Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2017
DOI: 10.1109/access.2017.2768443
|View full text |Cite
|
Sign up to set email alerts
|

Secrecy Performance Analysis of Energy Harvesting Wireless Sensor Networks With a Friendly Jammer

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
36
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
7
2

Relationship

1
8

Authors

Journals

citations
Cited by 51 publications
(36 citation statements)
references
References 44 publications
0
36
0
Order By: Relevance
“…Although the harvested energy from RF signals appears to be inefficient and the WPC-based wireless communication seems to be not widely available at the current stage, practical applications for power-constrained devices of IoT have already been investigated, and more feasible applications will be implemented in the near future [6][7][8]. Until now, a lot of research efforts have also been devoted to explore the advantages of WPC in most applications of IoT since it could be easily combined with wireless terminals [9][10][11][12][13]. Specifically, typical wirelesspowered communication networks (WPCN) were investigated in [9], where introduction of a dynamic time division multiple access (TDMA) protocol was performed for a multiuser WPCN, and the best time allocation for the downlink WPC and the uplink wireless information transmission (WIT) had been analyzed.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Although the harvested energy from RF signals appears to be inefficient and the WPC-based wireless communication seems to be not widely available at the current stage, practical applications for power-constrained devices of IoT have already been investigated, and more feasible applications will be implemented in the near future [6][7][8]. Until now, a lot of research efforts have also been devoted to explore the advantages of WPC in most applications of IoT since it could be easily combined with wireless terminals [9][10][11][12][13]. Specifically, typical wirelesspowered communication networks (WPCN) were investigated in [9], where introduction of a dynamic time division multiple access (TDMA) protocol was performed for a multiuser WPCN, and the best time allocation for the downlink WPC and the uplink wireless information transmission (WIT) had been analyzed.…”
Section: Introductionmentioning
confidence: 99%
“…In particular, a joint wireless power transfer (WPT) and relay selection method were proposed for WPCN in [10], where the source and relays utilize the time-switching-based RF-EH method to acquire energy from a power beacon (PB) with multiple antennas. Differently, secrecy performance discussion of EH wireless sensor networks was examined in [11], where the authors proposed an optimization method, in which a wireless-powered friendly jammer was utilized for improving the secrecy performance of the considered model. Furthermore, the authors in [12] analyzed the secrecy performance of the EH sensor system and proposed a best-relay-and-best-jammer protocol for enhancing the secrecy of a system with the source user and multiple sensor relays harvesting energy from diverse PBs.…”
Section: Introductionmentioning
confidence: 99%
“…The energy constraint requires a careful design of the communication protocols (e.g., MAC [4], routing [5] and cross-layer [6]). There are specific deployment strategies according to the characteristics and application of the network [7]. If the nodes are randomly deployed, specific techniques which detect the position of the nodes can be used [8].…”
Section: Introductionmentioning
confidence: 99%
“…Al-Turjman et al have presented a key aggrement strategy hat offers secure communication using mobile sinks with an aid of elliptical curve cryptography [32]. A framework for investigating the security strength of harvester node is designed by Vo et al [33].…”
Section: Introductionmentioning
confidence: 99%