Security-reliability tradeoff analysis of untrusted energy harvesting relay networks

被引:5
作者
Chen, Dechuan [1 ]
Yang, Weiwei [1 ]
Hu, Jianwei [1 ]
Mou, Weifeng [1 ]
Cai, Yueming [1 ]
机构
[1] PLA Univ Sci & Technol, Coll Commun Engn, Nanjing 210007, Jiangsu, Peoples R China
基金
美国国家科学基金会; 中国博士后科学基金; 中国国家自然科学基金;
关键词
Energy harvesting; untrusted relay; outage probability; secrecy throughput; WIRELESS INFORMATION; DESIGN;
D O I
10.1177/1550147718754729
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We investigate secure communications in untrusted energy harvesting relay networks, where the amplify-and-forward relay is an energy constrained node powered by the received radio frequency signals, and try to unauthorizedly decode the confidential information from the source. The secrecy outage probability and connection outage probability are respectively derived in closed-form to evaluate the security and reliability for three energy harvesting strategies, for example, time switching relaying strategy, power splitting relaying strategy, and ideal relaying receiver strategy. Subsequently, the effective secrecy throughput is conducted to characterize the overall efficiency, and the asymptotic analysis of the secrecy throughput is given to determine the optimal energy harvesting strategies in different operating regimes. Furthermore, in order to achieve the optimal effective secrecy throughput performance, a switching threshold between time switching relaying and power splitting relaying is designed. Numerical results verify the accuracy of the analytical expressions and reveal that the effective secrecy throughput of the system can be effectively promoted by the threshold switching energy harvesting strategy.
引用
收藏
页数:11
相关论文
共 21 条
[1]  
[Anonymous], 2000, Tables of Integrals
[2]   Application of Smart Antenna Technologies in Simultaneous Wireless Information and Power Transfer [J].
Ding, Zhiguo ;
Zhong, Caijun ;
Ng, Derrick Wing Kwan ;
Peng, Mugen ;
Suraweera, Himal A. ;
Schober, Robert ;
Poor, H. Vincent .
IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (04) :86-93
[3]   Power Allocation Strategies in Energy Harvesting Wireless Cooperative Networks [J].
Ding, Zhiguo ;
Perlaza, Samir M. ;
Esnaola, Inaki ;
Poor, H. Vincent .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2014, 13 (02) :846-860
[4]  
Grover P., 2010, IEEE INT S INF THEOR
[5]   Cooperation With an Untrusted Relay: A Secrecy Perspective [J].
He, Xiang ;
Yener, Aylin .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2010, 57 (08) :3807-3827
[6]   Secure Communication Via an Untrusted Non-Regenerative Relay in Fading Channels [J].
Huang, Jing ;
Mukherjee, Amitav ;
Swindlehurst, A. Lee .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2013, 61 (10) :2536-2550
[7]   Joint Secure Beamforming Design at the Source and the Relay for an Amplify-and-Forward MIMO Untrusted Relay System [J].
Jeong, Cheol ;
Kim, Il-Min ;
Kim, Dong In .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2012, 60 (01) :310-325
[8]   Secure Communication via a Wireless Energy Harvesting Untrusted Relay [J].
Kalamkar, Sanket S. ;
Banerjee, Adrish .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2017, 66 (03) :2199-2213
[9]   Advances in Energy Harvesting Communications: Past, Present, and Future Challenges [J].
Ku, Meng-Lin ;
Li, Wei ;
Chen, Yan ;
Liu, K. J. Ray .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02) :1384-1412
[10]   Secure Beamforming for MIMO Two-Way Communications With an Untrusted Relay [J].
Mo, Jianhua ;
Tao, Meixia ;
Liu, Yuan ;
Wang, Rui .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2014, 62 (09) :2185-2199