2021
DOI: 10.3390/s21175692
|View full text |Cite
|
Sign up to set email alerts
|

A Study of Physical Layer Security in SWIPT-Based Decode-and-Forward Relay Networks with Dynamic Power Splitting

Abstract: In this paper, we study the physical layer security for simultaneous wireless information and power transfer (SWIPT)-based half-duplex (HD) decode-and-forward relaying system. We consider a system model including one transmitter that tries to transmit information to one receiver under the help of multiple relay users and in the presence of one eavesdropper that attempts to overhear the confidential information. More specifically, to investigate the secrecy performance, we derive closed-form expressions of outa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(11 citation statements)
references
References 38 publications
0
6
0
Order By: Relevance
“…This involves two phases: the first phase is the same as the DF scheme as demonstrated in Figure 3; in the 2nth time slot, the R 1 , R 2 , and E signals are received, and the relevant equations are represented by ( 5)- (7). In the next time slot, the relay sends the amplified signals to the destination using the Amplify and Forward Scheme and by jamming the signal source to the eavesdropper.…”
Section: Amplify and Forward (Af) Relaying Schemementioning
confidence: 99%
See 1 more Smart Citation
“…This involves two phases: the first phase is the same as the DF scheme as demonstrated in Figure 3; in the 2nth time slot, the R 1 , R 2 , and E signals are received, and the relevant equations are represented by ( 5)- (7). In the next time slot, the relay sends the amplified signals to the destination using the Amplify and Forward Scheme and by jamming the signal source to the eavesdropper.…”
Section: Amplify and Forward (Af) Relaying Schemementioning
confidence: 99%
“…The nodes in communication networks are powered by putting separate batteries inside them; however, in some circumstances, replacing or recharging those batteries is not recommended [4]. The Energy-Harvesting (EH) approach [5][6][7] can be used to solve this problem. It also contributes to the improved reliability and low-maintenance monitoring of the system.…”
Section: Introductionmentioning
confidence: 99%
“…For example, privacy information in health care, the journey or location of vehicles in transportation and the position or confidential information of the targets need to be protected. Regarding security protection for wireless communications, several conventional approaches, such as cryptography [ 1 ] or physical layer security [ 2 , 3 , 4 ], have been implemented. These methods only target preventing the confidential content of messages from being stolen by eavesdroppers.…”
Section: Introductionmentioning
confidence: 99%
“…Practical IoT devices do not support complex encryption for information security, while physical secrecy is promising because the complex part is with the base station [ 13 ]. Basically, the signal-to-noise ratio (SNR) at a legitimate receiver must be higher than that at eavesdroppers to obtain the rate, called secrecy rate, that only the legitimate receiver can decode the information [ 14 ].…”
Section: Introductionmentioning
confidence: 99%