Abstract

We investigate secure communications in untrusted energy harvesting relay networks, where the amplify-and-forward relay is an energy constrained node powered by the received radio frequency signals, and try to unauthorizedly decode the confidential information from the source. The secrecy outage probability and connection outage probability are respectively derived in closed-form to evaluate the security and reliability for three energy harvesting strategies, for example, time switching relaying strategy, power splitting relaying strategy, and ideal relaying receiver strategy. Subsequently, the effective secrecy throughput is conducted to characterize the overall efficiency, and the asymptotic analysis of the secrecy throughput is given to determine the optimal energy harvesting strategies in different operating regimes. Furthermore, in order to achieve the optimal effective secrecy throughput performance, a switching threshold between time switching relaying and power splitting relaying is designed. Numerical results verify the accuracy of the analytical expressions and reveal that the effective secrecy throughput of the system can be effectively promoted by the threshold switching energy harvesting strategy.

Highlights

  • With rapid advance in wireless technologies and proliferation in relevant services and applications, the problem of energy depletion has received significantly attention recently

  • In sections ‘‘time switching relaying (TSR) strategy,’’ ‘‘power splitting relaying (PSR) strategy,’’ and ‘‘ideal relaying receiver (IRR) strategy,’’ we respectively introduce the numerical expressions of our performance analysis for the TSR, PSR, and IRR strategies, including the secrecy outage probability (SOP), connection outage probability (COP), and effective secrecy throughput (EST)

  • In the aforementioned PSR strategy, the received power at the relay splits in r : 1 À r proportion, such that the fraction r of the received signal power is used for energy harvesting, and the remaining power 1 À r portion is used for information transmission

Read more

Summary

Introduction

With rapid advance in wireless technologies and proliferation in relevant services and applications, the problem of energy depletion has received significantly attention recently. We derive the COP, SOP, and EST for the three energy harvesting relaying strategies.

Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.