Abstract

This paper investigates a secure wireless-powered sensor network (WPSN) with the aid of a cooperative jammer (CJ). A power station (PS) wirelessly charges for a user equipment (UE) and the CJ to securely transmit information to an access point (AP) in the presence of multiple eavesdroppers. Also, the CJ are deployed, which can introduce more interference to degrade the performance of the malicious eavesdroppers. In order to improve the secure performance, we formulate an optimization problem for maximizing the secrecy rate at the AP to jointly design the secure beamformer and the energy time allocation. Since the formulated problem is not convex, we first propose a global optimal solution which employs the semidefinite programming (SDP) relaxation. Also, the tightness of the SDP relaxed solution is evaluated. In addition, we investigate a worst-case scenario, where the energy time allocation is achieved in a closed form. Finally, numerical results are presented to confirm effectiveness of the proposed scheme in comparison to the benchmark scheme.

Highlights

  • Internet of things (IoT) has been considered one of the appealing paradigms for future wireless network which significantly improves massive connectivity for the sensor devices [1]

  • All of eavesdroppers are located at ðXE,k, YE,kÞ = ð30, n ∗ l/2Þ when n = 1, ⋯, 2 ∗ k + 1, or ðXE,k, YE,kÞ = ð30,−ðn − 1Þ ∗ k/2Þ when n = 2, ⋯, 2 ∗ k, where l denotes the interval between two neighbouring eavesdroppers

  • The channel coefficient is composed of distance-dependent path loss model and small-scale fading, where the path loss model is set to PL = Ad−κ, where A = 10−3, κ is the path loss exponent, and d represents the distance between any two devices, i.e., the power station (PS) and user equipment (UE), the PS and the cooperative jammer (CJ), the UE and the access point (AP), the UE and the eavesdroppers, and the CJ and the eavesdroppers

Read more

Summary

Introduction

Internet of things (IoT) has been considered one of the appealing paradigms for future wireless network which significantly improves massive connectivity for the sensor devices [1]. The IoT devices suffer from energyconstrained issues. In this case, the devices in an IoT network will disconnect the IoT server due to limited battery size in this low-energy consumption nature. Reliable data transmission for IoT networks has become increasingly important, especially in various civilian and military applications. For secured IoT networks, the IoT devices guarantee a reliable connection with the access point to safeguard the private information, such as credit card transaction, online personal data, and military intelligent transmissions [3]. Physical layer security has been developed to provide the secrecy capacity metric by exploiting information-theoretical fundamentals [3]. A variety of resource allocation algorithms have been developed in physical layer security scenarios to improve

Objectives
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.