2019
DOI: 10.1109/jiot.2019.2913219
|View full text |Cite
|
Sign up to set email alerts
|

Secrecy Throughput Maximization for Full-Duplex Wireless Powered IoT Networks Under Fairness Constraints

Abstract: In this paper, we study the secrecy throughput of a full-duplex wireless powered communication network (WPCN) for internet of things (IoT). The WPCN consists of a fullduplex multi-antenna base station (BS) and a number of sensor nodes. The BS transmits energy all the time, and each node harvests energy prior to its transmission time slot. The nodes sequentially transmit their confidential information to the BS, and the other nodes are considered as potential eavesdroppers. We first formulate the sum secrecy th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 23 publications
(11 citation statements)
references
References 30 publications
0
11
0
Order By: Relevance
“…Here, we numerically investigate the secrecy performance of the proposed QoS‐aware system model. Unless explicitly mentioned, we have considered: PS=PJ=100thinmathspacenormalmW, σ2=90thinmathspacenormaldBm, θ=3 aSU=aSA=aAU=105, Cst=1thinmathspacebps/Hz, r=50thinmathspacenormalm, R=100thinmathspacenormalm referring IoT networks [37, 38]. We consider that scriptS and scriptU are deployed stochastically uniformly within a circle of radius R with attacker scriptA at its centre.…”
Section: Numerical Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Here, we numerically investigate the secrecy performance of the proposed QoS‐aware system model. Unless explicitly mentioned, we have considered: PS=PJ=100thinmathspacenormalmW, σ2=90thinmathspacenormaldBm, θ=3 aSU=aSA=aAU=105, Cst=1thinmathspacebps/Hz, r=50thinmathspacenormalm, R=100thinmathspacenormalm referring IoT networks [37, 38]. We consider that scriptS and scriptU are deployed stochastically uniformly within a circle of radius R with attacker scriptA at its centre.…”
Section: Numerical Resultsmentioning
confidence: 99%
“…However, it is not possible to obtain the explicit analytic solution for D th because of highly non-linear terms in (30) and (33). Thus, Goldensection (GS) based linear search [39] technique is used to find the solution within (0 < D ≤ D max ). becomes constant with respect to r for D < D sat as depicted from the first case of (30) after substituting the value of α from (12).…”
Section: B Secrecy Qos Aware Perspective Of Design Parametersmentioning
confidence: 99%
“…A highly distributed algorithm is proposed to support smooth data collection and coordinated data dissemination. Rezaei et al [17] exploit the wireless powered communication in IoT which is composed of base stations and sensor nodes. The secrecy throughput of sensors is optimized by the proposed max-min fair and proportional fair algorithms.…”
Section: Related Workmentioning
confidence: 99%
“…Motivated by the need for security and EH, we analyze the gain in security performance by an EH jammer transmitting AN, which can degrade an unknown eavesdropper channel. The considered RF-EH jamming is applicable in various practicable IoT applications related to monitoring and data collection, i.e., the body sensor network [22], smart home, and smart city infrastructure [23]. PLS and EH techniques became essential to address the issue of security in resourcelimited IoT networks.…”
Section: Introductionmentioning
confidence: 99%