77,910 research outputs found

    Safe and Secure Wireless Power Transfer Networks: Challenges and Opportunities in RF-Based Systems

    Full text link
    RF-based wireless power transfer networks (WPTNs) are deployed to transfer power to embedded devices over the air via RF waves. Up until now, a considerable amount of effort has been devoted by researchers to design WPTNs that maximize several objectives such as harvested power, energy outage and charging delay. However, inherent security and safety issues are generally overlooked and these need to be solved if WPTNs are to be become widespread. This article focuses on safety and security problems related WPTNs and highlight their cruciality in terms of efficient and dependable operation of RF-based WPTNs. We provide a overview of new research opportunities in this emerging domain.Comment: Removed some references, added new references, corrected typos, revised some sections (mostly I-B and III-C

    Secrecy Wireless Information and Power Transfer in OFDMA Systems

    Full text link
    In this paper, we consider simultaneous wireless information and power transfer (SWIPT) in orthogonal frequency division multiple access (OFDMA) systems with the coexistence of information receivers (IRs) and energy receivers (ERs). The IRs are served with best-effort secrecy data and the ERs harvest energy with minimum required harvested power. To enhance physical-layer security and yet satisfy energy harvesting requirements, we introduce a new frequency-domain artificial noise based approach. We study the optimal resource allocation for the weighted sum secrecy rate maximization via transmit power and subcarrier allocation. The considered problem is non-convex, while we propose an efficient algorithm for solving it based on Lagrange duality method. Simulation results illustrate the effectiveness of the proposed algorithm as compared against other heuristic schemes.Comment: To appear in Globecom 201

    Joint Secure Beamforming for Cognitive Radio Networks with Untrusted Secondary Users

    Full text link
    In this paper, we consider simultaneous wireless information and power transfer (SWIPT) in orthogonal frequency division multiple access (OFDMA) systems with the coexistence of information receivers (IRs) and energy receivers (ERs). The IRs are served with best-effort secrecy data and the ERs harvest energy with minimum required harvested power. To enhance physical-layer security and yet satisfy energy harvesting requirements, we introduce a new frequency-domain artificial noise based approach. We study the optimal resource allocation for the weighted sum secrecy rate maximization via transmit power and subcarrier allocation. The considered problem is non-convex, while we propose an efficient algorithm for solving it based on Lagrange duality method. Simulation results illustrate the effectiveness of the proposed algorithm as compared against other heuristic schemes.Comment: To appear in Globecom 201

    Empowering Distributed Solar PV Energy For Malaysian Rural Housing: Towards Energy Security And Equitability Of Rural Communities

    Get PDF
    This paper illustrates on how Malaysia’s development landscapes has been powered by cheap oil and gas making it dependent and addicted on using large amounts of fossil fuels. As a country that is primarily depended on fossil fuels for generating power supply, Malaysia needs to cogitate of long-term energy security due to fossil fuel depletion and peak oil issues. Loss of these resources could leadto thereduction of power generation capacitywhich will threaten the stability of the electricity supply in Malaysia. This could potentially influence in an increase in electricity costs which lead to a phase of power scarcity and load shedding for the country. With the risk of interrupted power supplies, rural households, especially those of low-income groups are particularly vulnerable to the post-effects of a power outage and an inequitable distribution to the people. Distributed generation of electricity by solar PVs diminishes the vulnerability of these households and can also offer an income to them by feeding the power supply to the national grid through Feed-in Tariff scheme. At the moment, the deployment of solar PV installations is still in the introductory stage in Malaysia, where roof-mounted PV panels are only available to commercial and urban residential buildings. This is due to the lack of a suitable renewable energy policy for rural householdsandthe high cost of the solar PV technology. This paper will put forward an analysis for incorporating solar photovoltaic on roofs of rural houses by identifying the energy consumption of these households and the extent to which PVs can alleviate electricity insecurity. The results present significant potential for distributed PV power generation in rural areas in Malaysia which shown a considerable amount of electricity needed to be harvested from roof-mounted solar PV for rural people in Malaysi

