Secrecy Performance Optimization for Wireless Powered Communication Networks With an Energy Harvesting Jammer
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Moon, Jihwan | - |
dc.contributor.author | Lee, Hoon | - |
dc.contributor.author | Song, Changick | - |
dc.contributor.author | Lee, Inkyu | - |
dc.date.accessioned | 2021-09-03T10:21:40Z | - |
dc.date.available | 2021-09-03T10:21:40Z | - |
dc.date.created | 2021-06-16 | - |
dc.date.issued | 2017-02 | - |
dc.identifier.issn | 0090-6778 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/84759 | - |
dc.description.abstract | In this paper, we consider a wireless powered communication network with an energy harvesting (EH) jammer where eavesdroppers try to wiretap the communication between users and a hybrid access-point (H-AP). In our system, the H-AP first transmits an energy signal to recharge the batteries of the EH users and the EH jammer in the energy transfer (ET) phase. Then, in the subsequent information transfer (IT) phase, each user sends information to the H-AP in a time division multiple access manner, while the jammer generates jamming signals to interfere the eavesdroppers. We adopt two different secrecy performance measurements according to the level of channel state information (CSI) of the eavesdroppers. First, with a single user, we maximize the secrecy rate by optimizing the time allocation between the ET and the IT phase when perfect CSI of the eavesdroppers is available at all nodes. In contrast, when the instantaneous CSI of the eavesdroppers is not available at legitimate nodes, we analyze and minimize the secrecy outage probability. We also extend the single user analysis to a more general multi-user situation with an additional consideration of the transmit power allocation at the jammer. Finally, we evaluate the performance of our proposed solutions through simulations and demonstrate that a performance gain compared to conventional schemes becomes more pronounced with the increased number of eavesdroppers and users. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC | - |
dc.subject | PHYSICAL LAYER SECURITY | - |
dc.subject | INFORMATION | - |
dc.subject | NOISE | - |
dc.title | Secrecy Performance Optimization for Wireless Powered Communication Networks With an Energy Harvesting Jammer | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Lee, Inkyu | - |
dc.identifier.doi | 10.1109/TCOMM.2016.2623627 | - |
dc.identifier.scopusid | 2-s2.0-85013459746 | - |
dc.identifier.wosid | 000395825300023 | - |
dc.identifier.bibliographicCitation | IEEE TRANSACTIONS ON COMMUNICATIONS, v.65, no.2, pp.764 - 774 | - |
dc.relation.isPartOf | IEEE TRANSACTIONS ON COMMUNICATIONS | - |
dc.citation.title | IEEE TRANSACTIONS ON COMMUNICATIONS | - |
dc.citation.volume | 65 | - |
dc.citation.number | 2 | - |
dc.citation.startPage | 764 | - |
dc.citation.endPage | 774 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordPlus | PHYSICAL LAYER SECURITY | - |
dc.subject.keywordPlus | INFORMATION | - |
dc.subject.keywordPlus | NOISE | - |
dc.subject.keywordAuthor | Physical-layer security | - |
dc.subject.keywordAuthor | coopeartive jammer | - |
dc.subject.keywordAuthor | artificial noise (AN) | - |
dc.subject.keywordAuthor | energy harvesting (EH) | - |
dc.subject.keywordAuthor | wireless powered communication networks (WPCN) | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.