193 research outputs found

    Secure Communication with a Wireless-Powered Friendly Jammer

    Get PDF
    In this paper, we propose to use a wireless-powered friendly jammer to enable secure communication between a source node and destination node, in the presence of an eavesdropper. We consider a two-phase communication protocol with fixed-rate transmission. In the first phase, wireless power transfer is conducted from the source to the jammer. In the second phase, the source transmits the information-bearing signal under the protection of a jamming signal sent by the jammer using the harvested energy in the first phase. We analytically characterize the long-time behavior of the proposed protocol and derive a closed-form expression for the throughput. We further optimize the rate parameters for maximizing the throughput subject to a secrecy outage probability constraint. Our analytical results show that the throughput performance differs significantly between the single-antenna jammer case and the multi-antenna jammer case. For instance, as the source transmit power increases, the throughput quickly reaches an upper bound with single-antenna jammer, while the throughput grows unbounded with multi-antenna jammer. Our numerical results also validate the derived analytical results.Comment: accepted for publication in IEEE Transactions on Wireless Communication

    Energy Harvesting Wireless Sensor Networks: Delay Analysis Considering Energy Costs of Sensing and Transmission

    Get PDF
    Energy harvesting (EH) provides a means of greatly enhancing the lifetime of wireless sensor nodes. However, the randomness inherent in the EH process may cause significant delay for performing sensing operation and transmitting the sensed information to the sink. Unlike most existing studies on the delay performance of EH sensor networks, where only the energy consumption of transmission is considered, we consider the energy costs of both sensing and transmission. Specifically, we consider an EH sensor that monitors some status environmental property and adopts a harvest-then-use protocol to perform sensing and transmission. To comprehensively study the delay performance, we consider two complementary metrics and analytically derive their statistics: (i) update age - measuring the time taken from when information is obtained by the sensor to when the sensed information is successfully transmitted to the sink, i.e., how timely the updated information at the sink is, and (ii) update cycle - measuring the time duration between two consecutive successful transmissions, i.e., how frequently the information at the sink is updated. Our results show that the consideration of sensing energy cost leads to an important tradeoff between the two metrics: more frequent updates result in less timely information available at the sink.Comment: submitted for possible journal publicatio

    Remote State Estimation with Smart Sensors over Markov Fading Channels

    Full text link
    We consider a fundamental remote state estimation problem of discrete-time linear time-invariant (LTI) systems. A smart sensor forwards its local state estimate to a remote estimator over a time-correlated MM-state Markov fading channel, where the packet drop probability is time-varying and depends on the current fading channel state. We establish a necessary and sufficient condition for mean-square stability of the remote estimation error covariance as ρ2(A)ρ(DM)<1\rho^2(\mathbf{A})\rho(\mathbf{DM})<1, where ρ()\rho(\cdot) denotes the spectral radius, A\mathbf{A} is the state transition matrix of the LTI system, D\mathbf{D} is a diagonal matrix containing the packet drop probabilities in different channel states, and M\mathbf{M} is the transition probability matrix of the Markov channel states. To derive this result, we propose a novel estimation-cycle based approach, and provide new element-wise bounds of matrix powers. The stability condition is verified by numerical results, and is shown more effective than existing sufficient conditions in the literature. We observe that the stability region in terms of the packet drop probabilities in different channel states can either be convex or concave depending on the transition probability matrix M\mathbf{M}. Our numerical results suggest that the stability conditions for remote estimation may coincide for setups with a smart sensor and with a conventional one (which sends raw measurements to the remote estimator), though the smart sensor setup achieves a better estimation performance.Comment: The paper has been accepted by IEEE Transactions on Automatic Control. Copyright may be transferred without notice, after which this version may no longer be accessibl

    Wireless-powered friendly jammer for physical layer security

    Get PDF
    Exploring a cooperative node as a friendly jammer is an effective means of providing secure communication between a source-destination pair in the presence of an eavesdropper. In this work, we consider the use of a wireless-powered friendly jammer. Without relying on external energy supply, the friendly jammer is powered by the source node via wireless power transfer. We apply a simple time-switching protocol where the power transfer and jammer-assisted secure transmission occur in different time blocks. By investigating the long-term behavior of the communication protocol, we derive a closed-form expression of the throughput. We further optimize the jamming power and the rate parameters for maximizing the throughput subject to a secrecy outage probability constraint.ARC Discovery Projects Grant DP15010390

    Description of Shale Pore Fracture Structure Based on Multi-fractal Theory

    Get PDF
    In order to describe the shale-fissure's structure and distribution accurately, this paper combines with complex features of shale rock mass' multilevel micro-scale fissure network, putting forward that utilizing the multi-fractal method to describe the distribution of fissures with different dimensions. By choosing some oil field's block shale samples, obtain the fissure distribution characteristics by CT scanning and calculate with the multi-fractal theory, the results show that the shale rock mass' fissure distribute in a multiple-fractal regularity. The study results lay a solid foundation of subsequent press shale fissure network's formation and description
    corecore