge of the channel state information (CSI) of the EAV it is possible to calculate the optimal value for the secrecy outage threshold of the secondary user (SU) which in turn allows maximizing the secrecy performance. Most interestingly, our numerical results illustrate that the secrecy performance of the system is much improved when the parameters obtained using the CSI of the EAV are calculated optimally. Thence, the system can adjust the power allocation so that no eavesdropping occurs even without reducing quality of service (QoS) performance compared to a network without any EAV.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers Inc., 2020
Keywords
cooperative cognitive radio networks, Physical layer security, power allocation, secrecy capacity, secrecy outage probability, Channel state information, Cognitive radio, Intelligent systems, Monte Carlo methods, Network layers, Probability, Quality of service, Radio, Radio interference, Radio systems, Power allocations, Secrecy outage probabilities, Outages
National Category
Economics and Business
Identifiers
urn:nbn:se:mdh:diva-47226 (URN)10.1109/ACCESS.2020.2968325 (DOI)000524754700046 ()2-s2.0-85079762873 (Scopus ID)
Available from: 2020-03-05 Created: 2020-03-05 Last updated: 2024-05-03Bibliographically approved
Nhan Vo, V., So-In, C., Tran, H., Tran, D. D., HENG, S., PHET, A. & ANH-NHAT, N. (2019). On Security and Throughput for Energy Harvesting Untrusted Relays in IoT Systems Using NOMA. IEEE Access, 2(1), 1-30
Open this publication in new window or tab >>On Security and Throughput for Energy Harvesting Untrusted Relays in IoT Systems Using NOMA
Show others...
2019 (English)In: IEEE Access, E-ISSN 2169-3536, Vol. 2, no 1, p. 1-30Article in journal (Refereed) Published
Abstract [en]

In this paper, we analyze the secrecy and throughput of multiple-input single-output (MISO) energy harvesting (EH) Internet of Things (IoT) systems, in which a multi-antenna base station (BS) transmits signals to IoT devices (IoTDs) with the help of relays. Specifically, the communication process is separated into two phases. In the first phase, the BS applies transmit antenna selection (TAS) to broadcast the signal to the relays and IoTDs by using non-orthogonal multiple access (NOMA). Here, the relays use power-splitting-based relaying (PSR) for EH and information processing. In the second phase, the selected relay employs the amplify-and-forward (AF) technique to forward the received signal to the IoTDs using NOMA. The information transmitted from the BS to the IoTD risks leakage by the relay, which is able to act as an eavesdropper (EAV) (i.e., an untrusted relay). To analyze the secrecy performance, we investigate three schemes: random-BS-best-relay (RBBR), best-BS-random-relay (BBRR), and best-BS-best-relay (BBBR). The physical layer secrecy (PLS) performance is characterized by deriving closed-form expressions of secrecy outage probability (SOP) for the IoTDs. A BS transmit power optimization algorithm is also proposed to achieve the best secrecy performance. Based on this, we then evaluate the system performance of the considered system, i.e., the outage probability and throughput. In addition, the impacts of the EH time, the power-splitting ratio, the numbers of BS antennas, and the numbers of untrusted relays on the SOP and throughput are investigated. The Monte Carlo approach is applied to verify our analytical results. Finally, the numerical examples indicate that the system performance of BBBR is greater than that of RBBR and BBRR.

Place, publisher, year, edition, pages
United States: IEEE, 2019
National Category
Engineering and Technology Computer Systems
Identifiers
urn:nbn:se:mdh:diva-46267 (URN)10.1109/ACCESS.2019.2946600 (DOI)000497160500028 ()2-s2.0-85077742175 (Scopus ID)
Projects
Serendipity - Secure and dependable platforms for autonomy
Available from: 2019-12-12 Created: 2019-12-12 Last updated: 2024-05-03Bibliographically approved
Vo, V. N., So-In, C., Tran, D.-D. -. & Tran, H. (2019). Optimal System Performance in Multihop Energy Harvesting WSNs Using Cooperative NOMA and Friendly Jammers. IEEE Access, 7, 125494-125510, Article ID 8824086.
Open this publication in new window or tab >>Optimal System Performance in Multihop Energy Harvesting WSNs Using Cooperative NOMA and Friendly Jammers
2019 (English)In: IEEE Access, E-ISSN 2169-3536, Vol. 7, p. 125494-125510, article id 8824086Article in journal (Refereed) Published
Abstract [en]

