mdh.sePublications
Change search
Refine search result
1 - 24 of 24
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 1.
    Dao, Van-Lan
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Tran, Hung Vinh
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Girs, Svetlana
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Uhlemann, Elisabeth
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Reliability and Fairness for CANT Communication Based on Non-Orthogonal Multiple Access2019In: 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), IEEE , 2019Conference paper (Refereed)
    Abstract [en]

    Recently, communication using unmanned aerial vehicles (LAVO as relay nodes has been considered beneficial for a number of applications. Moreover, nomorthogonM multiple access (NONIA) with users being assigned different signal passer levels while sharing the same tune-frequency domain has been found effective to enhance spectrum utilization and provide predictable access to the channel. Thus, in this paper we consider an UAV communication system with NOMA and propose a solution to find the optimal values for the user's power allocation coefficients (PA(s) needed to achieve the required levels of communication reliability. We present a closed-form expression for the PAC of each user and also propose an algori for finding the optimal altitude of the UAV required to satisfy the fairness condition for all users. Finally, we provide numerical mutinies and compare the results tar three types of communication environments.

  • 2.
    Dao, Van-Lan
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Tran, Hung Vinh
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Girs, Svetlana
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Uhlemann, Elisabeth
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Reliability and Fairness for UAV Communication Based on Non-Orthogonal Multiple Access2019In: 2019 IEEE International Conference on Communications Workshops (ICC Workshops), 2019, no 53Conference paper (Refereed)
    Abstract [en]

    Recently, communication using unmanned aerial vehicles (UAVs) as relay nodes has been considered beneficial for a number of applications. Moreover, non-orthogonal multiple access (NOMA) with users being assigned different signal power levels while sharing the same time-frequency domain has been found effective to enhance spectrum utilization and provide predictable access to the channel. Thus, in this paper we consider an UAV communication system with NOMA and propose a solution to find the optimal values for the user’s power allocation coefficients (PACs) needed to achieve the required levels of communication reliability. We present a closed-form expression for the PAC of each user and also propose an algorithm for finding the optimal altitude of the UAV required to satisfy the fairness condition for all users. Finally, we provide numerical examples and compare the results for three types of communication environments.

  • 3.
    Huu, Tung Pham
    et al.
    NUCE, Fac Informat Technol, 55 Giai Phong Rd, Hanoi, Vietnam.
    Quach, Truong Xuan
    TNU Univ Informat & Commun Technol, Ho Chi Minh City, Vietnam.
    Tran, Hung Vinh
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Zepernick, Hans-Jurgen
    Blekinge Inst Technol, Karlskrona, Sweden..
    Sibomana, Louis
    Univ Rwanda, Kigali, Rwanda..
    On Proactive Attacks for Coping With Cooperative Attacks in Relay Networks2017In: 2017 23RD ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS (APCC): BRIDGING THE METROPOLITAN AND THE REMOTE, IEEE , 2017, p. 220-225Conference paper (Refereed)
    Abstract [en]

    Cooperative communications in which relays assist the transmission of signals from source to destination offer extended radio coverage and improved link reliable. However, transmitting signals with the help of a relay network may also open additional avenues for eavesdropper to overhear confidential information. Further, as jammers and eavesdroppers may cooperate to attack the relay network, offering secure communications becomes a challenging problem. To cope and reduce the effect of such cooperative attacks, we propose a proactive attack scheme in which the legitimate users generate jamming signals in an attempt to counteract such hostile cooperative attacks. In order to assess the security performance of the proactive attack scheme compared to a non-protection scheme, an analytical expression of the secrecy outage probability is derived. Numerical results for different system settings are provided showing that the proactive attack scheme can indeed significantly improve the security performance of the considered relay networks.

  • 4.
    Nguyen, C. Y.
    et al.
    University of Transport and Communications, Viet Nam.
    Tran, Hung Vinh
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Ninh, T. T. T.
    National Academy of Education Management, Viet Nam.
    Xuan, T. Q.
    TNU-University of Information and Communication Technology, Viet Nam.
    Pham, Q. H.
    University of Transport and Communications, Viet Nam.
    Security Enhancement in NOMA Cooperative Network with a Proactive Attack Scheme2019In: International Conference on Advanced Technologies for Communications, IEEE Computer Society , 2019, p. 225-230Conference paper (Refereed)
    Abstract [en]

    A cooperative non-orthogonal multiple access (NOMA) communication is a promising solution to improve both the reliability and the capacity of the NOMA system. However, a relay can be exploited by a cooperative attack, this leads to a degradation of performance and secure of the NOMA system. Therefore, we propose a proactive protection scheme to mitigate the effect of the cooperative attack on the NOMA system. We consider the secrecy outage probability (SOP) of the cooperative NOMA in two cases: (1) the NOMA system has no protected scheme; (2) the NOMA system implements the protected scheme using the proactive attack technique. The results demonstrate that using proposed proactive attack scheme improve the secrecy performance of the system. Monte-clalo simulations are provided to examine our proposed scheme. 

