4 research outputs found
Secrecy Throughput Maximization for Full-Duplex Wireless Powered IoT Networks under Fairness Constraints
In this paper, we study the secrecy throughput of a full-duplex wireless
powered communication network (WPCN) for internet of things (IoT). The WPCN
consists of a full-duplex multi-antenna base station (BS) and a number of
sensor nodes. The BS transmits energy all the time, and each node harvests
energy prior to its transmission time slot. The nodes sequentially transmit
their confidential information to the BS, and the other nodes are considered as
potential eavesdroppers. We first formulate the sum secrecy throughput
optimization problem of all the nodes. The optimization variables are the
duration of the time slots and the BS beamforming vectors in different time
slots. The problem is shown to be non-convex. To tackle the problem, we propose
a suboptimal two stage approach, referred to as sum secrecy throughput
maximization (SSTM). In the first stage, the BS focuses its beamforming to
blind the potential eavesdroppers (other nodes) during information transmission
time slots. Then, the optimal beamforming vector in the initial non-information
transmission time slot and the optimal time slots are derived. We then consider
fairness among the nodes and propose max-min fair (MMF) and proportional fair
(PLF) algorithms. The MMF algorithm maximizes the minimum secrecy throughput of
the nodes, while the PLF tries to achieve a good trade-off between the sum
secrecy throughput and fairness among the nodes. Through numerical simulations,
we first demonstrate the superior performance of the SSTM to uniform time
slotting and beamforming in different settings. Then, we show the effectiveness
of the proposed fair algorithms
QoS-aware Stochastic Spatial PLS Model for Analysing Secrecy Performance under Eavesdropping and Jamming
Securing wireless communication, being inherently vulnerable to eavesdropping
and jamming attacks, becomes more challenging in resource-constrained networks
like Internet-of-Things. Towards this, physical layer security (PLS) has gained
significant attention due to its low complexity. In this paper, we address the
issue of random inter-node distances in secrecy analysis and develop a
comprehensive quality-of-service (QoS) aware PLS framework for the analysis of
both eavesdropping and jamming capabilities of attacker. The proposed solution
covers spatially stochastic deployment of legitimate nodes and attacker. We
characterise the secrecy outage performance against both attacks using
inter-node distance based probabilistic distribution functions. The model takes
into account the practical limits arising out of underlying QoS requirements,
which include the maximum distance between legitimate users driven by transmit
power and receiver sensitivity. A novel concept of eavesdropping zone is
introduced, and relative impact of jamming power is investigated. Closed-form
expressions for asymptotic secrecy outage probability are derived offering
insights into design of optimal system parameters for desired security level
against the attacker's capability of both attacks. Analytical framework,
validated by numerical results, establishes that the proposed solution offers
potentially accurate characterisation of the PLS performance and key design
perspective from point-of-view of both legitimate user and attacker.Comment: Accepted in IET communication