Adaptive secure wireless information and power transfer in delay-constrained multiuser multi-input single-output networks

被引:0
作者
Lan, Xiaolong [1 ]
Chen, Yang [1 ]
Zhang, Lei [1 ]
He, Junjiang [1 ]
Chen, Qingchun [2 ]
Li, Tao [1 ]
机构
[1] Sichuan Univ, Sch Cyber Sci & Engn, Chengdu 610065, Peoples R China
[2] Guangzhou Univ, Sch Elect & Commun Engn, Guangzhou 510005, Peoples R China
基金
中国博士后科学基金; 中国国家自然科学基金;
关键词
Secrecy rate-harvested energy region; Physical layer security; Wireless energy transfer; MISO network; PHYSICAL-LAYER SECURITY; SECRECY; COMMUNICATION; OPTIMIZATION; SELECTION; DESIGN; NOMA;
D O I
10.1016/j.sigpro.2025.109908
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We focus on the achievable time-averaged secrecy rate-harvested energy region in delay-constrained wireless powered multi-input single-output (MISO) network, where a multi-antenna buffer-aided access point (AP) is supposed to deliver confidential message to multiple single-antenna users. When a user is scheduled for receiving messages from the AP, other users are assumed to be potential eavesdroppers and can harvest energy from their received radio signal. To this end, the time-averaged secrecy rate-energy region maximization problem was formulated subject to constraints on average queuing delay and average power consumption. On this basis, a delay-aware adaptive secure transmission (DAAST) scheme is presented to enhance the achieved time-averaged secrecy rate-energy region effectively by jointly optimizing the confidential information and artificial noise signal beams, the user scheduling, and the flow control, while strictly guaranteeing the average queuing delay requirements of all users. Numerical results demonstrate that, by fully exploiting the potential of data buffers, the DAAST scheme is an asymptotically optimal scheme, which can arbitrarily approach the optimal solution.
引用
收藏
页数:18
相关论文
共 38 条
[1]  
[Anonymous], 2003, Dynamic Power Allocation and Routing for Satellite and Wireless Networks with Time Varying Channels
[2]   Improving Physical Layer Security of Uplink NOMA via Energy Harvesting Jammers [J].
Cao, Kunrui ;
Wang, Buhong ;
Ding, Haiyang ;
Lv, Lu ;
Dong, Runze ;
Cheng, Tianhao ;
Gong, Fengkui .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 :786-799
[3]   Physical Layer Security in Three-Tier Wireless Sensor Networks: A Stochastic Geometry Approach [J].
Deng, Yansha ;
Wang, Lifeng ;
Elkashlan, Maged ;
Nallanathan, Arumugam ;
Mallik, Ranjan K. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (06) :1128-1138
[4]   Fast secrecy rate optimization for MIMO wiretap channels in the presence of a multiple-antenna eavesdropper [J].
Fan, Linhui ;
Tang, Bo ;
Jiang, Qiuxi .
SIGNAL PROCESSING, 2021, 178
[5]   Exploiting Direct Links for Physical Layer Security in Multiuser Multirelay Networks [J].
Fan, Lisheng ;
Yang, Nan ;
Duong, Trung Q. ;
Elkashlan, Maged ;
Karagiannidis, George K. .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (06) :3856-3867
[6]  
Georgiadis Leonidas, 2006, Foundations and Trends in Networking, V1, P1, DOI 10.1561/1300000001
[7]   Cross-Layer Rate Control and Resource Allocation in Spectrum-Sharing OFDMA Small-Cell Networks With Delay Constraints [J].
Guo, Yashuang ;
Yang, Qinghai ;
Liu, Jiayi ;
Kwak, Kyung Sup .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2017, 66 (05) :4133-4147
[8]   Link Selection for Security-QoS Tradeoffs in Buffer-Aided Relaying Networks [J].
He, Ji ;
Liu, Jia ;
Shen, Yulong ;
Jiang, Xiaohong ;
Shiratori, Norio .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 :1347-1362
[9]   Cooperative Jamming for Physical Layer Security Enhancement in Internet of Things [J].
Hu, Lin ;
Wen, Hong ;
Wu, Bin ;
Pan, Fei ;
Liao, Run-Fa ;
Song, Huanhuan ;
Tang, Jie ;
Wang, Xiumin .
IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (01) :219-228
[10]   Multi-Agent Reinforcement Learning-Based Buffer-Aided Relay Selection in IRS-Assisted Secure Cooperative Networks [J].
Huang, Chong ;
Chen, Gaojie ;
Wong, Kai-Kit .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 :4101-4112