  • 5.
    Nguyen Thi Phuoc, Van
    et al.
    Massey University, New Zealand.
    Faraz Hasan, Syed
    Massey University, New Zealand.
    Gui, Xiang
    Massey University, New Zealand.
    Mukhopadhyay, Subhas
    Macquarie University, Australia.
    Tran, Hung Vinh
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Three-step Two-way Decode and Forward Relay with Energy Harvesting2017In: IEEE Communications Letters IEEE COML, ISSN 10897798, Vol. 21, no 4, p. 857-860Article in journal (Refereed)
    Abstract [en]

    Radio Frequency (RF) Energy Harvesting is being considered for realizing energy efficient relay networks. This work focuses on decode-and-forward relaying in an energy harvesting network and develops analytical expressions of the outage probability and overall throughput. A three-step scheme has been proposed that allows bidirectional exchange of information between two nodes via an intermediate relay. The performance of the proposed scheme has been evaluated and compared with a recent work.

  • 6.
    Nhan Vo, Van
    et al.
    International School, Duy Tan University, Vietnam.
    Nguyen, Gia Tri
    International School, Duy Tan University, Vietnam.
    So-In, Chakchai
    Khon Kaen University, Khon Kaen, Thailand.
    Tran, Hung Vinh
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems. Nguyen Tat Thanh University, Vietnam.
    Surasak, Sanguanpong
    Kasetsart University, Bangkok, Thailand.
    Secrecy Performance in the Internet of Things: Optimal Energy Harvesting Time Under Constraints of Sensors and Eavesdroppers2019In: Software, practice & experience, ISSN 0038-0644, E-ISSN 1097-024X, Vol. 1, p. 1-16Article in journal (Refereed)
    Abstract [en]

    In this paper, we investigate the physical layer security (PLS) performance for the Internet of Things (IoT), which is modeled as an IoT sensor network (ISN). The considered system consists of multiple power transfer stations (PTSs), multiple IoT sensor nodes (SNs), one legitimate fusion center (LFC) and multiple eavesdropping fusion centers (EFCs), which attempt to extract the transmitted information at SNs without an active attack. The SNs and the EFCs are equipped with a single antenna, while the LFC is equipped with multiple antennas. Specifically, the SNs harvest energy from the PTSs and then use the harvested energy to transmit the information to the LFC. In this research, the energy harvesting (EH) process is considered in the following two strategies: 1) the SN harvests energy from all PTSs, and 2) the SN harvests energy from the best PTS. To guarantee security for the considered system before the SN sends the packet, the SN’s power is controlled by a suitable power policy that is based on the channel state information (CSI), harvested energy, and security constraints. An algorithm for the nearly optimal EH time is implemented. Accordingly, the analytical expressions for the existence probability of secrecy capacity and secrecy outage probability (SOP) are derived by using the statistical characteristics of the signal-to-noise ratio (SNR). In addition, we analyze the secrecy performance for various system parameters, such as the location of system elements, the number of PTSs, and the number of EFCs. Finally, the results of Monte Carlo simulations are provided to confirm the correctness of our analysis and derivation.

  • 7.
    Nhan Vo, Van
    et al.
    Duy Tan University, Da Nang, Vietnam.
    So-In, Chakchai
    Khon Kaen University, Khon Kaen, Thailand.
    Tran, Hung Vinh
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Tran, Dung Duc
    Duy Tan University, Da Nang, Vietnam.
    HENG, SOVANNARITH
    Khon Kaen University, Khon Kaen, Thailand.
    PHET, AIMTONGKHAM2
    Khon Kaen University, Khon Kaen, Thailand.
    ANH-NHAT, NGUYEN2
    Khon Kaen University, Khon Kaen, Thailand.
    On Security and Throughput for Energy Harvesting Untrusted Relays in IoT Systems Using NOMA2019In: IEEE Access, E-ISSN 2169-3536, Vol. 2, no 1, p. 1-30Article in journal (Refereed)
    Abstract [en]

