2015
DOI: 10.1109/lcomm.2015.2453161
|View full text |Cite
|
Sign up to set email alerts
|

Joint Power Splitting and Secure Beamforming Design in the Multiple Non-Regenerative Wireless-Powered Relay Networks

Abstract: The physical-layer security issue in the multiple non-regenerative wireless-powered relay (WPR) networks is investigated in this letter, where the idle relay is treated as a potential eavesdropper. To guarantee secure communication, the destination-based artificial noise is sent to degrade the receptions of eavesdroppers, and it also becomes a new source of energy powering relays to forward the information with power splitting (PS) technique. We propose an efficient algorithm ground on block-wise penalty funct… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
16
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 28 publications
(16 citation statements)
references
References 19 publications
0
16
0
Order By: Relevance
“…Plugging into (24) (14) and (17), the approximate expression for r (inst) sec when the number of relay antennas N tends to be very large is thus obtained. Considering the no-delay-limited secrecy information transmission to the destination, ESR is a relevant metric that is given by [22] …”
Section: A Ergodic Secrecy Ratementioning
confidence: 99%
See 1 more Smart Citation
“…Plugging into (24) (14) and (17), the approximate expression for r (inst) sec when the number of relay antennas N tends to be very large is thus obtained. Considering the no-delay-limited secrecy information transmission to the destination, ESR is a relevant metric that is given by [22] …”
Section: A Ergodic Secrecy Ratementioning
confidence: 99%
“…WEH-enabled amplify-and-forward (AF) relays have been early investigated in [13]. Later their receiver (Rx) structure was further optimized for purely cooperative beamforming (CB), and joint CB and CJ in [14] and [15], respectively. Secret transmission assisted by a wireless powered massive MIMO relay through WPT from the source was considered in [16], where explicit expressions of secrecy outage capacity were derived under the assumption of imperfect legitimate CSI and no eavesdropper's CSI to show that the challenging "long transfer distance" issue has been well addressed.…”
Section: Introductionmentioning
confidence: 99%
“…We consider the use of the dynamic power splitting (DPS) receiver architecture, initially proposed for SWIPT in [22], which divides the received power with an adjustable ratio for energy harvesting (EH) and information receiving (IR). WEHenabled relays using DPS receivers have also been considered in [23][24][25] and [26,27,29], without (w/o) and with secrecy consideration, respectively. Note that there is also interest in addressing the threat that WEH receivers may attempt to intercept the confidential messages in SWIPT-enabled networks [28][29][30][31].…”
mentioning
confidence: 99%
“…1 In this paper, we assume that there is no direct link between the source and destination nodes, and perfect global channel state information (CSI) is available for the case of centralized optimization.It is worth pointing out that although our setting may look similar to [20], their optimal CB-CJ design is not applicable to ours due to the multiplicative nature in beamforming weights incurred by the power splitting (PS) ratios that intrinsically poses more intractability to our optimization problem. Further, our work also differs from [27] where an efficient algorithm was proposed to maximize the secrecy rate for the optimization of the PS ratios and AF relay beamforming. The difference is twofold.…”
mentioning
confidence: 99%
See 1 more Smart Citation