TY - JOUR
T1 - Improving Secrecy Performance of a Wirelessly Powered Network
AU - Chen, Zhuo
AU - Hadley, Lucinda
AU - Ding, Zhiguo
AU - Dai, Xuchu
N1 - Funding Information:
Manuscript received February 17, 2017; revised June 7, 2017; accepted July 18, 2017. Date of publication July 27, 2017; date of current version November 15, 2017. The work of Zhuo Chen and Xuchu Dai was supported by the National Natural Science Foundation of China under Grant 61471334. The work of Zhiguo Ding was supported by the UK EPSRC under Grant number EP/L025272/1 and by H2020-MSCA-RISE-2015 under Grant number 690750. The associate editor coordinating the review of this paper and approving it for publication was J. Yuan.
Publisher Copyright:
© 2017 IEEE.
PY - 2017/11
Y1 - 2017/11
N2 - This paper considers the secrecy communication of a wirelessly powered network, where an energy-constrained legitimate transmitter (Alice) sends message to a legitimate receiver (Bob) with the energy harvested from a dedicated power beacon, while an eavesdropper (Eve) intends to intercept the information. A simple time-switching protocol with a time-switching ratio α is used to supply power for the energy-constrained legitimate transmitter. To improve the physical layer security, we first propose a protocol that combines maximum ratio transmission with zero-forcing (ZF) jamming for the case without Eve's channel state information (CSI), i.e., Alice has access to Bob's CSI only. Then, we propose a protocol that uses a ZF transmitting strategy to minimize the signal-to-noise ratio (SNR) at Eve for the case that Alice is capable of obtaining partial CSI related to Eve. Closed-form expressions and simple approximations of the connection outage probability and secrecy outage probability are derived for both protocols. Furthermore, the secrecy throughput as well as the diversity orders achieved by our proposed protocols are characterized, and the optimal time-switching ratio α and power allocation coefficient $\beta $ for secrecy throughput maximization are derived in the high SNR regime. Finally, numerical results validate the effectiveness of the proposed schemes.
AB - This paper considers the secrecy communication of a wirelessly powered network, where an energy-constrained legitimate transmitter (Alice) sends message to a legitimate receiver (Bob) with the energy harvested from a dedicated power beacon, while an eavesdropper (Eve) intends to intercept the information. A simple time-switching protocol with a time-switching ratio α is used to supply power for the energy-constrained legitimate transmitter. To improve the physical layer security, we first propose a protocol that combines maximum ratio transmission with zero-forcing (ZF) jamming for the case without Eve's channel state information (CSI), i.e., Alice has access to Bob's CSI only. Then, we propose a protocol that uses a ZF transmitting strategy to minimize the signal-to-noise ratio (SNR) at Eve for the case that Alice is capable of obtaining partial CSI related to Eve. Closed-form expressions and simple approximations of the connection outage probability and secrecy outage probability are derived for both protocols. Furthermore, the secrecy throughput as well as the diversity orders achieved by our proposed protocols are characterized, and the optimal time-switching ratio α and power allocation coefficient $\beta $ for secrecy throughput maximization are derived in the high SNR regime. Finally, numerical results validate the effectiveness of the proposed schemes.
KW - artificial jamming
KW - Physical layer security
KW - wirelessly powered networks
UR - https://www.scopus.com/pages/publications/85040617174
U2 - 10.1109/TCOMM.2017.2732449
DO - 10.1109/TCOMM.2017.2732449
M3 - Article
AN - SCOPUS:85040617174
SN - 0090-6778
VL - 65
SP - 4996
EP - 5008
JO - IEEE Transactions on Communications
JF - IEEE Transactions on Communications
IS - 11
M1 - 7994635
ER -