    In this paper, we analyze the secrecy and throughput of multiple-input single-output (MISO) energy harvesting (EH) Internet of Things (IoT) systems, in which a multi-antenna base station (BS) transmits signals to IoT devices (IoTDs) with the help of relays. Specifically, the communication process is separated into two phases. In the first phase, the BS applies transmit antenna selection (TAS) to broadcast the signal to the relays and IoTDs by using non-orthogonal multiple access (NOMA). Here, the relays use power-splitting-based relaying (PSR) for EH and information processing. In the second phase, the selected relay employs the amplify-and-forward (AF) technique to forward the received signal to the IoTDs using NOMA. The information transmitted from the BS to the IoTD risks leakage by the relay, which is able to act as an eavesdropper (EAV) (i.e., an untrusted relay). To analyze the secrecy performance, we investigate three schemes: random-BS-best-relay (RBBR), best-BS-random-relay (BBRR), and best-BS-best-relay (BBBR). The physical layer secrecy (PLS) performance is characterized by deriving closed-form expressions of secrecy outage probability (SOP) for the IoTDs. A BS transmit power optimization algorithm is also proposed to achieve the best secrecy performance. Based on this, we then evaluate the system performance of the considered system, i.e., the outage probability and throughput. In addition, the impacts of the EH time, the power-splitting ratio, the numbers of BS antennas, and the numbers of untrusted relays on the SOP and throughput are investigated. The Monte Carlo approach is applied to verify our analytical results. Finally, the numerical examples indicate that the system performance of BBBR is greater than that of RBBR and BBRR.

  • 8.
    Ninh Thi Thanh, Tam
    et al.
    National Academy of Education Management, Vietnam.
    Tran, Hung Vinh
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Muellner, Nils
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Probabilistic Communication in Car Platoons2018In: International Conference on Advanced Technologies for Communications ATC, Ho Chi Minh, Vietnam: IEEE , 2018, p. 146-151Conference paper (Refereed)
    Abstract [en]

    Autonomously driving vehicles appeared on the canvas of science in the middle of the twentieth century and have since then been the subject of many generations of researchers. One application of autonomous driving is platooning, where cars autonomously follow each other in very close distance. This application is motivated by fuel savings, labor decrease, increase in road capacity and higher safety. To achieve platooning capability, vehicles require sensors, intelligent processing systems, and communication devices. This paper provides a study in which cars communicate to measure the system performance in terms of successful message transmission probability, also referred to as the integrity of wireless communication. The communication is one crucial part of the chain of the safety functionality of an orchestrated braking maneuver in a platoon, located between the car initiating the braking and all other members of the platoon. The numerical results target the influence of parameters like transmission power, channel gain, interference noise, and total number of involved vehicles

  • 9.
    Pham Huu, Tung
    et al.
    Faculty of Information Technology, NUCE, Vietnam.
    Nhan Vo, Van
    International School, Duy Tan University, Vietnam.
    Tran, Hung Vinh
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Xuan Truong, Quach
    5TNU-University of Information and Communication Technology, Vietnam.
    Nguyen Dinh, Viet
    The VNU University of Engineering and Technology, Vietnam.
    Secrecy Performance Analysis of Cooperative NOMA Networks With Active Protection under α − µ Fading2019In: International Conference on Advanced Technologies for Communications ATC, 2019Conference paper (Refereed)
    Abstract [en]

    In this paper, we analyze the secrecy performance of a cooperative communication wireless system using nonorthogonal multiple access (NOMA) over α − µ fading channel. A new cooperative NOMA scheme is proposed to protect the confidential communication that is transmitted from a source to two users by the help of a relay under the monitoring of an eavesdropper (EAV). In particular, the legitimate user generates jamming signals to the EAV while the source transmits the signals to the relay and the source sends jamming signals to the EAV while the relay forwards the signals to the users. In order to evaluate the secrecy performance, the physical layer security (PLS) in term of the secrecy outage probability (SOP) for the active protection scheme (APS) is investigated and compared to that for a benchmark non-protection scheme (NPS). Simulation results show that the APS can effectively enhance the secrecy performance.

  • 10.
    Phuoc Van, N. T.
    et al.
    Massey University, New Zealand.
    Tang, L.
    Massey University, New Zealand.
    Tran, Hung Vinh
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Hasan, F.
    Massey University, New Zealand.
    Minh, N. D.
    Hanoi University of Science and Technology, Viet Nam.
    Mukhopadhyay, S.
    Macquarie University, Australia.
    Outage probability of vital signs detecting radar sensor system2019In: Proceedings of the International Conference on Sensing Technology, ICST, IEEE Computer Society , 2019, p. 358-362, article id 8603556Conference paper (Refereed)
    Abstract [en]

    Monitoring vital signs using microwave signals has significant applications in biology, and also for finding survivors under debris during natural hazards. The vital signs detection radar sensor system consists of a transmitter and a receiver. This system can be considered as a wireless system. In the wireless system, the outage probability is a crucial factor to evaluate the reliability of the system. This work investigates the outage probability (OP) of a radar sensor system under the Nakagami-m environment. The dependence of the OP on different parameters like operating frequency, distance to the measured object, transmitter power, and the leakage between transmitter and receiver antennae is examined. The theoretical model for the OP is validated with simulation results through various environments.

