Abstract

This paper investigates the secrecy performance of a wireless-powered two-way relay network in the presence of an eavesdropper. Based on adaptive time allocation (TA) and power splitting (PS), a novel secure relaying protocol is proposed. For the purpose of secrecy capacity maximization, the optimal TA ratio and PS ratio, which are adaptively adjusted according to instantaneous channel state information, are derived in high signal-to-noise ratio regime through a split-step iterative method. Numerical results show that in the case of unknown wiretap channels, the proposed protocol can also obtain near-optimal secrecy capacity. Moreover, the proposed protocol has better secrecy capacity performance than the PS relaying protocol in various scenarios.

Highlights

  • Energy harvesting (EH) is considered as an effective way to extend the lifetime of various energy-constrained wireless networks [1]

  • In [7] and [8], a joint time allocation (TA) and power splitting (PS) scheme (JTAPS) was proposed in decode-and-forward (DF) and amplify-andforward (AF) relaying systems respectively, and it was shown that the performance of the outage probability in JTAPS outperformed the hybrid protocol in [6]

  • Secrecy capacity of the proposed secure JTAPS protocol is analyzed under various scenarios

Read more

Summary

INTRODUCTION

Energy harvesting (EH) is considered as an effective way to extend the lifetime of various energy-constrained wireless networks [1]. In [9] and [10], the TSR and PSR schemes for EH two-step TWR networks were investigated, respectively, and the achievable throughput was analyzed. Physical layer security has aroused great concern in relaying networks due to the vulnerability of wireless networks [14]–[17] In this regard, secrecy capacity for PSR and TSR protocols was analyzed in [14] for oneway untrusted relaying networks, where it was confirmed that PSR outperforms TSR. The optimal TSR and PSR were analyzed for the maximization of the achievable secrecy capacity in two-way networks [16].

SYSTEM MODEL
NUMERICAL RESULTS AND DISCUSSIONS
CONCLUSION

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.