31 research outputs found

    Secrecy outage performance analysis for energy harvesting sensor networks with a jammer using relay selection strategy

    Get PDF
    In this paper, we study radio frequency energy harvesting (EH) in a wireless sensor network in the presence of multiple eavesdroppers (EAVs). Specifically, the sensor source and multiple sensor relays harvest energy from multiple power transfer stations (PTSs), and then, the source uses this harvested energy to transmit information to the base station (BS) with the help of the relays. During the transmission of information, the BS typically faces a risk of losing information due to the EAVs. Thus, to enhance the secrecy of the considered system, one of the relays acts as a jammer, using harvested energy to generate interference with the EAVs. We propose a best-relay-and-best-jammer scheme for this purpose and compare this scheme with other previous schemes. The exact closed-form expression for the secrecy outage probability (SOP) is obtained and is validated through Monte Carlo simulations. A near-optimal EH time algorithm is also proposed. In addition, the effects on the SOP of key system parameters such as the EH efficiency coefficient, the EH time, the distance between the relay and BS, the number of PTSs, the number of relays, and the number of EAVs are investigated. The results indicate that the proposed scheme generally outperforms both the best-relay-and-random-jammer scheme and the random-relay-and-best-jammer scheme in terms of the secrecy capacity

    Performance Analysis and Beamforming Design of a Secure Cooperative MISO-NOMA Network.

    Get PDF
    This paper studies the cell-edge user's performance of a secure multiple-input single-output non-orthogonal multiple-access (MISO-NOMA) system under the Rayleigh fading channel in the presence of an eavesdropper. We suppose a worst-case scenario that an eavesdropper has ideal user detection ability. In particular, we suggest an optimization-based beamforming scheme with MISO-NOMA to improve the security and outage probability of a cell-edge user while maintaining the quality of service of the near-user and degrading the performance of the eavesdropper. To this end, power allocation coefficients are adjusted with the help of target data rates of both the users by utilizing a simultaneous wireless information and power transfer with time switching/power splitting protocol, where the near-user is used to forward the information to cell-edge user. The analytical results demonstrate that our beamformer analysis can achieve reduced outage probability of cell-edge user in the presence of the eavesdropper. Moreover, the provided simulation results validate our theoretical analysis and show that our approach improves the overall performance of a two-user cooperative MISO-NOMA system

    Transceiver design for wireless energy harvesting cooperative networks

    Get PDF
    In this thesis, the RF energy harvesting technique is studied in the cooperative wireless network, and different optimization studies are investigated. First, an energy-efficient optimization is considered in the cooperative system with the time switching relaying and power splitting relaying protocols. Then, a security issue in the cooperative network with energy harvesting is proposed, in which the optimization problem is designed to maximize the secrecy rate. We also consider the application of energy harvesting in the full-duplex relaying network with a self-energy recycling protocol. Finally, the energy harvesting is studied in the full-duplex cooperative cognitive radio network. The system performance of all studies is verified in the thesis with MATLAB simulation results

    Physical Layer Security of Cooperative NOMA for IoT Networks under I/Q Imbalance

    Get PDF
    In this paper, we investigate the reliability and security of cooperative dual-hop non-orthogonal multiple access (NOMA) for internet-of-thing (IoT) networks, in which the transceivers consider a detrimental factor of in-phase and quadrature-phase imbalance (IQI). The communication between the source and destination is accomplished through a decode-and-forward (DF) relay in the presence of an eavesdropper. In order to characterize the performance of the considered system, exact analytical expressions for the outage probability (OP) and intercept probability (IP) are derived in closed-form. Furthermore, to better understanding the performance of the considered system, we further derive the asymptotic expressions of OP in the high signal-to-noise ratio (SNR) regime and IP at the high main eavesdropping ratio (MER) region. A large number of analysis and Monte Carlo simulation results show that the existence of IQI usually increases the corresponding OP and reduces the IP, which means that reduces the reliability of the system and improves the security. In addition, the provided results provide useful insights into the trade-off between reliability and security of secure cooperative communication systems

    Robust AN-Aided Beamforming Design for Secure MISO Cognitive Radio Based on a Practical Nonlinear EH Model

    Get PDF
    Energy harvesting techniques are promising in next generation wireless communication systems. However, most of the existing works are based on an ideal linear energy harvesting model. In this paper, a multiple-input single-output cognitive radio network is studies under a practical non-linear energy harvesting model. In order to improve the security of both the primary network and the secondary network, a cooperative jamming scheme is proposed. A robust artificial noise aided beamforming design problem is formulated under the bounded channel state information error model. The formulated problem is non-convex and challenging to be solved. Using S-procedure and the semidefinite relaxation method, a suboptimal beamforming can be obtained. Simulation results show that the performance achieved under the non-linear energy harvesting model may be better than that obtained under the linear energy harvesting model. It is also shown that the cooperation betwen the primary network and the secondary network can obtain a performance gain compared with that without this cooperation

    SWIPT-enabled cooperative wireless IoT networks with friendly jammer and eavesdropper: Outage and intercept probability analysis

    Get PDF
    Physical layer security (PLS) and simultaneous wireless information and power transfer (SWIPT) in cooperative relaying have gained great interest as technologies for security and energy enhance ment in Internet-of-Things (IoT) networks. In this work, we investigate PLS for a SWIPT- and AF-enabled cooperative wireless IoT system, consisting of one source, multiple energy harvesting (EH) relays, and one destination, in the presence of an eavesdropper that tries to overhear the confidential information. Furthermore, an EH-friendly jammer is deployed to transmit jamming signals aimed at the eavesdropper to improve the security system. In this context, a low-complexity, sub-optimal, but efficient relay selection method is proposed. More specifically, the relay is selected to convey information such that it has the best channel to the source. Based on the proposed system model, the performance analysis of the intercept probability (IP), asymptotic IP, and non-zero secrecy probability (NZSP) is analyzed by considering the time switching (TS)-based relaying strategy. Particularly, the exact closed-form expression of IP is achieved by applying modified Bessel function expansion. Monte-Carlo simulations are employed to corroborate the correctness and efficiency of our mathematical analysis. The time splitting factor α makes variations on the IP of about 3× as α ∈ [0.1, 0.8]. However, a dramatic reduction of the IP up to 317× is observed as α increases from 0.8 to 0.9.Web of Science11861778616
    corecore