  • 11.
    Quach, T. X.
    et al.
    VNU University Engineering and Technology, Vietnam.
    Tran, Hung Vinh
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Uhlemann, Elisabeth
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Truc, M. T.
    VNU University Engineering and Technology, Vietnam.
    Secrecy performance of cognitive cooperative industrial radio networks2017In: IEEE Conference on Emerging Technologies and Factory Automation, ISSN 1946-0740, E-ISSN 1946-0759, Vol. Part F134116, p. 1-8Article in journal (Refereed)
    Abstract [en]

    Although cognitive radio networks (CRNs) were originally intended as a powerful solution to enhance spectrum utilization, it can also be used to improve reliability by avoiding interference in the 2.4 or 5 GHz band. Using multiple relay nodes in CRNs, the outage probability, i.e., the probability that the end-to-end signal-to-noise ratio drops below a predefined threshold, can be reduced significantly. This implies that the probability that a message is not delivered within a specific time frame, can be kept below a required threshold, even when there are constraints on energy efficiency in terms of peak transmit power. This is particularly useful for industrial networks with realtime constraints. However, using CRNs may also reveal secret information to eavesdroppers (EAVs). Therefore, guaranteeing secure and reliable communications in CRNs is still a challenging problem. To this end, the secrecy performance of a proactive decode-and-forward relaying scheme in a cognitive cooperative radio network is investigated. More specifically, analytical as well as approximate expressions for the secrecy outage probability and probability of non-zero secrecy capacity are derived to evaluate the system performance. Numerical results show that the approximation tightly match the analytical results and simulations, and thus it can be used to provide a fast evaluation of the security and reliability of communications using a considered assignment of relay nodes in a cognitive cooperative radio network (CCRN). Consequently, our results enable to secure the communication, and increasing the reliability, availability, robustness, and maintainability of wireless industrial network, subject to various constraints from the CRN. 

  • 12.
    Quach, T. X.
    et al.
    TNU-University of Information and Communication Technology, Thai Nguyen, Viet Nam.
    Tran, Hung Vinh
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Uhlemann, Elisabeth
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Truc, M. T.
    Vnu University of Engineering and Technology, Ha Noi, Viet Nam.
    Secrecy performance of cooperative cognitive radio networks under joint secrecy outage and primary user interference constraints2020In: IEEE Access, E-ISSN 2169-3536, Vol. 8, p. 18442-18455, article id 8964376Article in journal (Refereed)
    Abstract [en]

    In this paper, we investigate the secrecy performance of a Cooperative Cognitive Radio Network (CCRN) in the presence of an eavesdropper (EAV). The secondary users (SUs) are subject to three constraints which include peak transmit power level and interference limitation with respect to the primary user (PU) as well as secrecy outage constraints due to the EAV. Secrecy outage is achieved when the EAV cannot decode the targeted signal, but communications in the secondary network is still possible (non-zero capacity exists). Approximation expressions of the secrecy outage probability and the probability of non-zero secrecy capacity are derived to evaluate the secrecy performance. Monte Carlo simulations are provided to examine the accuracy of the derived approximation expressions. Based on this, power allocation policies for the SUs are derived, satisfying all the constraints while maximizing the secrecy performance as well as the quality of service performance of the secondary network. It can be concluded that with knowledge of the channel state information (CSI) of the EAV it is possible to calculate the optimal value for the secrecy outage threshold of the secondary user (SU) which in turn allows maximizing the secrecy performance. Most interestingly, our numerical results illustrate that the secrecy performance of the system is much improved when the parameters obtained using the CSI of the EAV are calculated optimally. Thence, the system can adjust the power allocation so that no eavesdropping occurs even without reducing quality of service (QoS) performance compared to a network without any EAV.

  • 13.
    Quach, T.X.
    et al.
    University of Information and Communication Technology, Thai Nguyen, Viet Nam; VNU Univ Engn & Technol, Hanoi, Vietnam.
    Tran, Hung Vinh
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Uhlemann, Elisabeth
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Kaddoum, G.
    University of Québec, Montreal, Canada.
    Tran, Q.A.
    Posts and Telecommunications Institute of Technology, Hanoi, Viet Nam.
    Power allocation policy and performance analysis of secure and reliable communication in cognitive radio networks2019In: Wireless networks, ISSN 1022-0038, E-ISSN 1572-8196, Vol. 25, no 4, p. 1477-1489Article in journal (Refereed)
    Abstract [en]

    This paper investigates the problem of secure and reliable communications for cognitive radio networks. More specifically, we consider a single input multiple output cognitive model where the secondary user (SU) faces an eavesdropping attack while being subject to the normal interference constraint imposed by the primary user (PU). Thus, the SU must have a suitable power allocation policy which does not only satisfy the constraints of the PU but also the security constraints such that it obtains a reasonable performance for the SU, without exposing information to the eavesdropper. We derive four power allocation policies for different scenarios corresponding to whether or not the channel state information of the PU and the eavesdropper are available at the SU. Further, we introduce the concept secure and reliable communication probability (SRCP) as a performance metric to evaluate the considered system, as well as the efficiency of the four power allocation policies. Finally, we present numerical examples to illustrate the power allocation polices, and the impact of these policies on the SRCP of the SU. 

