SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Nhan Vo Van) "

Sökning: WFRF:(Nhan Vo Van)

  • Resultat 1-10 av 10
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Nhan Vo, Van, et al. (författare)
  • On Communication Performance in Energy Harvesting WSNs Under a Cooperative Jamming Attack
  • 2020
  • Ingår i: IEEE Systems Journal. - 1932-8184 .- 1937-9234. ; 14:4, s. 4955-4966
  • Tidskriftsartikel (refereegranskat)abstract
    • In this article, we consider the system performance of an energy harvesting (EH) wireless sensor network in terms of reliable communications when subjected to a cooperative jamming attack. A set of strategically located nodes acting as cluster heads (CHs) transfer energy to the wireless sensors within range, forming a cluster. The sensors use this energy to transmit data to the CHs, which, in turn, deliver the information to a base station (BS) using nonorthogonal multiple access. The BS processes the collected information and synchronizes the operation of all CHs. Furthermore, there exist two adversaries, namely, a jamming attacker and an eavesdropper, who cooperate to attack the considered system. To protect against this attack, the CHs should be controlled by suitable power allocation coefficients obtained from the security constraints of the CHs. Using these constraints, closed-form expressions are derived to find the power allocation coefficients that will enable reliable and secure communication. In addition, we propose an interference channel selection policy for the sensor-to-CHs links and CHs-to-BS links to improve the reliability of communication while enhancing energy utilization. Finally, an algorithm for finding the optimal EH time is also proposed.
  •  
2.
  • Witthayolankowit, Kuntawit, et al. (författare)
  • Use of a fully biobased and non-reprotoxic epoxy polymer and woven hemp fabric to prepare environmentally friendly composite materials with excellent physical properties
  • 2023
  • Ingår i: Composites Part B. - : Elsevier BV. - 1359-8368 .- 1879-1069. ; 258
  • Tidskriftsartikel (refereegranskat)abstract
    • In the future, materials will need to be biobased and produced sustainably without compromising mechanical properties. To date, in many cases, the advantages of the bio-origin of the raw material are overridden by the environmental impact of the process. In the present study, we have developed a novel composite material based on woven hemp fabric which reinforce a thermoset polymer produced from birch bark, a low-value forestry byproduct. Results show that this fully biobased composite has specific stiffness and strength equivalent to those of flax fibre-reinforced petroleum-based epoxy composites and slightly lower than glass fibre-reinforced petroleum-based epoxy composites. The sustainability of the material was also evaluated by life-cycle assessment from cradle to gate and showed significantly superior performance with respect to the potential global warming impact than commercial benchmark materials. Furthermore, toxicology studies showed no endocrine disruptive activities. This is an important proof of concept study demonstrating that biobased structural materials can be produced sustainably.
  •  
3.
  • Huu, Tung Pham, et al. (författare)
  • Secrecy Performance Analysis of Cooperative NOMA Networks With Active Protection under alpha - mu Fading
  • 2019
  • Ingår i: 2019 12TH INTERNATIONAL CONFERENCE ON ADVANCED TECHNOLOGIES FOR COMMUNICATIONS (ATC 2019). - : IEEE. - 9781728123929 ; , s. 215-220
  • Konferensbidrag (refereegranskat)abstract
    • In this paper, we analyze the secrecy performance of a cooperative communication wireless system using non-orthogonal multiple access (NOMA) over alpha - mu fading channel. A new cooperative NOMA scheme is proposed to protect the confidential communication that is transmitted from a source to two users by the help of a relay under the monitoring of an eavesdropper (EAV). In particular, the legitimate user generates jamming signals to the EAV while the source transmits the signals to the relay and the source sends jamming signals to the EAV while the relay forwards the signals to the users. In order to evaluate the secrecy performance, the physical layer security (PLS) in term of the secrecy outage probability (SOP) for the active protection scheme (APS) is investigated and compared to that for a benchmark non-protection scheme (NPS). Simulation results show that the APS can effectively enhance the secrecy performance.
