Abstract
This paper investigates the secrecy performance of a power splitting-based simultaneous wireless information and power transfer cooperative relay network in the presence of an eavesdropper. The relay is considered to operate in full-duplex (FD) mode to perform both energy harvesting and information decoding simultaneously. To accomplish that, the relay is assumed to employ two rechargeable batteries, which switch between power supplying mode and charging mode at each transmission block. We also assume that the self-interference inherent of the FD mode is not completely suppressed. Therefore, it is assumed that, after some stages of passive and active self-interference cancellation, there is still a residual self-interference (RSI). A portion of this RSI (remaining after passive cancellation) is recycled for energy harvesting. In order to improve the system secrecy performance, it is considered that the relay can split its transmit power to send the information signal and to emit a jamming signal to degrade the eavesdropper’s channel. The secrecy performance is evaluated in terms of the secrecy outage probability and the optimal secrecy throughput. Tight-approximate and asymptotic expressions are obtained for the secrecy outage probability, and the particle swarm optimization method is employed for addressing the secrecy throughput optimization problem. From numerical results, we show that the secrecy performance can be increased depending on the self-energy recycling channel condition. Finally, our derived expressions are validated via Monte Carlo simulations.
Highlights
A S the large-scale deployment of the fifth-generation (5G) wireless networks go forward, explosive growth in the number of connected devices across multiple global sectors is expected
HIGH signalto-noise ratio (SNR) SLOPE AND POWER OFFSET To gain a better insight into the behaviour of the average secrecy capacity at high SNR, we evaluate the high SNR
We present a performance comparison between the particle swarm optimization (PSO) algorithm against built-in routines, namely, NMaxi
Summary
A S the large-scale deployment of the fifth-generation (5G) wireless networks go forward, explosive growth in the number of connected devices across multiple global sectors is expected. Providing 5G and beyond networks with security and privacy is a VOLUME 4, 2016 significant concern and a challenging task, especially when considered the constrained resources in different use cases of machine-type communications (MTCs) [1]. In this sense, traditional cryptography-based techniques, carried out at upper layers, might not be capable of compelling with several MTC use cases’ requirements. A new approach, referred to as physical layer security (PLS), has emerged as a promising candidate to enhance wireless networks’ security [2], [3].
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.