  • 14.
    Tram, Duc-Dung
    et al.
    Duy Tan Univ, Vietnam.
    Ha, Dac-Binh
    Duy Tan Univ, Vietnam.
    Vo, Van Nhan
    Duy Tan Univ, Vietnam.
    So-In, Chakchai
    Khon Kaen Univ, Thailand..
    Tran, Hung Vinh
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Nguyen, Tri Gia
    Univ Danang, Vietnam..
    Baig, Zubair Ahmed
    CSIRO, Melbourne, Australia..
    Sanguanpong, Surasak
    Kasetsart Univ, Thailand..
    Performance Analysis of DF/AF Cooperative MISO Wireless Sensor Networks With NOMA and SWIPT Over Nakagami-m Fading2018In: IEEE Access, E-ISSN 2169-3536, Vol. 6, p. 56142-56161Article in journal (Refereed)
    Abstract [en]

    In this paper, we investigate downlink cooperative multiple-input single-output wireless sensor networks with the nonorthogonal multiple access technique and simultaneous wireless information and power transfer over Nakagami-m fading. Specifically, the considered network includes a multiantenna sink node, an energy-limited relay cluster, a high-priority sensor node (SN) cluster, and a low-priority SN cluster. Prior to transmission, a transmit antenna, a relay, a high-priority SN, and a low-priority SN are selected. In this paper, we propose three antenna-relay-destination selection schemes, i.e., sink node-high-priority, sink node-relay, and sink node-low-priority. In each proposed scheme, we consider two relaying strategies, i.e., decode-and-forward and amplify-and-forward, and then, we derive the corresponding closed-form expressions of outage probability at the selected SNs. In addition, we introduce two algorithms: 1) the power-splitting ratio optimization algorithm and 2) the best antenna-relay-destination selection determination algorithm. Finally, we utilize the Monte Carlo simulations to verify our analytical results.

  • 15.
    Tran, D. -D
    et al.
    Faculty of Electrical and Electronics Engineering, Duy Tan University Danang, Viet Nam.
    Tran, H. -V
    ETS Engineering School, University of Quebec, Montreal, Canada.
    Ha, D. -B
    Faculty of Electrical and Electronics Engineering, Duy Tan University Danang, Viet Nam.
    Tran, Hung Vinh
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Kaddoum, G.
    ETS Engineering School, University of Quebec, Montreal, Canada.
    Performance analysis of two-way relaying system with RF-EH and multiple antennas2016In: IEEE Vehicular Technology Conference, Institute of Electrical and Electronics Engineers Inc. , 2016Conference paper (Refereed)
    Abstract [en]

    In this paper, we investigate the performance of an amplify-and-forward two-way relay network, in which the relay can harvest the energy from the radio frequency and all channels are subject to Nakagami-m fading. In particular, we assume that the relay has a single antenna, while two sources are equipped with multiple antennas. Also, two sources use the maximal ratio transmission (MRT) and maximal ratio combining (MRC) techniques to process the transmit and received signals. Moreover, the multiple access broadcast (MABC) protocol, which can improve the spectrum efficiency, is employed to coordinate the bidirectional communication of the two-way relay network. Given these settings, we derive analytical expressions for the throughput under the delay-limited and delay-tolerant transmission modes and the outage probability. Finally, Monte-Carlo simulations are provided to verify our calculation.

  • 16.
    Tran, Ha-Vu
    et al.
    Univ Quebec, ETS Engn Sch, LACIME Lab, Montreal, PQ H3C 1K3, Canada..
    Kaddoum, Georges
    Univ Quebec, ETS Engn Sch, LACIME Lab, Montreal, PQ H3C 1K3, Canada..
    Tran, Hung Vinh
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Hong, Een-Kee
    Kyung Hee Univ, Sch Elect & Informat, Yongin 449701, South Korea..
    Downlink Power Optimization for Heterogeneous Networks with Time Reversal-based Transmission under Backhaul Limitation2017In: IEEE Access, E-ISSN 2169-3536, ISSN 21693536, Vol. 5, p. 755-770Article in journal (Refereed)
    Abstract [en]

    In this paper, we investigate an application of two different beamforming techniques and propose a novel downlink power minimization scheme for a two-tier heterogeneous network (HetNet) model. In this context, we employ time reversal (TR) technique to a femtocell base station (FBS) whereas we assume that a macrocell base station (MBS) uses a zero-forcing-based algorithm and the communication channels are subject to frequency selective fading. Additionally, HetNet's backhaul connection is unable to support a sufficient throughput for signaling information exchange between two tiers. Given the considered HetNet model, a downlink power minimization scheme is proposed, and closed-form expressions concerning the optimal solution are provided, taking this constraint into account. Furthermore, considering imperfect channel estimation at TR-employed femtocell, a worst-case robust power minimization problem is formulated. By devising TR worst-case analysis, this robust problem is transformed into an equivalent formulation that is tractable to solve. The results presented in our paper show that the TR technique outperforms the zero-forcing one in the perspective of beamforming methods for femtocell working environments. Finally, we validate the proposed power loading strategy for both cases of perfect and imperfect channel estimations .