In this paper, we investigate the system performance of multihop energy harvesting (EH) wireless sensor networks (WSNs) with imperfect channel state information (CSI) using cooperative non-orthogonal multiple access (NOMA) and friendly jammers in the presence of multiple passive eavesdroppers (EAVs). Specifically, we propose a two-phase communication protocol consisting of EH and information transmission (IT). In the first phase, relays in all clusters harvest energy from power transfer station (PTS) signals. In the first time slot of the second phase, the gateway simultaneously broadcasts information and interference signals. In the subsequent time slots, a relay acting as a friendly jammer in each cluster uses the harvested energy to send an interference signal. Simultaneously, another EH relay applies the NOMA technique to transmit the information signal according to an optimal scheduling scheme based on the maximum signal-to-interference-plus-noise ratio (SINR) of a far user (MSm) and a near user (MSn). To ensure security performance, we propose an algorithm for determining the EH time constraint for a friendly jammer. Additionally, closed-form expressions for the outage probability and throughput of the considered system are derived. Accordingly, an optimal power allocation coefficient algorithm is proposed to achieve throughput fairness for pairs of users. The results of the mathematical analysis are verified by Monte Carlo simulations. Finally, the numerical results demonstrate that the MSn scheme is recommended for guaranteeing throughput fairness for pairs of users. 

Keywords
Energy harvesting, friendly jammer, imperfect CSI, multihop wireless sensor networks, NOMA
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
urn:nbn:se:mdh:diva-45369 (URN)10.1109/ACCESS.2019.2939385 (DOI)000487080300003 ()2-s2.0-85072584427 (Scopus ID)
Available from: 2019-10-03 Created: 2019-10-03 Last updated: 2024-05-03Bibliographically approved
Quach, T., Tran, H., Uhlemann, E., Kaddoum, G. & Tran, Q. (2019). Power allocation policy and performance analysis of secure and reliable communication in cognitive radio networks. Wireless networks, 25(4), 1477-1489
Open this publication in new window or tab >>Power allocation policy and performance analysis of secure and reliable communication in cognitive radio networks
Show others...
2019 (English)In: Wireless networks, ISSN 1022-0038, E-ISSN 1572-8196, Vol. 25, no 4, p. 1477-1489Article in journal (Refereed) Published
Abstract [en]

This paper investigates the problem of secure and reliable communications for cognitive radio networks. More specifically, we consider a single input multiple output cognitive model where the secondary user (SU) faces an eavesdropping attack while being subject to the normal interference constraint imposed by the primary user (PU). Thus, the SU must have a suitable power allocation policy which does not only satisfy the constraints of the PU but also the security constraints such that it obtains a reasonable performance for the SU, without exposing information to the eavesdropper. We derive four power allocation policies for different scenarios corresponding to whether or not the channel state information of the PU and the eavesdropper are available at the SU. Further, we introduce the concept secure and reliable communication probability (SRCP) as a performance metric to evaluate the considered system, as well as the efficiency of the four power allocation policies. Finally, we present numerical examples to illustrate the power allocation polices, and the impact of these policies on the SRCP of the SU. 

