Abstract
In this paper, we consider the secure green-oriented multiuser scheduling for the wireless-powered Internet of Things (IoT) scenario, in which multiple source sensors communicate with a controller assisted by an intermediate sensor with the existence of a passive tapping device. Due to the limited energy, all sensors must acquire energy from external power beacons (PBs). Specifically, for the security improvement, we introduce two multiuser scheduling schemes possessing the optimal PB chosen by the relay, i.e., the best source sensor is scheduled in a random way (BSR), while the best source sensor is decided by the best PB (BSBP). Furthermore, for every scheme, we derive the analytical expressions for the secrecy outage probability (SOP) and investigate the secure energy efficiency (SEE) optimization problem with constricted transmission power in PBs. Simulation results reveal that the BSBP scheme provides better secrecy performance, and elevating the PBs quantity or reducing both the ratio of distance from PBs to source users and the total communication distance to some extent is helpful for improving SEE. In addition, the time-switching factor shows an important effect upon secrecy performance of the considered system.
Highlights
As the key architecture of the fth generation (5G) mobile communication system, the Internet of ings (IoT) has attracted more and more attention [1]. e primary driving thought for the prospective IoT has relation with smart sensors, and wireless sensor networks (WSNs) have been observed as key enablers of IoT applications recently, where multiple sensor nodes are caused by instant or periodic data acquisition in multiple environments [2]
Enlightened by the aforementioned observations, this paper focuses on the secrecy performance analysis of a typical wireless-powered IoT, in which multiple source sensors that perform monitoring or operating tasks in a localized group and an intermediate node performs as relay are powered by multiple dedicated power beacons (PBs)
We propose two multiuser scheduling schemes and compare their secrecy performance for providing the secure energy-efficient transmissions. e main contributions of our work are listed as follows: (i) We explore the physical layer security (PLS) in the wireless-powered IoT and propose two green-oriented multiuser scheduling schemes, in which the optimal PB is decided by the relay; the best source is scheduled in a random way (BSR) or chosen by the best PB (BSBP), respectively
Summary
As the key architecture of the fth generation (5G) mobile communication system, the Internet of ings (IoT) has attracted more and more attention [1]. e primary driving thought for the prospective IoT has relation with smart sensors, and wireless sensor networks (WSNs) have been observed as key enablers of IoT applications recently, where multiple sensor nodes are caused by instant or periodic data acquisition in multiple environments [2]. Enlightened by the aforementioned observations, this paper focuses on the secrecy performance analysis of a typical wireless-powered IoT, in which multiple source sensors that perform monitoring or operating tasks in a localized group and an intermediate node performs as relay are powered by multiple dedicated PBs. we propose two multiuser scheduling schemes and compare their secrecy performance for providing the secure energy-efficient transmissions. (i) We explore the PLS in the wireless-powered IoT and propose two green-oriented multiuser scheduling schemes, in which the optimal PB is decided by the relay; the best source is scheduled in a random way (BSR) or chosen by the best PB (BSBP), respectively. The duration between two successive data transmission is defined as a transfer time slot T, αT denotes the time of WPT, and (1 − α)T represents the duration of WIT as
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.