  • 17.
    Tran, Hung Vinh
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Kaddoum, G.
    University of Québec, France.
    Gagnon, F.
    University of Québec, France.
    Sibomana, L.
    Blekinge Institute of Technology, Karlskrona, Sweden.
    Cognitive radio network with secrecy and interference constraints2017In: Physical Communication, ISSN 1874-4907, E-ISSN 1876-3219, Vol. 22, p. 32-41Article in journal (Refereed)
    Abstract [en]

    In this paper, we investigate the physical-layer security of a secure communication in single-input multiple-output (SIMO) cognitive radio networks (CRNs) in the presence of two eavesdroppers. In particular, both primary user (PU) and secondary user (SU) share the same spectrum, but they face with different eavesdroppers who are equipped with multiple antennas. In order to protect the PU communication from the interference of the SU and the risks of eavesdropping, the SU must have a reasonable adaptive transmission power which is set on the basis of channel state information, interference and security constraints of the PU. Accordingly, an upper bound and lower bound for the SU transmission power are derived. Furthermore, a power allocation policy, which is calculated on the convex combination of the upper and lower bound of the SU transmission power, is proposed. On this basis, we investigate the impact of the PU transmission power and channel mean gains on the security and system performance of the SU. Closed-form expressions for the outage probability, probability of non-zero secrecy capacity, and secrecy outage probability are obtained. Interestingly, our results show that the strong channel mean gain of the PU transmitter to the PU's eavesdropper in the primary network can enhance the SU performance. 

  • 18.
    Tran, Hung Vinh
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Xuan Truong, Quach
    VNU Univ Engn & Technol, Hanoi, Vietnam.
    Tran, Ha-Vu
    University of Quebec, Montreal, Canada.
    Uhlemann, Elisabeth
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Optimal Energy Harvesting Time and Power Allocation Policy in CRN Under Security Constraints from Eavesdroppers2017In: IEEE International Symposium on Personal, Indoor and Mobile Radio Communications PIMRC 16, 2017Conference paper (Refereed)
    Abstract [en]

    In this paper, we study energy harvesting cognitive radio networks (CRNs) in the presence of multiple eavesdroppers (EAVs) and multiple primary users (PUs). In particular, the secondary user (SU) harvests energy from multiple primary user transmitters (P-Tx), and then uses this harvested energy to deliver packets to the secondary access point (SAP). The SU communication faces multiple EAVs intending to steal its confidential information. In order to protect itself against multiple EAVs and also to protect the PUs communication from interference generated by the SU signals, the SU should be equipped with a suitable power allocation strategy which is derived from channel state information, harvested energy, security constraints given by the SU, and interference constraint given by the PU. Accordingly, an energy harvesting and communication protocol is proposed. Further, the optimal energy harvesting time, a power allocation policy, and a channel selection strategy for the SU are derived and analyzed. To this end, closed-form expressions for the packet error probability and the average packet delay including retransmissions are obtained. Interestingly, the numerical results obtained in this paper show that the proposed power allocation and channel selection strategy does not only improve the spectrum and energy utilization, but also protect the confidential information of the SU from the EAVs.

  • 19.
    Tran, Hung Vinh
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Zepernick, H. -J
    Blekinge Institute of Technology, Karlskrona.
    Sibomana, L.
    Blekinge Institute of Technology, Karlskrona.
    Performance of cognitive radio networks under interference constraints of multiple primary users2016In: 2016, 10th International Conference on Signal Processing and Communication Systems, ICSPCS 2016 - Proceedings, Institute of Electrical and Electronics Engineers Inc. , 2016, article id 7843365Conference paper (Refereed)
    Abstract [en]

    In this paper, we study the performance of point-to-point communication in spectrum sharing systems under the peak interference power constraint of multiple primary users. In particular, we assume that the channels undergo independent but not necessarily identically distributed Nakagami-m fading with integer values of fading severity parameter m. The cumulative distribution function and probability density function for the signal-to-noise ratio are derived. Based on these formulas, we obtain analytical expressions for the outage probability, the ergodic capacity, and the symbol error probability. Numerical results are also provided to investigate the impact of the peak interference power-to-noise ratio, the number of primary users, and fading parameters on the performance of the secondary network.