National Category
Computer Systems
Identifiers
urn:nbn:se:mdh:diva-43118 (URN)10.1007/s11276-017-1605-z (DOI)000463885400004 ()2-s2.0-85033487528 (Scopus ID)
Projects
SafeCOP - Safe Cooperating Cyber-Physical Systems using Wireless Communication
Funder
EU, Horizon 2020, 692529 
Available from: 2019-04-16 Created: 2019-04-16 Last updated: 2024-05-03Bibliographically approved
Dao, V.-L., Tran, H., Girs, S. & Uhlemann, E. (2019). Reliability and Fairness for CANT Communication Based on Non-Orthogonal Multiple Access. In: 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS): . Paper presented at IEEE International Conference on Communications (ICC), MAY 20-24, 2019, Shanghai, PEOPLES R CHINA. IEEE
Open this publication in new window or tab >>Reliability and Fairness for CANT Communication Based on Non-Orthogonal Multiple Access
2019 (English)In: 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), IEEE , 2019Conference paper, Published paper (Refereed)
Abstract [en]

Recently, communication using unmanned aerial vehicles (LAVO as relay nodes has been considered beneficial for a number of applications. Moreover, nomorthogonM multiple access (NONIA) with users being assigned different signal passer levels while sharing the same tune-frequency domain has been found effective to enhance spectrum utilization and provide predictable access to the channel. Thus, in this paper we consider an UAV communication system with NOMA and propose a solution to find the optimal values for the user's power allocation coefficients (PA(s) needed to achieve the required levels of communication reliability. We present a closed-form expression for the PAC of each user and also propose an algori for finding the optimal altitude of the UAV required to satisfy the fairness condition for all users. Finally, we provide numerical mutinies and compare the results tar three types of communication environments.

Place, publisher, year, edition, pages
IEEE, 2019
Series
IEEE International Conference on Communications Workshops, ISSN 2164-7038
National Category
Telecommunications Communication Systems Signal Processing
Identifiers
urn:nbn:se:mdh:diva-45313 (URN)000484917800207 ()978-1-7281-2373-8 (ISBN)
Conference
IEEE International Conference on Communications (ICC), MAY 20-24, 2019, Shanghai, PEOPLES R CHINA
Available from: 2019-09-26 Created: 2019-09-26 Last updated: 2024-05-03Bibliographically approved
Dao, V.-L., Tran, H., Girs, S. & Uhlemann, E. (2019). Reliability and Fairness for UAV Communication Based on Non-Orthogonal Multiple Access. In: 2019 IEEE International Conference on Communications Workshops (ICC Workshops): . Paper presented at IEEE International Conference on Communications IEEEICC, 20 May 2019, Shanghai, China. (53)
Open this publication in new window or tab >>Reliability and Fairness for UAV Communication Based on Non-Orthogonal Multiple Access
2019 (English)In: 2019 IEEE International Conference on Communications Workshops (ICC Workshops), 2019, no 53Conference paper, Published paper (Refereed)
Abstract [en]

Recently, communication using unmanned aerial vehicles (UAVs) as relay nodes has been considered beneficial for a number of applications. Moreover, non-orthogonal multiple access (NOMA) with users being assigned different signal power levels while sharing the same time-frequency domain has been found effective to enhance spectrum utilization and provide predictable access to the channel. Thus, in this paper we consider an UAV communication system with NOMA and propose a solution to find the optimal values for the user’s power allocation coefficients (PACs) needed to achieve the required levels of communication reliability. We present a closed-form expression for the PAC of each user and also propose an algorithm for finding the optimal altitude of the UAV required to satisfy the fairness condition for all users. Finally, we provide numerical examples and compare the results for three types of communication environments.

National Category
Engineering and Technology Computer Systems
Identifiers
urn:nbn:se:mdh:diva-45066 (URN)10.1109/ICCW.2019.8757160 (DOI)2-s2.0-85070266057 (Scopus ID)978-1-7281-2373-8 (ISBN)
Conference
IEEE International Conference on Communications IEEEICC, 20 May 2019, Shanghai, China
Projects
FORA - Fog Computing for Robotics and Industrial Automation
Available from: 2019-08-22 Created: 2019-08-22 Last updated: 2024-05-03Bibliographically approved
Organisations

Search in DiVA

Show all publications