3 research outputs found

    Secrecy outage performance analysis for energy harvesting sensor networks with a jammer using relay selection strategy

    Get PDF
    In this paper, we study radio frequency energy harvesting (EH) in a wireless sensor network in the presence of multiple eavesdroppers (EAVs). Specifically, the sensor source and multiple sensor relays harvest energy from multiple power transfer stations (PTSs), and then, the source uses this harvested energy to transmit information to the base station (BS) with the help of the relays. During the transmission of information, the BS typically faces a risk of losing information due to the EAVs. Thus, to enhance the secrecy of the considered system, one of the relays acts as a jammer, using harvested energy to generate interference with the EAVs. We propose a best-relay-and-best-jammer scheme for this purpose and compare this scheme with other previous schemes. The exact closed-form expression for the secrecy outage probability (SOP) is obtained and is validated through Monte Carlo simulations. A near-optimal EH time algorithm is also proposed. In addition, the effects on the SOP of key system parameters such as the EH efficiency coefficient, the EH time, the distance between the relay and BS, the number of PTSs, the number of relays, and the number of EAVs are investigated. The results indicate that the proposed scheme generally outperforms both the best-relay-and-random-jammer scheme and the random-relay-and-best-jammer scheme in terms of the secrecy capacity

    Secrecy Performance Optimization for Wireless Powered Communication Networks With an Energy Harvesting Jammer

    No full text
    In this paper, we consider a wireless powered communication network with an energy harvesting (EH) jammer where eavesdroppers try to wiretap the communication between users and a hybrid access-point (H-AP). In our system, the H-AP first transmits an energy signal to recharge the batteries of the EH users and the EH jammer in the energy transfer (ET) phase. Then, in the subsequent information transfer (IT) phase, each user sends information to the H-AP in a time division multiple access manner, while the jammer generates jamming signals to interfere the eavesdroppers. We adopt two different secrecy performance measurements according to the level of channel state information (CSI) of the eavesdroppers. First, with a single user, we maximize the secrecy rate by optimizing the time allocation between the ET and the IT phase when perfect CSI of the eavesdroppers is available at all nodes. In contrast, when the instantaneous CSI of the eavesdroppers is not available at legitimate nodes, we analyze and minimize the secrecy outage probability. We also extend the single user analysis to a more general multi-user situation with an additional consideration of the transmit power allocation at the jammer. Finally, we evaluate the performance of our proposed solutions through simulations and demonstrate that a performance gain compared to conventional schemes becomes more pronounced with the increased number of eavesdroppers and users
    corecore