  • 20.
    Tran, Hung Vinh
    et al.
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Åkerberg, Johan
    ABB AB, Corp Res, Vasteras, Sweden..
    Björkman, Mats
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems. Malardalen Univ, Sch Innovat Design & Engn, Vasteras, Sweden..
    Tran, Ha-Vu
    Univ Quebec, ETS Engn Sch, LACIME Lab, Montreal, PQ, Canada.
    RF energy harvesting: an analysis of wireless sensor networks for reliable communication2019In: Wireless networks, ISSN 1022-0038, E-ISSN 1572-8196, Vol. 25, no 1, p. 185-199Article in journal (Refereed)
    Abstract [en]

    In this paper, we consider a wireless energy harvesting network consisting of one hybrid access point (HAP) having multiple antennas, and multiple sensor nodes each equipped with a single antenna. In contrast to conventional uplink wireless networks, the sensor nodes in the considered network have no embedded energy supply. They need to recharge the energy from the wireless signals broadcasted by the HAP in order to communicate. Based on the point-to-point and multipoints-to-point model, we propose two medium access control protocols, namely harvesting at the header of timeslot (HHT) and harvesting at the dedicated timeslot (HDT), in which the sensor nodes harvest energy from the HAP in the downlink, and then transform its stored packet into bit streams to send to the HAP in the uplink. Considering a deadline for each packet, the cumulative distribution functions of packet transmission time of the proposed protocols are derived for the selection combining and maximal ratio combining (MRC) techniques at the HAP. Subsequently, analytical expressions for the packet timeout probability and system reliability are obtained to analyze the performance of proposed protocols. Analytical results are validated by numerical simulations. The impacts of the system parameters, such as energy harvesting efficiency coefficient, sensor positions, transmit signal-to-noise ratio, and the length of energy harvesting time on the packet timeout probability and the system reliability are extensively investigated. Our results show that the performance of the HDT protocol outperforms the one using the HHT protocol, and the HDT protocol with the MRC technique has the best performance and it can be a potential solution to enhance the reliability for wireless sensor networks.

  • 21.
    Vo, V. N.
    et al.
    International School, Duy Tan University, Da Nang, Vietnam.
    So-In, C.
    Department of Computer Science, Faculty of Science, Applied Network Technology (ANT) Laboratory, Khon Kaen University, Khon Kaen, Thailand.
    Tran, D. -D
    Faculty of Electrical and Electronics Engineering, Duy Tan University, Da Nang, Vietnam.
    Tran, Hung Vinh
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Optimal System Performance in Multihop Energy Harvesting WSNs Using Cooperative NOMA and Friendly Jammers2019In: IEEE Access, E-ISSN 2169-3536, Vol. 7, p. 125494-125510, article id 8824086Article in journal (Refereed)
    Abstract [en]

    In this paper, we investigate the system performance of multihop energy harvesting (EH) wireless sensor networks (WSNs) with imperfect channel state information (CSI) using cooperative non-orthogonal multiple access (NOMA) and friendly jammers in the presence of multiple passive eavesdroppers (EAVs). Specifically, we propose a two-phase communication protocol consisting of EH and information transmission (IT). In the first phase, relays in all clusters harvest energy from power transfer station (PTS) signals. In the first time slot of the second phase, the gateway simultaneously broadcasts information and interference signals. In the subsequent time slots, a relay acting as a friendly jammer in each cluster uses the harvested energy to send an interference signal. Simultaneously, another EH relay applies the NOMA technique to transmit the information signal according to an optimal scheduling scheme based on the maximum signal-to-interference-plus-noise ratio (SINR) of a far user (MSm) and a near user (MSn). To ensure security performance, we propose an algorithm for determining the EH time constraint for a friendly jammer. Additionally, closed-form expressions for the outage probability and throughput of the considered system are derived. Accordingly, an optimal power allocation coefficient algorithm is proposed to achieve throughput fairness for pairs of users. The results of the mathematical analysis are verified by Monte Carlo simulations. Finally, the numerical results demonstrate that the MSn scheme is recommended for guaranteeing throughput fairness for pairs of users. 

  • 22.
    Vo, Van Nhan
    et al.
    Khon Kaen Univ, Thailand..
    Nguyen, Tri Gia
    Duy Tan Univ, Viet Nam..
    So-In, Chakchai
    Khon Kaen Univ, Thailand..
    Tran, Hung Vinh
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Outage Performance Analysis of Energy Harvesting Wireless Sensor Networks for NOMA Transmissions2020In: Mobile Networks and Applications , ISSN 1383-469X, E-ISSN 1572-8153, Vol. 25, no 1, p. 23-41Article in journal (Refereed)
    Abstract [en]