    Transmitter Optimization Techniques for Physical Layer Security

    Get PDF
    Information security is one of the most critical issues in wireless networks as the signals transmitted through wireless medium are more vulnerable for interception. Although the existing conventional security techniques are proven to be safe, the broadcast nature of wireless communications introduces different challenges in terms of key exchange and distributions. As a result, information theoretic physical layer security has been proposed to complement the conventional security techniques for enhancing security in wireless transmissions. On the other hand, the rapid growth of data rates introduces different challenges on power limited mobile devices in terms of energy requirements. Recently, research work on wireless power transfer claimed that it has been considered as a potential technique to extend the battery lifetime of wireless networks. However, the algorithms developed based on the conventional optimization approaches often require iterative techniques, which poses challenges for real-time processing. To meet the demanding requirements of future ultra-low latency and reliable networks, neural network (NN) based approach can be employed to determine the resource allocations in wireless communications. This thesis developed different transmission strategies for secure transmission in wireless communications. Firstly, transmitter designs are focused in a multiple-input single-output simultaneous wireless information and power transfer system with unknown eavesdroppers. To improve the performance of physical layer security and the harvested energy, artificial noise is incorporated into the network to mask the secret information between the legitimate terminals. Then, different secrecy energy efficiency designs are considered for a MISO underlay cognitive radio network, in the presence of an energy harvesting receiver. In particular, these designs are developed with different channel state information assumptions at the transmitter. Finally, two different power allocation designs are investigated for a cognitive radio network to maximize the secrecy rate of the secondary receiver: conventional convex optimization framework and NN based algorithm

    Secrecy Capacity for Multi-Antenna Wireless-Powered AF Relaying Systems

    Get PDF
    This paper analyzes the ergodic secrecy capacity of an energy-constrained multiple-antennas amplify-and-forward (AF) relaying system in the presence of a passive eavesdropper. In the first phase, the source broadcasts information signal, while the destination sends an artificial jamming signal. The jamming signal has two main purposes: 1) enhancing the system security; 2) increasing the energy harvesting (EH) at the relay node. In the second phase, the relay uses the harvested energy to amplify and forward the received signal to the destination. For this system model, explicit mathematical expressions for the ergodic secrecy capacity are derived for three different common EH-relaying protocols, namely, power splitting relaying (PSR), antenna selection and power splitting (ASPS) receiver, and ideal relaying receiver (IRR). Monte-Carlo simulations are included to validate the analysis and the effect of different parameters on the system security are investigated. The results show that, the ASPS receiver outperforms PSR in terms of secrecy capacity

    Smart Meter Privacy with an Energy Harvesting Device and Instantaneous Power Constraints

    Full text link
    A smart meter (SM) periodically measures end-user electricity consumption and reports it to a utility provider (UP). Despite the advantages of SMs, their use leads to serious concerns about consumer privacy. In this paper, SM privacy is studied by considering the presence of an energy harvesting device (EHD) as a means of masking the user's input load. The user can satisfy part or all of his/her energy needs from the EHD, and hence, less information can be leaked to the UP via the SM. The EHD is typically equipped with a rechargeable energy storage device, i.e., a battery, whose instantaneous energy content limits the user's capability in covering his/her energy usage. Privacy is measured by the information leaked about the user's real energy consumption when the UP observes the energy requested from the grid, which the SM reads and reports to the UP. The minimum information leakage rate is characterized as a computable information theoretic single-letter expression when the EHD battery capacity is either infinite or zero. Numerical results are presented for a discrete binary input load to illustrate the potential privacy gains from the existence of a storage device.Comment: To be published in IEEE ICC201

    Optimal Checkpointing for Secure Intermittently-Powered IoT Devices

    Full text link
    Energy harvesting is a promising solution to power Internet of Things (IoT) devices. Due to the intermittent nature of these energy sources, one cannot guarantee forward progress of program execution. Prior work has advocated for checkpointing the intermediate state to off-chip non-volatile memory (NVM). Encrypting checkpoints addresses the security concern, but significantly increases the checkpointing overheads. In this paper, we propose a new online checkpointing policy that judiciously determines when to checkpoint so as to minimize application time to completion while guaranteeing security. Compared to state-of-the-art checkpointing schemes that do not account for the overheads of encrypted checkpoints we improve execution time up to 1.4x.Comment: ICCAD 201
    • …
    corecore