Home > Research > Publications & Outputs > Secrecy Wireless-Powered Sensor Networks for In...

Links

Text available via DOI:

View graph of relations

Secrecy Wireless-Powered Sensor Networks for Internet of Things

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Published

Standard

Secrecy Wireless-Powered Sensor Networks for Internet of Things. / Li, J.; Zhao, H.; Chen, X. et al.
In: Wireless Communications and Mobile Computing, Vol. 2020, 8859264, 22.09.2020.

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Harvard

Li, J, Zhao, H, Chen, X, Chu, Z, Zhen, L, Jiang, J & Pervaiz, H 2020, 'Secrecy Wireless-Powered Sensor Networks for Internet of Things', Wireless Communications and Mobile Computing, vol. 2020, 8859264. https://doi.org/10.1155/2020/8859264

APA

Li, J., Zhao, H., Chen, X., Chu, Z., Zhen, L., Jiang, J., & Pervaiz, H. (2020). Secrecy Wireless-Powered Sensor Networks for Internet of Things. Wireless Communications and Mobile Computing, 2020, Article 8859264. https://doi.org/10.1155/2020/8859264

Vancouver

Li J, Zhao H, Chen X, Chu Z, Zhen L, Jiang J et al. Secrecy Wireless-Powered Sensor Networks for Internet of Things. Wireless Communications and Mobile Computing. 2020 Sept 22;2020:8859264. doi: 10.1155/2020/8859264

Author

Li, J. ; Zhao, H. ; Chen, X. et al. / Secrecy Wireless-Powered Sensor Networks for Internet of Things. In: Wireless Communications and Mobile Computing. 2020 ; Vol. 2020.

Bibtex

@article{2fdafb2e3d8c4591bf309b9a78774141,
title = "Secrecy Wireless-Powered Sensor Networks for Internet of Things",
abstract = "This paper investigates a secure wireless-powered sensor network (WPSN) with the aid of a cooperative jammer (CJ). A power station (PS) wirelessly charges for a user equipment (UE) and the CJ to securely transmit information to an access point (AP) in the presence of multiple eavesdroppers. Also, the CJ are deployed, which can introduce more interference to degrade the performance of the malicious eavesdroppers. In order to improve the secure performance, we formulate an optimization problem for maximizing the secrecy rate at the AP to jointly design the secure beamformer and the energy time allocation. Since the formulated problem is not convex, we first propose a global optimal solution which employs the semidefinite programming (SDP) relaxation. Also, the tightness of the SDP relaxed solution is evaluated. In addition, we investigate a worst-case scenario, where the energy time allocation is achieved in a closed form. Finally, numerical results are presented to confirm effectiveness of the proposed scheme in comparison to the benchmark scheme. {\textcopyright} 2020 Junxia Li et al.",
keywords = "Internet of things, Wireless sensor networks, Formulated problems, Global optimal solutions, Numerical results, Optimization problems, Power station, Semi-definite programming, User equipments, Worst case scenario, Network security",
author = "J. Li and H. Zhao and X. Chen and Z. Chu and L. Zhen and J. Jiang and H. Pervaiz",
year = "2020",
month = sep,
day = "22",
doi = "10.1155/2020/8859264",
language = "English",
volume = "2020",
journal = "Wireless Communications and Mobile Computing",
issn = "1530-8669",
publisher = "John Wiley and Sons Ltd",

}

RIS

TY - JOUR

T1 - Secrecy Wireless-Powered Sensor Networks for Internet of Things

AU - Li, J.

AU - Zhao, H.

AU - Chen, X.

AU - Chu, Z.

AU - Zhen, L.

AU - Jiang, J.

AU - Pervaiz, H.

PY - 2020/9/22

Y1 - 2020/9/22

N2 - This paper investigates a secure wireless-powered sensor network (WPSN) with the aid of a cooperative jammer (CJ). A power station (PS) wirelessly charges for a user equipment (UE) and the CJ to securely transmit information to an access point (AP) in the presence of multiple eavesdroppers. Also, the CJ are deployed, which can introduce more interference to degrade the performance of the malicious eavesdroppers. In order to improve the secure performance, we formulate an optimization problem for maximizing the secrecy rate at the AP to jointly design the secure beamformer and the energy time allocation. Since the formulated problem is not convex, we first propose a global optimal solution which employs the semidefinite programming (SDP) relaxation. Also, the tightness of the SDP relaxed solution is evaluated. In addition, we investigate a worst-case scenario, where the energy time allocation is achieved in a closed form. Finally, numerical results are presented to confirm effectiveness of the proposed scheme in comparison to the benchmark scheme. © 2020 Junxia Li et al.

AB - This paper investigates a secure wireless-powered sensor network (WPSN) with the aid of a cooperative jammer (CJ). A power station (PS) wirelessly charges for a user equipment (UE) and the CJ to securely transmit information to an access point (AP) in the presence of multiple eavesdroppers. Also, the CJ are deployed, which can introduce more interference to degrade the performance of the malicious eavesdroppers. In order to improve the secure performance, we formulate an optimization problem for maximizing the secrecy rate at the AP to jointly design the secure beamformer and the energy time allocation. Since the formulated problem is not convex, we first propose a global optimal solution which employs the semidefinite programming (SDP) relaxation. Also, the tightness of the SDP relaxed solution is evaluated. In addition, we investigate a worst-case scenario, where the energy time allocation is achieved in a closed form. Finally, numerical results are presented to confirm effectiveness of the proposed scheme in comparison to the benchmark scheme. © 2020 Junxia Li et al.

KW - Internet of things

KW - Wireless sensor networks

KW - Formulated problems

KW - Global optimal solutions

KW - Numerical results

KW - Optimization problems

KW - Power station

KW - Semi-definite programming

KW - User equipments

KW - Worst case scenario

KW - Network security

U2 - 10.1155/2020/8859264

DO - 10.1155/2020/8859264

M3 - Journal article

VL - 2020

JO - Wireless Communications and Mobile Computing

JF - Wireless Communications and Mobile Computing

SN - 1530-8669

M1 - 8859264

ER -