“…In the non-linear model, the sensitivity of the energy harvester is limited [20]. Thus, the harvested energy is modeled using the logistic (or sigmoid) function at the users and eavesdropper as follows [20], [21].…”
Section: A Average Harvested Energymentioning
confidence: 99%
“…Theorem 2: By exploiting MRT precoding and MMSE channel estimation, the kth user achievable secrecy rate lower bound can be represented as (21). P roof : The proof is provided in Appendix A.…”
Section: B Achievable Secrecy Ratementioning
confidence: 99%
“…Time switching and power splitting are two common hybrid receiver architectures in the literature [11]- [14]. On the other hand, in SWIPT systems, the RF energy harvesting in the receiver is generally modeled by two linear and non-linear models which the non-linear model is more practical [4], [15]- [21]. Since RF signals significantly attenuate over distance, improving energy transfer efficiency is a great challenge for deploying SWIPT systems over wide areas and especially in applications like IoT.…”
Section: Introductionmentioning
confidence: 99%
“…The users and eavesdropper distance from the BS are d k =[11,13,16,18], dw = 15, respectively and ρ k = 0.4. Factor (θ) Achievable Secrecy Rate (bit/s/Hz)SimulationLower bound(21)…”
In this paper, downlink secure transmission in simultaneous information and power transfer (SWIPT) system enabled with massive multiple-input multiple-output (MIMO) is studied. A base station (BS) with a large number of antennas transmits energy and information signals to its intended users, but these signals are also received by an active eavesdropper. The users and eavesdropper employ a power splitting technique to simultaneously decode information and harvest energy. Massive MIMO helps the BS to focus energy to the users and prevent information leakage to the eavesdropper. The harvested energy by each user is employed for decoding information and transmitting uplink pilot signals for channel estimation. It is assumed that the active eavesdropper also harvests energy in the downlink and then contributes during the uplink training phase. Achievable secrecy rate is considered as the performance criterion and a closedform lower bound for it is derived. To provide secure transmission, the achievable secrecy rate is then maximized through an optimization problem with constraints on the minimum harvested energy by the user and the maximum harvested energy by the eavesdropper. Numerical results show the effectiveness of using massive MIMO in providing physical layer security in SWIPT systems and also show that our closed-form expressions for the secrecy rate are accurate. INDEX TERMS Active eavesdropper, Energy harvesting (EH), Massive MIMO, Non-linear energy harvesting (EH), Physical layer security, Power splitting (PS), Simultaneous wireless information and power transfer (SWIPT)
“…In the non-linear model, the sensitivity of the energy harvester is limited [20]. Thus, the harvested energy is modeled using the logistic (or sigmoid) function at the users and eavesdropper as follows [20], [21].…”
Section: A Average Harvested Energymentioning
confidence: 99%
“…Theorem 2: By exploiting MRT precoding and MMSE channel estimation, the kth user achievable secrecy rate lower bound can be represented as (21). P roof : The proof is provided in Appendix A.…”
Section: B Achievable Secrecy Ratementioning
confidence: 99%
“…Time switching and power splitting are two common hybrid receiver architectures in the literature [11]- [14]. On the other hand, in SWIPT systems, the RF energy harvesting in the receiver is generally modeled by two linear and non-linear models which the non-linear model is more practical [4], [15]- [21]. Since RF signals significantly attenuate over distance, improving energy transfer efficiency is a great challenge for deploying SWIPT systems over wide areas and especially in applications like IoT.…”
Section: Introductionmentioning
confidence: 99%
“…The users and eavesdropper distance from the BS are d k =[11,13,16,18], dw = 15, respectively and ρ k = 0.4. Factor (θ) Achievable Secrecy Rate (bit/s/Hz)SimulationLower bound(21)…”
In this paper, downlink secure transmission in simultaneous information and power transfer (SWIPT) system enabled with massive multiple-input multiple-output (MIMO) is studied. A base station (BS) with a large number of antennas transmits energy and information signals to its intended users, but these signals are also received by an active eavesdropper. The users and eavesdropper employ a power splitting technique to simultaneously decode information and harvest energy. Massive MIMO helps the BS to focus energy to the users and prevent information leakage to the eavesdropper. The harvested energy by each user is employed for decoding information and transmitting uplink pilot signals for channel estimation. It is assumed that the active eavesdropper also harvests energy in the downlink and then contributes during the uplink training phase. Achievable secrecy rate is considered as the performance criterion and a closedform lower bound for it is derived. To provide secure transmission, the achievable secrecy rate is then maximized through an optimization problem with constraints on the minimum harvested energy by the user and the maximum harvested energy by the eavesdropper. Numerical results show the effectiveness of using massive MIMO in providing physical layer security in SWIPT systems and also show that our closed-form expressions for the secrecy rate are accurate. INDEX TERMS Active eavesdropper, Energy harvesting (EH), Massive MIMO, Non-linear energy harvesting (EH), Physical layer security, Power splitting (PS), Simultaneous wireless information and power transfer (SWIPT)
