Improving Secrecy Performance of a Wirelessly Powered Network

Zhuo Chen, Lucinda Hadley, Zhiguo Ding, Xuchu Dai

Research output: Contribution to journalArticlepeer-review

23 Scopus citations

Abstract

This paper considers the secrecy communication of a wirelessly powered network, where an energy-constrained legitimate transmitter (Alice) sends message to a legitimate receiver (Bob) with the energy harvested from a dedicated power beacon, while an eavesdropper (Eve) intends to intercept the information. A simple time-switching protocol with a time-switching ratio α is used to supply power for the energy-constrained legitimate transmitter. To improve the physical layer security, we first propose a protocol that combines maximum ratio transmission with zero-forcing (ZF) jamming for the case without Eve's channel state information (CSI), i.e., Alice has access to Bob's CSI only. Then, we propose a protocol that uses a ZF transmitting strategy to minimize the signal-to-noise ratio (SNR) at Eve for the case that Alice is capable of obtaining partial CSI related to Eve. Closed-form expressions and simple approximations of the connection outage probability and secrecy outage probability are derived for both protocols. Furthermore, the secrecy throughput as well as the diversity orders achieved by our proposed protocols are characterized, and the optimal time-switching ratio α and power allocation coefficient $\beta $ for secrecy throughput maximization are derived in the high SNR regime. Finally, numerical results validate the effectiveness of the proposed schemes.

Original languageBritish English
Article number7994635
Pages (from-to)4996-5008
Number of pages13
JournalIEEE Transactions on Communications
Volume65
Issue number11
DOIs
StatePublished - Nov 2017

Keywords

  • artificial jamming
  • Physical layer security
  • wirelessly powered networks

Fingerprint

Dive into the research topics of 'Improving Secrecy Performance of a Wirelessly Powered Network'. Together they form a unique fingerprint.

Cite this