- Cooperative Communication and Network Coding
- Wireless Communication Security Techniques
- Energy Harvesting in Wireless Networks
- Cognitive Radio Networks and Spectrum Sensing
- Advanced MIMO Systems Optimization
- Advanced Wireless Communication Technologies
- Full-Duplex Wireless Communications
- RFID technology advancements
- Cybersecurity and Information Systems
- Advanced Research in Systems and Signal Processing
- Advanced Control Systems Design
- Advanced Authentication Protocols Security
- Antenna Design and Analysis
- UAV Applications and Optimization
- Mobile Ad Hoc Networks
- VLSI and Analog Circuit Testing
- Neural Networks and Applications
- Advanced Data Processing Techniques
- Fuzzy Logic and Control Systems
Industrial University of Ho Chi Minh City
2017-2024
Ho Technical University
2024
Hanoi University of Science and Technology
2022
Ho Chi Minh City University of Technology and Education
2017-2020
The performance of multi-hop cluster-based wireless networks under multiple eavesdroppers is investigated in the present work. More precisely, we derive outage probability (OP) considered two relay selection schemes: channel-gain-based scheme and random scheme. Although equally correlated Rayleigh fading taken into consideration, derived mathematical framework remains tractable. Specifically, represent exact expression OP channel-based series form, while computed a closed-form expression....
In this paper, we evaluate the secrecy performance of multi-hop cognitive wireless sensor networks (WSNs). secondary network, a source transmits its data to destination via relaying model using transmit antenna selection (TAS)/selection combining (SC) technique at each hop, in presence an eavesdropper who wants receive illegally. The transmitters, including and intermediate relays, have harvest energy from radio-frequency signals power beacon for transmitting data. Moreover, their must be...
In this paper, we propose a Two-Way Cognitive Relay Network (TWCRN) where the secondary users operate on an underlay mode to access licensed bands. proposed protocols, two sources transmit their data relay in first time slot, and then would forward received information both remaining time. Moreover, is self-powered by harvesting energy from ambient Radio Frequency (RF) signals, using Time Switching (TS) Power (PS) method. This paper concentrates evaluating performance of networks under...
This paper evaluates outage probability (OP) and intercept (IP) of physical-layer security based MIMO networks adopting cooperative jamming (Coop-Jam). In the considered scenario, a multi-antenna source communicates with destination employing transmit antenna selection (TAS)/ combining (SC), in presence eavesdropper using SC. One jammers appearing near is selected for generating noises on eavesdropper. Moreover, supports wireless energy chosen jammer, cooperates it to remove noises. We...
In this paper, we propose a two-way relaying scheme using digital network coding in an underlay cognitive radio network. the proposed scheme, transmit antenna selection and techniques are combined primary transmitter receiver, respectively. secondary network, two source nodes that cannot directly communicate attempt to exchange their data with each other. As result, technique partial relay is applied assist exchange. Particularly, at first time slot, selected applies interference...
In this paper, we evaluate end-to-end outage probability of a multi-hop decode-and-forward relaying protocol in underlay cognitive radio network. the proposed protocol, named COOP, secondary nodes including source and relays have to harvest radio-frequency energy from multiple power beacons, adjust their transmit power, follows pre-determined interference threshold given by primary users. To enhance performance for network under an joint constraint threshold, Rayleigh fading channel hardware...
In this paper, we evaluate outage probability (OP) of a cluster-based multi-hop protocol operating on an underlay cognitive radio (CR) mode. The primary network consists multiple independent transmit/receive pairs, and the transmitters seriously cause co-channel interference (CCI) to secondary receivers. To improve performance for under joint impact CCI hardware imperfection, employ best relay selection at each hop. Moreover, destination is equipped with antennas uses combining (SC)...
Summary In this paper, we analyze the tradeoff between outage probability (OP) and intercept (IP) for a multi‐hop relaying scheme in cognitive radio (CR) networks. proposed protocol, multi‐antenna primary transmitter (PT) communicates with receiver (PR), using transmit antenna selection (TAS) / combining (SC) technique, while secondary source attempts to its data destination via approach presence of eavesdropper. The transmitters such as relays have adjust their power satisfy total...
Summary This paper considers a cognitive radio–assisted wireless information and power transfer system consisting of multipair transceiver in primary network 2‐hop relaying link secondary network. In this investigation, decoded‐and‐forward–assisted relay node splitting protocol are deployed to obtain ability energy transfer. The harvests from the radio frequency signals transmitter transmitters data transmission destination by reusing licensed spectrum resource. We propose 2 policies for at...
This paper measures end-to-end (e2e) throughput of power beacon-assisted multi-hop decode-and-forward (DF) relaying scheme adopting non-orthogonal multiple access (NOMA) and transmit antenna selection (TAS)/selection combining (SC). Particularly, TAS/SC NOMA are adopted at each hop to relay different data a source destinations. Moreover, the transmitters including relays have harvest wireless energy from radio frequency (RF) signals beacon. We also propose simple efficient allocation method...
In this paper, we study the trade-off between security and reliability for multi-hop cognitive mobile-to-mobile (M2M) networks. proposed scheme, a secondary source sends its data to destination with assistance of multiple relays in presence eavesdropper. The transmitters operate on an underlay spectrum access mode where their transmit power must satisfy interference constraints required by primary users. We derive exact closed-form expressions end-to-end outage probability (OP) intercept...
In this research, we propose and investigate intercept probability analysis in DF time switching relaying full-duplex with impact of Co-channel interference at the eavesdropper. beginning stage, present Impact Furthermore, closed-form expression (IP) is analyzed derived connection primary system parameters. Finally, Monte Carlo simulation performed for verifying correctness analytical section. From research results, a novel solution some recommendations can be proposed communication network...
This paper studies a trade-off between security (intercept probability (IP)) and reliability (outage (OP)) for multi-hop decode-and-forward (DF) relaying protocol in an underlay cognitive radio network, presence of multi-antenna eavesdropper.In the considered protocol, all primary secondary terminals are equipped with multiple antennas, they employ transmit antenna selection (TAS) (at transmitter sides) combining (SC) receiver techniques to enhance system performance.Relying on channel state...