    In this paper, we investigate radio frequency (RF) energy harvesting (EH) in wireless sensor networks (WSNs) using non-orthogonal multiple access (NOMA) uplink transmission with regard to a probable secrecy outage during the transmission between sensor nodes (SNs) and base station (BS) in the presence of eavesdroppers (EAVs). In particular, the communication protocol is divided into two phases: 1) first, the SNs harvest energy from multiple power transfer stations (PTSs), and then, 2) the cluster heads are elected to transmit information to the BS using the harvested energy. In the first phase, we derive a 2D RF energy model to harvest energy for the SNs. During the second phase, the communication faces multiple EAVs who attempt to capture the information of legitimate users; thus, we propose a strategy to select cluster heads and implement the NOMA technique in the transmission of the cluster heads to enhance the secrecy performance. For the performance evaluation, the exact closed-form expressions for the secrecy outage probability (SOP) at the cluster heads are derived. A nearly optimal EH time algorithm for the cluster head is also proposed. In addition, the impacts of system parameters, such as the EH time, the EH efficiency coefficient, the distance between the cluster heads and the BS, and the number of SNs as well as EAVs on the SOP, are investigated. Finally, Monte Carlo simulations are performed to show the accuracy of the theoretical analysis; it is also shown that the secrecy performance of NOMA in RF EH WSN can be improved using the optimal EH time.

  • 23.
    Vo, Van Nhan
    et al.
    Duy Tan Univ, Danang, Vietnam.
    Tran, Duc-Dung
    Duy Tan Univ, Danang, Vietnam.
    So-In, Chakchai
    Khon Kaen Univ, Thailand.
    Tran, Hung Vinh
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Secrecy Performance Analysis for Fixed-Gain Energy Harvesting in an Internet of Things With Untrusted Relays2018In: IEEE Access, E-ISSN 2169-3536, Vol. 6, p. 48247-48258Article in journal (Refereed)
    Abstract [en]

    In this paper, the radio frequency energy harvesting (EH) and security issues in Internet of Things (IoT) sensor networks with multiple untrusted relays are considered. In particular, the communication protocol is divided into two phases. The first phase is used for EH, in which the IoT sensor nodes (SNs) and relays harvest energy from multiple power transfer stations. The second phase is used for information transmission in two steps: 1) the selected SN uses the harvested energy to broadcast information to the controller and the relays, and 2) the selected relay forwards information to the controller by applying the amplify-and-forward protocol to improve the quality of the communication between the SN and the controller. During information transmission, the controller is at risk of losing information because the relay may act as an eavesdropper (namely, an untrusted relay). Thus, to improve the secrecy performance of the considered system, we propose an optimal scheme, namely, best-sensor-best-untrusted-relay (BSBR) and compare this scheme with random-sensor-random-untrusted-relay and a threshold-based scheme. The closed-form expressions for the secrecy outage probability (SOP) and secrecy throughput (ST) are obtained and verified through Monte Carlo simulations to confirm the superior performance of our approach. EH time optimization and the target secrecy rate optimization algorithms are also proposed. In addition, the impacts of the EH time, the EH efficiency coefficient, the numbers of SNs and untrusted relays, and the target secrecy rate on the SOP and the ST are investigated. The results indicate that the BSBR generally outperforms the two baseline schemes in terms of the SOP and ST.

  • 24.
    Vo, Van Nhan
    et al.
    Duy Tan Univ, Danang, Vietnam.
    Tran, Hung Vinh
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Uhlemann, Elisabeth
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Truong, Quach Xuan
    VNU Univ Engn & Technol, Hanoi, Vietnam.
    So-In, Chakchai
    Khonkaen Univ, Appl Network Technol ANT Lab, Khon Kaen, Thailand..
    Balador, Ali
    Mälardalen University, School of Innovation, Design and Engineering, Embedded Systems.
    Reliable Communication Performance for Energy Harvesting Wireless Sensor Networks2019In: 2019 IEEE 89TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2019-SPRING), IEEE , 2019Conference paper (Refereed)
    Abstract [en]

    In this paper, we study the problem of how to provide reliable communications for energy harvesting (EH) wireless sensor network (WSN). Using the example of an autonomous quarry, where self-driving trucks autonomously collect and transport goods, there is a need for multiple wireless sensors collecting data about where and when goods can be collected, while guaranteeing reliable operation of the quarry. The vehicles transfer energy to the wireless sensors within range, forming a cluster. The sensors use this energy to transmit data to the vehicles. Finally, the vehicles relay information to an access point (AP). The AP processes the collected information and synchronize the operation of all vehicles. We propose an interference channel selection policy for the sensors-to-vehicles links and vehicles-to-AP links to improve the reliability of the communications, while enhancing the energy utilization. Accordingly, closed-form expression on how to achieve reliable communication within the considered system is derived and numerical results show that the proposed channel selection strategy not only improves the probability of achieving sufficiently reliable communication but also enhances the energy utilization.

1 - 24 of 24
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf