Learning-Based Wireless Powered Secure Transmission

被引:27
作者
He, Dongxuan [1 ]
Liu, Chenxi [2 ]
Wang, Hua [1 ]
Quek, Tony Q. S. [2 ]
机构
[1] Beijing Inst Technol, Sch Informat & Elect, Beijing 100081, Peoples R China
[2] Singapore Univ Technol & Design, Informat Syst Technol & Design Pillar, Singapore 487372, Singapore
基金
中国国家自然科学基金;
关键词
Wireless power transfer; artificial noise; physical layer security; deep feedforward neural network; COMMUNICATION; ALLOCATION;
D O I
10.1109/LWC.2018.2881976
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this letter, we propose a learning-based wireless powered secure transmission, in which a source utilizes energy harvested from a power beacon to communicate with a legitimate receiver, in the presence of an eavesdropper. In order to confuse the eavesdropper, we assume that the source transmits the artificial noise signals, in addition to the information signals. We first characterize the effective secrecy throughput of our system, showing its dependence on the transmission parameters, including the fraction of time allocated for wireless power transfer, the fraction of power allocated to the information signals, as well as the wiretap code rates. We then leverage the deep feedforward neural network to learn how the optimal transmission parameters that jointly maximize the effective secrecy throughput can be obtained. Through numerical results, we demonstrate that our learning-based scheme can achieve almost the same secrecy performance as the optimal solution obtained from the exhaustive search, while requiring much less computational complexity.
引用
收藏
页码:600 / 603
页数:4
相关论文
共 14 条
[1]   Wireless Powered Communication: Opportunities and Challenges [J].
Bi, Suzhi ;
Ho, Chin Keong ;
Zhang, Rui .
IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (04) :117-125
[2]   Secure Communications With Cooperative Jamming: Optimal Power Allocation and Secrecy Outage Analysis [J].
Cumanan, Kanapathippillai ;
Alexandropoulos, George C. ;
Ding, Zhiguo ;
Karagiannidis, George K. .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2017, 66 (08) :7495-7505
[3]  
Goodfellow I, 2016, ADAPT COMPUT MACH LE, P1
[4]   Minimum Secrecy Throughput Maximization in Wireless Powered Secure Communications [J].
Guo, Chongtao ;
Liao, Bin ;
Feng, Daquan ;
He, Chunlong ;
Ma, Xiao .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (03) :2571-2581
[5]  
Hagan M.T, 1995, NEURAL NETWORK DESIG
[6]   Transmit Antenna Selection in MIMO Wiretap Channels: A Machine Learning Approach [J].
He, Dongxuan ;
Liu, Chenxi ;
Quek, Tony Q. S. ;
Wang, Hua .
IEEE WIRELESS COMMUNICATIONS LETTERS, 2018, 7 (04) :634-637
[7]   MULTILAYER FEEDFORWARD NETWORKS ARE UNIVERSAL APPROXIMATORS [J].
HORNIK, K ;
STINCHCOMBE, M ;
WHITE, H .
NEURAL NETWORKS, 1989, 2 (05) :359-366
[8]   Location-Based Secure Transmission for Wiretap Channels [J].
Liu, Chenxi ;
Yang, Nan ;
Yuan, Jinhong ;
Malaney, Robert .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2015, 33 (07) :1458-1470
[9]  
Nair V., 2010, ICML, P807
[10]   Robust Beamforming for Secure Communication in Systems With Wireless Information and Power Transfer [J].
Ng, Derrick Wing Kwan ;
Lo, Ernest S. ;
Schober, Robert .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2014, 13 (08) :4599-4615