  •  
4.
  • Nhan Vo, Van, et al. (författare)
  • On Security and Throughput for Energy Harvesting Untrusted Relays in IoT Systems Using NOMA
  • 2019
  • Ingår i: IEEE Access. - United States : IEEE. - 2169-3536. ; 2:1, s. 1-30
  • Tidskriftsartikel (refereegranskat)abstract
    • In this paper, we analyze the secrecy and throughput of multiple-input single-output (MISO) energy harvesting (EH) Internet of Things (IoT) systems, in which a multi-antenna base station (BS) transmits signals to IoT devices (IoTDs) with the help of relays. Specifically, the communication process is separated into two phases. In the first phase, the BS applies transmit antenna selection (TAS) to broadcast the signal to the relays and IoTDs by using non-orthogonal multiple access (NOMA). Here, the relays use power-splitting-based relaying (PSR) for EH and information processing. In the second phase, the selected relay employs the amplify-and-forward (AF) technique to forward the received signal to the IoTDs using NOMA. The information transmitted from the BS to the IoTD risks leakage by the relay, which is able to act as an eavesdropper (EAV) (i.e., an untrusted relay). To analyze the secrecy performance, we investigate three schemes: random-BS-best-relay (RBBR), best-BS-random-relay (BBRR), and best-BS-best-relay (BBBR). The physical layer secrecy (PLS) performance is characterized by deriving closed-form expressions of secrecy outage probability (SOP) for the IoTDs. A BS transmit power optimization algorithm is also proposed to achieve the best secrecy performance. Based on this, we then evaluate the system performance of the considered system, i.e., the outage probability and throughput. In addition, the impacts of the EH time, the power-splitting ratio, the numbers of BS antennas, and the numbers of untrusted relays on the SOP and throughput are investigated. The Monte Carlo approach is applied to verify our analytical results. Finally, the numerical examples indicate that the system performance of BBBR is greater than that of RBBR and BBRR.
  •  
5.
  • Nhan Vo, Van, et al. (författare)
  • Secrecy Performance in the Internet of Things : Optimal Energy Harvesting Time Under Constraints of Sensors and Eavesdroppers
  • 2020
  • Ingår i: Software, practice & experience. - Sweden : Springer. - 0038-0644 .- 1097-024X. ; 25:1, s. 193-210
  • Tidskriftsartikel (refereegranskat)abstract
    • In this paper, we investigate the physical layer security (PLS) performance for the Internet of Things (IoT), which is modeled as an IoT sensor network (ISN). The considered system consists of multiple power transfer stations (PTSs), multiple IoT sensor nodes (SNs), one legitimate fusion center (LFC) and multiple eavesdropping fusion centers (EFCs), which attempt to extract the transmitted information at SNs without an active attack. The SNs and the EFCs are equipped with a single antenna, while the LFC is equipped with multiple antennas. Specifically, the SNs harvest energy from the PTSs and then use the harvested energy to transmit the information to the LFC. In this research, the energy harvesting (EH) process is considered in the following two strategies: 1) the SN harvests energy from all PTSs, and 2) the SN harvests energy from the best PTS. To guarantee security for the considered system before the SN sends the packet, the SN’s power is controlled by a suitable power policy that is based on the channel state information (CSI), harvested energy, and security constraints. An algorithm for the nearly optimal EH time is implemented. Accordingly, the analytical expressions for the existence probability of secrecy capacity and secrecy outage probability (SOP) are derived by using the statistical characteristics of the signal-to-noise ratio (SNR). In addition, we analyze the secrecy performance for various system parameters, such as the location of system elements, the number of PTSs, and the number of EFCs. Finally, the results of Monte Carlo simulations are provided to confirm the correctness of our analysis and derivation.
  •  
6.