“…To be more practical, [35]- [38] extended the researches to nonlinear EH model, where [35] considered the wirelessly powered two-way communication, and [36] analyzed the performance of wireless powered AF relaying over Nakagamim fading channels. Besides, [37] designed the SWIPT protocol for massive multi-input multi-output (mMIMO) system in the beam-domain (BD), and [38] proposed a secure two-phase communication protocol with the help of a hybrid base station (HBS) in the wireless powered communication networks (WPCNs) employing the nonlinear EH model. Motivated by the above research, we explore physical layer security for an EH cooperative communication network consisting of a source, a destination, and multiple decodeand-forward (DF) relays, which are capable of collecting the energy from RF signal of the source.…”
In this paper, we investigate an energy-harvesting cooperative communication network, which comprises of a source, a destination, and multiple decode-and-forward (DF) relays in the presence of multiple passive eavesdropper (Es). Es attempt to intercept confidential information transmissions from the source to destination via DF relays. In this network, all the DF relays harvest energy from radio-frequency (RF) signals of a source through time-switching receivers. In order to improve the physical layer security of energyharvesting cooperative communication networks, we propose a best relay selection (BRS) scheme, where the ''best'' relay is chosen to assist the source-destination transmission. For the purpose of comparison, we consider the classic direct transmission (DT) and equal relay selection (ERS) as benchmark schemes. We derive the exact closed-form expressions of outage probability (OP) and intercept probability (IP) for the ERS and BRS schemes over Rayleigh fading channels. Besides, the security-reliability tradeoff (SRT) is analyzed as a metric to evaluate the tradeoff performance of the proposed BRS scheme. Numerical results show that the SRT of the BRS scheme consistently outperforms that of the ERS scheme, which demonstrates the advantage of our proposed scheme against eavesdroppers. Besides, it is verified that total error rate (TER) defined as the sum of OP and IP can be minimized for both the ERS and BRS schemes through changing the time allocation factor between information transmission and energy harvesting phases. Moreover, there is a best energy conversation efficiency to obtain a maximal SRT value of the ERS and BRS schemes. In addition, as the number of DF relays increases, the SRT of BRS scheme improves notably, while that of ERS scheme remains unchanged. And as the number of Es increases, the SRT of both the ERS and BRS schemes become worse. INDEX TERMS Cooperative communication, physical layer security, best relay selection (BRS), outage probability (OP), intercept probability (IP), security-reliability tradeoff (SRT).
In this paper, we propose a millimeter wave (mmWave) X-duplex (XD) amplify-and-forward (AF) multirelay system for 5G and beyond. Each XD AF relay is equipped with a shared antenna for both transmission and reception radio frequency (RF) chains. Also, the performance of mmWave XD AF multirelay system is analyzed, and a relay selection method in this scenario is suggested, where the best relay and the best operation mode are selected based on maximum end-to-end signal-to-interference-plus-noise ratio (SINR).XD relays can switch adaptively between half-duplex (HD) and full-duplex (FD) operation modes. As a practical channel model, Rician fading, path loss with line-of-sight (LOS) and non-line-of-sight (NLOS) propagation, and blockage effects are considered for mmWave channel model in both source-relay and relay-destination links. We derive closed-form expressions for end-to-end SINR and its distribution, outage probability, energy efficiency (EE), rate, and average symbol error rate (SER) based on the relay selection method. Monte Carlo simulations are performed to validate our analytical derivations, and also, the simulation results depict that XD relays outperform both HD and FD operation modes in terms of outage probability, EE, SER, and rate. Furthermore, the effects of self-interference (SI) cancellation, blockage, and number of XD AF relays over the performance and also the comparison of XD relay selection to different existing relay selection policies are presented. In addition, it is shown that the XD relay selection method in our proposed system eliminates the performance floor of the FD caused by the residual SI that it is considered as a significant advantage of our proposed system.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.