2015 IEEE Global Communications Conference (GLOBECOM) 2015
DOI: 10.1109/glocom.2015.7417347
|View full text |Cite
|
Sign up to set email alerts
|

Joint Power Splitting and Secure Beamforming Design in the Wireless-Powered Untrusted Relay Networks

Abstract: Abstract-In this work, we maximize the secrecy rate of the wireless-powered untrusted relay network by jointly designing power splitting (PS) ratio and relay beamforming with the proposed global optimal algorithm (GOA) and local optimal algorithm (LOA). Different from the literature, artificial noise (AN) sent by the destination not only degrades the channel condition of the eavesdropper to improve the secrecy rate, but also becomes a new source of energy powering the untrusted relay based on PS. Hence, it is … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 30 publications
0
5
0
Order By: Relevance
“…As described in Fig. 2, we consider a simple scenario where locations of PT, ST, PR and SR are (-5, 0), (0, 0), (5, -1) and (5,1) in coordinates, respectively. The distance unit is in meters and the path-loss exponent is 2.…”
Section: Simulation Resultsmentioning
confidence: 99%
“…As described in Fig. 2, we consider a simple scenario where locations of PT, ST, PR and SR are (-5, 0), (0, 0), (5, -1) and (5,1) in coordinates, respectively. The distance unit is in meters and the path-loss exponent is 2.…”
Section: Simulation Resultsmentioning
confidence: 99%
“…Here we ignore the smaller terms of the form ∆h i ∆h j as they will be negligible compared to other terms. The received SNR at S 2 is thus given by (22) at the top of the next page. Using the triangle inequality, it follows that…”
Section: Secure Communication With Imperfect Csimentioning
confidence: 99%
“…In [12], the authors studied secure one-way communication via a wireless energy harvesting untrusted relay and provided a lower bound expression for the ergodic secrecy rate. In [13], the secrecy rate of the wireless-powered relay networks was maximized by jointly designing power splitting and relay beamforming techniques.…”
Section: Introductionmentioning
confidence: 99%
“…In this paper, inspired by the work in [12], [13], we propose and analyze a new PLS scenario of wireless energy harvesting in two-way untrusted amplify-and-forward relaying in the presence of a FJ. Both the relay and FJ are powered by radio frequency (RF) signals from the two source nodes under a time switching (TS) policy.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation