2022
DOI: 10.1109/access.2022.3159679
|View full text |Cite
|
Sign up to set email alerts
|

A Secure-Transmission Maximization Scheme for SWIPT Systems Assisted by an Intelligent Reflecting Surface and Deep Learning

Abstract: Recently, the demand for spectral and energy efficiency has significantly been increased along with new breakthroughs in programmable meta-material techniques. The integration of an intelligent reflecting surface (IRS) into simultaneous wireless information and power transfer (SWIPT) systems has attracted much attention from operators in advanced wireless communication networks (WCNs) such as fifth-generation (5G) and sixth-generation (6G) networks. In addition, an IRS-assisted SWIPT system faces many security… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 19 publications
(11 citation statements)
references
References 50 publications
0
11
0
Order By: Relevance
“…Summing up the representative works from another perspective, we can find some common schemes, as shown in Table 2. IRS element selection, phase-shift control and power allocation [60] Transmitter power, PS factor of UE and IRS phase shifts matrix [82] Task offloading rate, power consumption and computational overhead [94] Task offloading and resource allocation [95] Latency, interference management and computational resource management [70] Simplification of DRL decision space Adopt a decision selection network to filter inappropriate mode alterations from the action space of QNet model [75] Adopt LSTM to simplify the original state-action space and produce an approximate state-action space [94] Adopt the concept of rolling horizon control to slow down the growth of action aggregations [95] Deep learning as an alternative to traditional analytical methods…”
Section: Frequently Used Techniquesmentioning
confidence: 99%
“…Summing up the representative works from another perspective, we can find some common schemes, as shown in Table 2. IRS element selection, phase-shift control and power allocation [60] Transmitter power, PS factor of UE and IRS phase shifts matrix [82] Task offloading rate, power consumption and computational overhead [94] Task offloading and resource allocation [95] Latency, interference management and computational resource management [70] Simplification of DRL decision space Adopt a decision selection network to filter inappropriate mode alterations from the action space of QNet model [75] Adopt LSTM to simplify the original state-action space and produce an approximate state-action space [94] Adopt the concept of rolling horizon control to slow down the growth of action aggregations [95] Deep learning as an alternative to traditional analytical methods…”
Section: Frequently Used Techniquesmentioning
confidence: 99%
“…By inserting concept of the IRSs, which is also termed as reconfigurable intelligent surfaces (RIS) and is one of the emerging wireless communication applications, into SWIPT-based schemes, several researches have canalized on the communications security performances [209]- [212]. The secrecy analysis of SWIPT scheme that incorporates the assistance of IRSs in the presence of an eavesdropper has been investigated in [209]. The computational complexity burden is aimed to be reduced with the help of deep-learning (DL)-based optimization approach.…”
Section: B Physical Layer Security Of Multiuser Swipt Schemesmentioning
confidence: 99%
“…The literature related to the multiuser SWIPT schemes also includes several researches that focus on the DL-based optimization approaches promising to efficiently reduce the computational complexity burden and processing time [209], [213]. The secrecy rate of PS-based SWIPT schemes has been investigated in [209] by utilizing the feasible point pursuit (FPP) and the successive convex approximation (SCA) methods. Additionally, a DL based solution has been introduced to solve the optimization problem.…”
Section: B Physical Layer Security Of Multiuser Swipt Schemesmentioning
confidence: 99%
See 1 more Smart Citation
“…Three secure modes for RIS-WPC systems were introduced and examined. In [218], RIS was utilized to maximize secure SWIPT systems with a power splitting scheme. The objective was to optimize the system's SR by choosing the optimal transmitter power and RIS phase shifts while ensuring user energy-harvesting requirements and adhering to transmit power constraints at the transmitter.…”
Section: B Integrating Ris With Enabling Technologies For Secure Comm...mentioning
confidence: 99%