Home > Research > Publications & Outputs > Improving Secrecy Performance of a Wirelessly P...

Electronic data

  • czc_lucie_edits with eqns

    Accepted author manuscript, 406 KB, PDF document

    Available under license: CC BY: Creative Commons Attribution 4.0 International License

Links

Text available via DOI:

View graph of relations

Improving Secrecy Performance of a Wirelessly Powered network

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Published

Standard

Improving Secrecy Performance of a Wirelessly Powered network. / Chen, Zhuo; Hadley, Lucinda; Ding, Zhiguo et al.
In: IEEE Transactions on Communications, Vol. 65, No. 11, 01.11.2017, p. 4996-5008.

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Harvard

Chen, Z, Hadley, L, Ding, Z & Dai, X 2017, 'Improving Secrecy Performance of a Wirelessly Powered network', IEEE Transactions on Communications, vol. 65, no. 11, pp. 4996-5008. https://doi.org/10.1109/TCOMM.2017.2732449

APA

Chen, Z., Hadley, L., Ding, Z., & Dai, X. (2017). Improving Secrecy Performance of a Wirelessly Powered network. IEEE Transactions on Communications, 65(11), 4996-5008. https://doi.org/10.1109/TCOMM.2017.2732449

Vancouver

Chen Z, Hadley L, Ding Z, Dai X. Improving Secrecy Performance of a Wirelessly Powered network. IEEE Transactions on Communications. 2017 Nov 1;65(11):4996-5008. Epub 2017 Jul 27. doi: 10.1109/TCOMM.2017.2732449

Author

Chen, Zhuo ; Hadley, Lucinda ; Ding, Zhiguo et al. / Improving Secrecy Performance of a Wirelessly Powered network. In: IEEE Transactions on Communications. 2017 ; Vol. 65, No. 11. pp. 4996-5008.

Bibtex

@article{8134dd73e3f94082afb83abd4577a590,
title = "Improving Secrecy Performance of a Wirelessly Powered network",
abstract = "This paper considers the secrecy communication of a wirelessly powered network,where an energy constrained legitimate transmitter (Alice) sends message to a legitimate receiver (Bob) with the energy harvested from a dedicated power beacon (PB), while an eavesdropper (Eve) intends to intercept the information. A simple time-switching protocol with a time-switching ratio $\alpha$ is used to supply power for the energy constrained legitimate transmitter. To improve the physical layer security,we firstly propose a protocol that combines maximum ratio transmission (MRT) with zero-forcing (ZF) jamming for the case where Eve is passive in the network, so that Alice only has access to the channel state information (CSI) of Bob. Then we propose a protocol that uses a ZF transmitting strategy to minimize the signal-to-noise ratio (SNR) at Eve for the case where Eve is active in the network, so that Alice only has access to the partial CSI of Eve. Closed-form expressions and simple approximations of the connection outage probability and secrecy outage probability are derived for both protocols. Furthermore, the secrecy throughput as well as the diversity orders achieved by our proposed protocols are characterized and the optimal time-switching ratio $\alpha$ and power allocation coefficient $\beta$ for secrecy throughput maximization are derived in the high SNR regime. Finally, numerical results validate the effectiveness of the proposed schemes.",
author = "Zhuo Chen and Lucinda Hadley and Zhiguo Ding and Xuchu Dai",
year = "2017",
month = nov,
day = "1",
doi = "10.1109/TCOMM.2017.2732449",
language = "English",
volume = "65",
pages = "4996--5008",
journal = "IEEE Transactions on Communications",
issn = "0090-6778",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
number = "11",

}

RIS

TY - JOUR

T1 - Improving Secrecy Performance of a Wirelessly Powered network

AU - Chen, Zhuo

AU - Hadley, Lucinda

AU - Ding, Zhiguo

AU - Dai, Xuchu

PY - 2017/11/1

Y1 - 2017/11/1

N2 - This paper considers the secrecy communication of a wirelessly powered network,where an energy constrained legitimate transmitter (Alice) sends message to a legitimate receiver (Bob) with the energy harvested from a dedicated power beacon (PB), while an eavesdropper (Eve) intends to intercept the information. A simple time-switching protocol with a time-switching ratio $\alpha$ is used to supply power for the energy constrained legitimate transmitter. To improve the physical layer security,we firstly propose a protocol that combines maximum ratio transmission (MRT) with zero-forcing (ZF) jamming for the case where Eve is passive in the network, so that Alice only has access to the channel state information (CSI) of Bob. Then we propose a protocol that uses a ZF transmitting strategy to minimize the signal-to-noise ratio (SNR) at Eve for the case where Eve is active in the network, so that Alice only has access to the partial CSI of Eve. Closed-form expressions and simple approximations of the connection outage probability and secrecy outage probability are derived for both protocols. Furthermore, the secrecy throughput as well as the diversity orders achieved by our proposed protocols are characterized and the optimal time-switching ratio $\alpha$ and power allocation coefficient $\beta$ for secrecy throughput maximization are derived in the high SNR regime. Finally, numerical results validate the effectiveness of the proposed schemes.

AB - This paper considers the secrecy communication of a wirelessly powered network,where an energy constrained legitimate transmitter (Alice) sends message to a legitimate receiver (Bob) with the energy harvested from a dedicated power beacon (PB), while an eavesdropper (Eve) intends to intercept the information. A simple time-switching protocol with a time-switching ratio $\alpha$ is used to supply power for the energy constrained legitimate transmitter. To improve the physical layer security,we firstly propose a protocol that combines maximum ratio transmission (MRT) with zero-forcing (ZF) jamming for the case where Eve is passive in the network, so that Alice only has access to the channel state information (CSI) of Bob. Then we propose a protocol that uses a ZF transmitting strategy to minimize the signal-to-noise ratio (SNR) at Eve for the case where Eve is active in the network, so that Alice only has access to the partial CSI of Eve. Closed-form expressions and simple approximations of the connection outage probability and secrecy outage probability are derived for both protocols. Furthermore, the secrecy throughput as well as the diversity orders achieved by our proposed protocols are characterized and the optimal time-switching ratio $\alpha$ and power allocation coefficient $\beta$ for secrecy throughput maximization are derived in the high SNR regime. Finally, numerical results validate the effectiveness of the proposed schemes.

U2 - 10.1109/TCOMM.2017.2732449

DO - 10.1109/TCOMM.2017.2732449

M3 - Journal article

VL - 65

SP - 4996

EP - 5008

JO - IEEE Transactions on Communications

JF - IEEE Transactions on Communications

SN - 0090-6778

IS - 11

ER -