  • Tram, Duc-Dung, et al. (författare)
  • Performance Analysis of DF/AF Cooperative MISO Wireless Sensor Networks With NOMA and SWIPT Over Nakagami-m Fading
  • 2018
  • Ingår i: IEEE Access. - : IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC. - 2169-3536. ; 6, s. 56142-56161
  • Tidskriftsartikel (refereegranskat)abstract
    • In this paper, we investigate downlink cooperative multiple-input single-output wireless sensor networks with the nonorthogonal multiple access technique and simultaneous wireless information and power transfer over Nakagami-m fading. Specifically, the considered network includes a multiantenna sink node, an energy-limited relay cluster, a high-priority sensor node (SN) cluster, and a low-priority SN cluster. Prior to transmission, a transmit antenna, a relay, a high-priority SN, and a low-priority SN are selected. In this paper, we propose three antenna-relay-destination selection schemes, i.e., sink node-high-priority, sink node-relay, and sink node-low-priority. In each proposed scheme, we consider two relaying strategies, i.e., decode-and-forward and amplify-and-forward, and then, we derive the corresponding closed-form expressions of outage probability at the selected SNs. In addition, we introduce two algorithms: 1) the power-splitting ratio optimization algorithm and 2) the best antenna-relay-destination selection determination algorithm. Finally, we utilize the Monte Carlo simulations to verify our analytical results.
  •  
7.
  • Vo, Van Nhan, et al. (författare)
  • Outage Performance Analysis of Energy Harvesting Wireless Sensor Networks for NOMA Transmissions
  • 2020
  • Ingår i: Mobile Networks and Applications. - : SPRINGER. - 1383-469X .- 1572-8153. ; 25:1, s. 23-41
  • Tidskriftsartikel (refereegranskat)abstract
    • In this paper, we investigate radio frequency (RF) energy harvesting (EH) in wireless sensor networks (WSNs) using non-orthogonal multiple access (NOMA) uplink transmission with regard to a probable secrecy outage during the transmission between sensor nodes (SNs) and base station (BS) in the presence of eavesdroppers (EAVs). In particular, the communication protocol is divided into two phases: 1) first, the SNs harvest energy from multiple power transfer stations (PTSs), and then, 2) the cluster heads are elected to transmit information to the BS using the harvested energy. In the first phase, we derive a 2D RF energy model to harvest energy for the SNs. During the second phase, the communication faces multiple EAVs who attempt to capture the information of legitimate users; thus, we propose a strategy to select cluster heads and implement the NOMA technique in the transmission of the cluster heads to enhance the secrecy performance. For the performance evaluation, the exact closed-form expressions for the secrecy outage probability (SOP) at the cluster heads are derived. A nearly optimal EH time algorithm for the cluster head is also proposed. In addition, the impacts of system parameters, such as the EH time, the EH efficiency coefficient, the distance between the cluster heads and the BS, and the number of SNs as well as EAVs on the SOP, are investigated. Finally, Monte Carlo simulations are performed to show the accuracy of the theoretical analysis; it is also shown that the secrecy performance of NOMA in RF EH WSN can be improved using the optimal EH time.
  •  
8.
  • Vo, Van Nhan, et al. (författare)
  • Performance Analysis of an Energy-Harvesting IoT System Using a UAV Friendly Jammer and NOMA Under Cooperative Attack
  • 2020
  • Ingår i: IEEE Access. - : IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC. - 2169-3536. ; 8, s. 221986-222000
  • Tidskriftsartikel (refereegranskat)abstract
    • In this article, we consider the information leakage and outage probabilities of a multiple-input single-output (MISO) energy-harvesting (EH) Internet of Things (IoT) system in which a multiantenna ground base station (GBS) transmits messages to legitimate IoT destinations (LIDs) with the help of IoT relays (IRs) using non-orthogonal multiple access (NOMA) in the presence of a malicious jammer (MJ) and eavesdroppers (EAVs). The communication protocol is separated into two phases. In the EH phase, the IRs harvest energy from a power beacon (PB). In the information transmission (IT) phase, the communication process is further divided into two subphases: 1) The GBS broadcasts signals to the IRs using NOMA. Simultaneously, the MJ sends interfering signals to attack the IRs while the EAVs steal the confidential signals from the GBS, in a process called a cooperative attack. On the other hand, to protect the legitimate communication, an unmanned aerial vehicle (UAV) is used as a friendly jammer to defend against the EAVs. 2) A selected IR employs the time-switching-based relaying (TSR) technique to forward the received signal to the LIDs using NOMA. Similar to the first subphase, the LIDs are subjected to a cooperative attack, and the UAV attacks the EAVs in return. The secrecy performance of this communication protocol is characterized by deriving expressions for the information leakage probabilities (ILPs) for the LIDs' signals. A UAV altitude optimization algorithm is also proposed to achieve the best possible secrecy performance. Furthermore, we evaluate the system performance by deriving closed-form expressions for the outage probabilities (OPs). Accordingly, an algorithm is proposed to guarantee both the secrecy and system performance (in terms of the ILPs and OPs). Monte Carlo simulations are presented to verify our analytical results.
