Abstract

In this paper, we investigate secure communication in a hybrid relay (HR)-assisted wireless powered cooperative communication network (WPCCN), where an eavesdropper tries to intercept the data transmitted by a source user and the HR simultaneously. The HR has the ability to wireless powered the energy-constrained multiple users in the downlink and to relay the received confidential information in the uplink. In particular, the full-duplex destination-based jamming (FD-DBJ) strategy is exploited to improve the secrecy performance. Moreover, in order to conduct effective secure communications, we design two multiuser scheduling schemes, i.e., random user selection (RUS), and best user selection (BUS) based on the main channel quality. In order to evaluate the secrecy performance, we analytically derive the energy outage probability (EOP), the secrecy outage probability (SOP), and the hybrid outage probability (HOP), respectively. As such, we formulate the secrecy throughput (ST) maximization problem to optimize the predetermined transmission rate. Our analysis and numerical results reveal that: 1) The BUS scheme has better security performance. 2) Both of the energy conversion efficiency and the number of users have a positive effect on secrecy performance. 3) The FD-DBJ scheme is an effective method to achieve secure communications. 4) The time-switching factor and predetermined transmission rate have a crucial influence on the secrecy performance, which should be considered carefully in system design.

Highlights

  • We investigate the physical layer security (PLS) in the hybrid relay (HR)-assisted wireless powered cooperative communication network (WPCCN) with FD-destination-based jamming (DBJ) and introduce two secure multiuser scheduling schemes: 1) random user scheduling (RUS), i.e., the source user is selected randomly; 2) best user scheduling (BUS), i.e., an optimal source user is selected to transmit information based on the channel quality between the user and the HR

  • We propose two different multiuser scheduling strategies: one is the random user scheduling (RUS), where the alternative user is selected randomly from the cluster of users for reducing computational complexity; another is the best user scheduling (BUS), where the best user can be determined based on the channel quality of Sn → R for the improvement of the secrecy performance

  • It is because that the RUS scheme randomly selects the source from multiple users for information transmission, which means that the number of sources and the selection scheme are independent of each other

Read more

Summary

INTRODUCTION

In the downlink, the HR powers multiple users based on the WPC technique, while it utilizes the decodeand-forward (DF) relay scheme to help the selected user to forward information in the uplink, which makes the HR as a data fusion center for multiple source nodes to improve the system performance. It is worth noting that above structure has important applications in many energy-limited systems, such as the data uploading network with devices for collecting information in dense environment and WSNs. In order to provide secure data transmission, the destination is equipped with two antennas and works in the FD mode, which can be transmitted the jamming signal to confuse the eavesdropper, and received the confidential information from the legitimate nodes simultaneously, i,e, the FD-DBJ scheme is exploited at the destination1 [43], [44].

ENERGY HARVESTING AND SIGNAL ANALYSIS
SECURE MULTIUSER SCHEDULING SCHEME
SECRECY THROUGHPUT
NUMERICAL RESULTS AND DISCUSSION
CONCLUSION

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.