Secrecy capacity analysis of untrusted relaying energy-harvesting systems with hardware impairments

被引:0
作者
Van Phu Tuan
Hyung Yun Kong
机构
[1] Kongju National University,Department of Information & Communication Engineering
[2] University of Ulsan,Department of Electrical Engineering
来源
Annals of Telecommunications | 2020年 / 75卷
关键词
Energy harvesting; Power-splitting architecture; Untrusted relay; Amplify-and-forward; Hardware impairments; Physical layer security;
D O I
暂无
中图分类号
学科分类号
摘要
In this paper, we study the impact of hardware impairments, which can act as one of the factors that cause degradation in the performance of communication systems, on the secrecy capacity of an untrusted relaying wireless energy-harvesting (WEH) system. In the system, the energy-constrained relay is an untrusted node which can overhear the source’s confidential signal while assisting the source-destination communication. The relay operates in the amplify-and-forward (AF) mode and uses the power-splitting (PS) protocol for harvesting energy. The destination sends an artificial noise (AN) signal during the source-relay communication. The AN signal acts as an additional energy source and an interference source at the relay. In our study, we derive an approximation of the average secrecy capacity (ASC) for the high-power-regime approximation in order to evaluate the secrecy performance of the proposed system, which is also the upper bound for the ASC. The analytical results are confirmed via Monte Carlo simulations. The numerical results provide valuable insights into the effect of the various system parameters, such as the power-splitting ratio, the relay’s location, the trade-off between the source’s power and the destination’s power, and the level of hardware impairments, on the secrecy performance.
引用
收藏
页码:397 / 405
页数:8
相关论文
共 50 条
[41]   Secrecy Performance of Energy-Harvesting Backscatter Communication Network Under Different Tag Selection Schemes [J].
Khan, Yasin ;
Afzal, Aaqib ;
Dubey, Ankit ;
Saxena, Alok .
IEEE JOURNAL OF RADIO FREQUENCY IDENTIFICATION, 2024, 8 :43-48
[42]   Performance analysis of multirelay RF energy harvesting cooperative networks with hardware impairments [J].
Nhu Tri Do ;
da Costa, Daniel Benevides ;
An, Beongku .
IET COMMUNICATIONS, 2016, 10 (18) :2551-2558
[43]   Secrecy outage analysis of energy harvesting two-way relaying networks with friendly jammer [J].
Phong Nguyen-Huu ;
Khuong Ho-Van ;
Vo Nguyen Quoc Bao .
IET COMMUNICATIONS, 2019, 13 (13) :1877-1885
[44]   Secrecy Performance of Cognitive Radio Sensor Networks with an Energy-Harvesting based Eavesdropper and Imperfect CSI [J].
Tan, Rongjun ;
Gao, Yuan ;
He, Haixia ;
Cao, Yuan .
PROCEEDINGS OF THE 2018 ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST), 2018, :80-85
[45]   Impact of Hardware Impairments in AF Relaying Network for WIPT: TSR and Performance Analysis [J].
Tan-Phuoc Huynh ;
Hoang-Sy Nguyen ;
Dinh-Thuan Do ;
Miroslav Voznak .
2016 INTERNATIONAL CONFERENCE ON ELECTRONICS, INFORMATION, AND COMMUNICATIONS (ICEIC), 2016,
[46]   Aerial intelligent reflecting surface for improving the secrecy performance of wireless systems with hardware impairments [J].
Vinh, Nguyen Van .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2024, 37 (07)
[47]   Aggregate Hardware Impairments Over Mixed RF/FSO Relaying Systems With Outdated CSI [J].
Balti, Elyes ;
Guizani, Mohsen ;
Hamdaoui, Bechir ;
Khalfi, Bassem .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2018, 66 (03) :1110-1123
[48]   Modeling Periodic Energy-Harvesting Computing Systems [J].
Ghasemi, Fatemeh ;
Jahre, Magnus .
IEEE COMPUTER ARCHITECTURE LETTERS, 2021, 20 (02) :142-145
[49]   Response Time Analysis for Energy-Harvesting Mixed-Criticality Systems [J].
Wang, Kankan ;
Lin, Yuhan ;
Deng, Qingxu .
PROCEEDINGS OF THE 2022 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE 2022), 2022, :1293-1298
[50]   Interference-assisted energy harvesting short packet communications with hardware impairments [J].
Chen D. ;
Li J. ;
Hu J. ;
Zhang X. ;
Zhang S. ;
Wang D. .
International Journal of Intelligent Networks, 2024, 5 :231-240