Physical Layer Secure Transmission in RF-Powered Energy Harvesting Untrusted Relay Networks
YANG Wei-wei1, CHEN Jian1, CHEN De-chuan1,2,3
1. College of Communication Engineering, Army Engineering University of PLA, Nanjing, Jiangsu 210007, China;
2. Wu Han Zhong Yuan Electronics Group Co., Ltd., Wuhan, Hubei 430010, China;
3. Wu Han Zhong Yuan Communication Co., Ltd., Wuhan, Hubei 430205, China
Abstract:Wireless energy harvesting is regarded as a promising energy supply alternative for energy-constrained wireless networks.In this paper,we investigate secure transmission in RF-powered energy harvesting relay networks,where an energy-constrained relay is untrusted.Considering that the energy-constrained relay can harvest energy from RF signals to forward the confidential messages,the source node with multiple antenna employs transmit antenna selection (TAS) to enhance the energy harvesting efficiency of the relay,and the destination node employs artificial interference to enhance security.Closed-form expressions of the secrecy outage probability,connection outage probability and secrecy throughput have been derived.Numerical results verify the accuracy of analytical expressions,and reveal the influence of the system parameters on the secrecy performance.
[1] Varshney L R.Transporting information and energy simultaneously[A].in Proc.IEEE ISIT[C],Toronto,on,Canada,Jul.2008.1612-1616.
[2] Grover P,Sahai A.Shannon meets Tesla:Wireless information and power transfer[A].in Proc.IEEE Int.Symp.Inf.Theory[C],Austin,TX,USA,Jun.13-18,2010.2363-2367.
[3] Zhou X,Zhang R,Ho C K.Wireless information and power transfer:Architecture design and rate-energy tradeoff[J]. IEEE Trans.Commun.,Nov.2013,61(11):4754-4767.
[4] Nasir A A,Zhou X,Durrani S,Kennedy R A.Relaying protocols for wireless energy harvesting and information processing[J].IEEE Trans.Wireless Commun.,July 2013,12(7):3622-3636.
[5] Ding Z,Perlaza S M,Esnaola I,Poor H V.Power allocation strategies in energy harvesting wireless cooperative networks[J]. IEEETrans.Wireless Commun.,Feb.2014,13(2):846-860.
[6] Nasir A A,Zhou X,Durrani S,Kennedy R A.Wireless-powered relays in cooperative communications:Time-switching relaying protocol and throughput analysis[J]. IEEE Trans.Commun.,May 2015,63(5):1607-1622.
[7] Xing H,Liu L,Zhang R.Secrecy wireless information and power transfer in fading wiretap channel[J].IEEE Trans.Veh.Technol.,Jan.2016,65(1):180-190.
[8] Shi Q,Xu W,Wu J,Song E,Wang Y.Secure beamforming for MIMO broadcasting with wireless information and power transfer[J]. IEEE Trans.Wireless Commun.,May 2015,14(5):2841-2853.
[9] Li Q,Zhang Q,Qin J.Secure relay beamforming for simultaneous wireless information and power transfer in non-regenerative relay networks[J].IEEE Trans.Veh.Technol.,June 2014,63(5):2462-2467.
[10] Yang W,Tao L,et al.Secure on-off transmission in mmWave systems with randomly distributed eavesdroppers[J]. IEEE Access,Dec.2019,7(1):32681-32692.
[11] Xiang Z,Yang W,Pan G,Cai Y,Song Y.Physical layer security in cognitive radio inspired NOMA network[J].IEEE J.Sel.Topics in Signal Process,2019,13(3):1-14,Early Access,doi:10.1109/jstsp.2019.2902103.
[12] Sun X,Yang W,et al.Secure transmissions in wireless information and power transfer millimeter wave ultra-dense networks," IEEE Trans.Inf.Forensics Secur.,1-13,2018,Early Access,doi:10.1109/tifs.2018.2885286.
[13] Kalamkar S S,Banerjee A.Secure communication via a wireless energy harvesting untrusted relay[J].IEEE Trans.Veh.Technol.,Mar.2017,66(3):2199-2213.
[14] Gradshteyn I S,Ryzhik I M.Table of Integrals,Series,and Products[M].Academic Press,8th ed.,2015.