Securing Multiuser Communications via an Energy Harvesting Node: Jammer or Relay?

被引:8
作者
Li, Bin [1 ,2 ]
Yang, Zhen [3 ]
Zou, Yulong [3 ]
Zhu, Jia [1 ]
Cao, Weifeng [1 ]
Shi, Chenguang [2 ]
机构
[1] Nanjing Univ Posts & Telecommun, Sch Telecommun & Informat Engn, Nanjing 210003, Peoples R China
[2] Nanjing Univ Aeronaut & Astronaut, Key Lab Radar Imaging & Microwave Photon, Minist Educ, Nanjing 210016, Peoples R China
[3] Nanjing Univ Posts & Telecommun, Natl Local Joint Engn Res Ctr Commun & Network Te, Nanjing 210003, Peoples R China
基金
中国国家自然科学基金;
关键词
Security-reliability trade-off; energy harvesting; friendly jammer; cooperative relay; outage probability; intercept probability; PHYSICAL LAYER SECURITY; NONORTHOGONAL MULTIPLE-ACCESS; PERFORMANCE ANALYSIS; UPLINK NOMA; SECRECY; NETWORKS; SYSTEMS; TRANSMISSION; ENHANCEMENT; CSI;
D O I
10.1109/TVT.2023.3244548
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we study the secure communication problem of a wireless multiuser network consisting of a base station (BS), multiple users, and an energy harvesting (EH) node in the face of an eavesdropper. We focus on the question that which role the EH node plays, as a friendly jammer or as a cooperative decode-and-forward (DF) relay. Accordingly, we propose two EH node aided multiuser scheduling schemes to help the secure communications between BS and multiple users, i.e., the EH jammer aided transmission (EHJT) scheme where the EH node acts as a friendly jammer and the EH relay aided transmission (EHRT) scheme where the EH node acts as a cooperative DF relay. For comparison purposes, the direct transmission (DT) scheme is also presented. We analyze the security-reliability trade-off (SRT) performance of the proposed EHJT and EHRT schemes as well as the DT scheme in terms of deriving their exact and asymptotic expressions of outage and intercept probabilities. Additionally, we propose an iterative algorithm based on the golden search to determine the optimal time allocation factor (OTAF) for the sake of minimizing the sum of outage and intercept probabilities for the proposed EHJT and EHRT schemes. Numerical results show that the EH node can improve the SRT performance of the multiuser network more significantly as a friendly jammer than as a cooperative DF relay. It is also shown that the best SRT performance of the EHJT and EHRT schemes can be achieved by adjusting the signal-to-noise ratio (SNR) and time allocation factor.
引用
收藏
页码:8755 / 8769
页数:15
相关论文
共 45 条
[1]   Energy Harvesting Networks: Energy Versus Data Cooperation [J].
Ainmar, Ahmed ;
Reynolds, Daryl .
IEEE COMMUNICATIONS LETTERS, 2018, 22 (10) :2128-2131
[2]   Modeling of Multiple Energy Sources for Hybrid Energy Harvesting IoT Systems [J].
Altinel, Dogay ;
Kurt, Gunes Karabulut .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (06) :10846-10854
[3]   Secure Relaying in Non-Orthogonal Multiple Access: Trusted and Untrusted Scenarios [J].
Arafa, Ahmed ;
Shin, Wonjae ;
Vaezi, Mojtaba ;
Poor, H. Vincent .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 :210-222
[4]   Improving Physical Layer Security of Uplink NOMA via Energy Harvesting Jammers [J].
Cao, Kunrui ;
Wang, Buhong ;
Ding, Haiyang ;
Lv, Lu ;
Dong, Runze ;
Cheng, Tianhao ;
Gong, Fengkui .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 :786-799
[5]   On the Security Enhancement of Uplink NOMA Systems With Jammer Selection [J].
Cao, Kunrui ;
Wang, Buhong ;
Ding, Haiyang ;
Lv, Lu ;
Tian, Jiwei ;
Gong, Fengkui .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2020, 68 (09) :5747-5763
[6]   Optimization or Alignment: Secure Primary Transmission Assisted by Secondary Networks [J].
Cao, Yang ;
Zhao, Nan ;
Yu, F. Richard ;
Jin, Minglu ;
Chen, Yunfei ;
Tang, Jie ;
Leung, Victor C. M. .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2018, 36 (04) :905-917
[7]   Large-Scale MIMO Relaying Techniques for Physical Layer Security: AF or DF? [J].
Chen, Xiaoming ;
Lei, Lei ;
Zhang, Huazi ;
Yuen, Chau .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2015, 14 (09) :5135-5146
[8]  
CSISZAR I, 1978, IEEE T INFORM THEORY, V24, P339, DOI 10.1109/TIT.1978.1055892
[9]   Secure Communications With Cooperative Jamming: Optimal Power Allocation and Secrecy Outage Analysis [J].
Cumanan, Kanapathippillai ;
Alexandropoulos, George C. ;
Ding, Zhiguo ;
Karagiannidis, George K. .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2017, 66 (08) :7495-7505
[10]   Secure Communication in Uplink Transmissions: User Selection and Multiuser Secrecy Gain [J].
Deng, Hao ;
Wang, Hui-Ming ;
Yuan, Jinhong ;
Wang, Wenjie ;
Yin, Qinye .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2016, 64 (08) :3492-3506