Abstract

This article is focused on implementing simultaneous wireless information and power transmission as a physical layer security measure by using artificial noise. A series of high energy precoded symbols is simultaneously transmitted along with the information symbols over a Rayleigh frequency selective fading channel. The high energy precoded symbols act as an artificial noise for the eavesdroppers. The energy symbols are precoded on the basis of a legitimate user’s channel matrix to form a null space vector, which eliminates the interference of energy symbols at the information symbol receiver antennas, while allowing the rectenna to harvest energy from the superimposed information and energy symbols. We analyze the secrecy rate and error rate performance at the receiver under different circumstances, and we show that the performance of the legitimate user can be improved by using the iterative block decision feedback equalization method at the receiver.

Highlights

  • In a dense wireless communication network (WCN), both the energy and security reliability need to be assured

  • The system adopted the 4-quadrature amplitude modulation (QAM) signal with K = 256 and L = 200, and the iterative block decision feedback equalization (IB-DFE) receiver was used in R and ξ to improve their error rate performance

  • We considered different case studies by assuming that the eavesdropper had high channel correlation improve, when signal-to-noise plus interference ratio (SINR) is greater than 20 dBm because R(b) experience precoding error due to channel with the legitimate user

Read more

Summary

Introduction

In a dense wireless communication network (WCN), both the energy and security reliability need to be assured. One of the most important techniques in improving PLS in a wiretap channel is using artificial noise (AN) in the communication channel to degrade the signal-to-noise plus interference ratio (SINR) of eavesdroppers; thereby improving the security of legitimate users [6]. The successful negation of AN is dependent on the channel state information (CSI) of the receiver at the legitimate transmitter and can be effectively used against very robust eavesdroppers as in [12,13]. This is considered as a challenge in the imperfect CSI condition [14,15]. The variables associated with the frequency domain and time domain are denoted by capital letters and small letters, respectively. (.)∗ , (.) T , (.) H , ||.||, and E[.] denote the conjugate, transpose, Hermitian, trace, and expectation operation, respectively

System Model
System model
Secrecy Rate Analysis
I at R is given as:
Numerical Results
BER performance of R
10. The results has more than dBm
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call