  •  
9.
  • Vo, Van Nhan, et al. (författare)
  • Reliable Communication Performance for Energy Harvesting Wireless Sensor Networks
  • 2019
  • Ingår i: 2019 IEEE 89TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2019-SPRING). - : IEEE. - 9781728112176
  • Konferensbidrag (refereegranskat)abstract
    • In this paper, we study the problem of how to provide reliable communications for energy harvesting (EH) wireless sensor network (WSN). Using the example of an autonomous quarry, where self-driving trucks autonomously collect and transport goods, there is a need for multiple wireless sensors collecting data about where and when goods can be collected, while guaranteeing reliable operation of the quarry. The vehicles transfer energy to the wireless sensors within range, forming a cluster. The sensors use this energy to transmit data to the vehicles. Finally, the vehicles relay information to an access point (AP). The AP processes the collected information and synchronize the operation of all vehicles. We propose an interference channel selection policy for the sensors-to-vehicles links and vehicles-to-AP links to improve the reliability of the communications, while enhancing the energy utilization. Accordingly, closed-form expression on how to achieve reliable communication within the considered system is derived and numerical results show that the proposed channel selection strategy not only improves the probability of achieving sufficiently reliable communication but also enhances the energy utilization.
  •  
10.
  • Vo, Van Nhan, et al. (författare)
  • Secrecy Performance Analysis for Fixed-Gain Energy Harvesting in an Internet of Things With Untrusted Relays
  • 2018
  • Ingår i: IEEE Access. - 2169-3536. ; 6, s. 48247-48258
  • Tidskriftsartikel (refereegranskat)abstract
    • In this paper, the radio frequency energy harvesting (EH) and security issues in Internet of Things (IoT) sensor networks with multiple untrusted relays are considered. In particular, the communication protocol is divided into two phases. The first phase is used for EH, in which the IoT sensor nodes (SNs) and relays harvest energy from multiple power transfer stations. The second phase is used for information transmission in two steps: 1) the selected SN uses the harvested energy to broadcast information to the controller and the relays, and 2) the selected relay forwards information to the controller by applying the amplify-and-forward protocol to improve the quality of the communication between the SN and the controller. During information transmission, the controller is at risk of losing information because the relay may act as an eavesdropper (namely, an untrusted relay). Thus, to improve the secrecy performance of the considered system, we propose an optimal scheme, namely, best-sensor-best-untrusted-relay (BSBR) and compare this scheme with random-sensor-random-untrusted-relay and a threshold-based scheme. The closed-form expressions for the secrecy outage probability (SOP) and secrecy throughput (ST) are obtained and verified through Monte Carlo simulations to confirm the superior performance of our approach. EH time optimization and the target secrecy rate optimization algorithms are also proposed. In addition, the impacts of the EH time, the EH efficiency coefficient, the numbers of SNs and untrusted relays, and the target secrecy rate on the SOP and the ST are investigated. The results indicate that the BSBR generally outperforms the two baseline schemes in terms of the SOP and ST.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-10 av 10

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy