Secure Information Transmissions in Wireless-Powered Cognitive Radio Networks for Internet of Medical Things

被引:0
作者
Tang, Kun [1 ,2 ]
Tang, Wenjuan [3 ]
Luo, Entao [2 ]
Tan, Zhiyuan [4 ]
Meng, Weizhi [5 ]
Qi, Lianyong [6 ]
机构
[1] Guangdong Provincial Key Laboratory of Millimeter-Wave and Terahertz, School of Electronic and Information Engineering, South China University of Technology, Guangzhou,510641, China
[2] School of Electronics and Information Engineering, Hunan University of Science and Engineering, Yongzhou,425000, China
[3] College of Computer Science and Electronic Engineering, Hunan University, Changsha,410082, China
[4] School of Computing, Edinburgh Napier University, Edinburgh,EH11 4BN, United Kingdom
[5] Department of Applied Mathematics and Computer Science, Technical University of Denmark, Kongens Lyngby, Lyngby,2800, Denmark
[6] School of Information Science and Engineering, Qufu Normal University, Rizhao,276826, China
基金
中国博士后科学基金;
关键词
Secure communication - Convex optimization - Cognitive radio - Medical information systems - Antennas - Network security - Radio transmission - Transmitters - Beamforming;
D O I
暂无
中图分类号
学科分类号
摘要
In this paper, we consider the issue of the secure transmissions for the cognitive radio-based Internet of Medical Things (IoMT) with wireless energy harvesting. In these systems, a primary transmitter (PT) will transmit its sensitive medical information to a primary receiver (PR) by a multi-antenna-based secondary transmitter (ST), where we consider that a potential eavesdropper may listen to the PT's sensitive information. Meanwhile, the ST also transmits its own information concurrently by utilizing spectrum sharing. We aim to propose a novel scheme for jointly designing the optimal parameters, i.e., energy harvesting (EH) time ratio and secure beamforming vectors, for maximizing the primary secrecy transmission rate while guaranteeing secondary transmission requirement. For solving the nonconvex optimization problem, we transfer the problem into convex optimization form by adopting the semidefinite relaxation (SDR) method and Charnes-Cooper transformation technique. Then, the optimal secure beamforming vectors and energy harvesting duration can be obtained easily by utilizing the CVX tools. According to the simulation results of secrecy transmission rate, i.e., secrecy capacity, we can observe that the proposed protocol for the considered system model can effectively promote the primary secrecy transmission rate when compared with traditional zero-forcing (ZF) scheme, while ensuring the transmission rate of the secondary system. © 2020 Kun Tang et al.
引用
收藏
相关论文
empty
未找到相关数据