2021
DOI: 10.1155/2021/5599334
|View full text |Cite
|
Sign up to set email alerts
|

Security-Reliability Tradeoff for Friendly Jammer Aided Multiuser Scheduling in Energy Harvesting Communications

Abstract: In this paper, we investigate the physical-layer security in an energy-harvesting (EH) multiuser network with the help of a friendly jammer (J), where multiple eavesdroppers are considered to tap the information transmission from users (Us) to base station (BS). In this system, a power beacon (PB) transmits radio frequency (RF) signals to Us for charging. In order to enhance the security of wireless transmission, we propose non-energy-aware multiuser scheduling (NEAMUS) scheme and energy-aware multiuser schedu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
6

Relationship

2
4

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 40 publications
0
8
0
Order By: Relevance
“…The reliability of the system is quantified by COP which describes the probability of the connection outage event in which the destination SNR is less than the preset threshold value 𝛾 𝑡 = 2 𝑅 𝑡 − 1 with 𝑅 𝑡 (𝑏𝑖𝑡𝑠/𝑠/𝐻𝑧) denotes as transmit rate. Thus, the COP of the concerned system can be expressed as [25]:…”
Section: Connection Outage Probabilitymentioning
confidence: 99%
“…The reliability of the system is quantified by COP which describes the probability of the connection outage event in which the destination SNR is less than the preset threshold value 𝛾 𝑡 = 2 𝑅 𝑡 − 1 with 𝑅 𝑡 (𝑏𝑖𝑡𝑠/𝑠/𝐻𝑧) denotes as transmit rate. Thus, the COP of the concerned system can be expressed as [25]:…”
Section: Connection Outage Probabilitymentioning
confidence: 99%
“…where m denotes the fading parameter of the link, Ω = 𝛾 D ∕m with 𝛾 D represents the average SNR. By integrating (11), the CDF of the link can be defined as:…”
Section: Channel Modelsmentioning
confidence: 99%
“…In this case, conventional cryptographic technique which involves the use of authentication keys for data encryption is usually adopted to secure SG network 10 . However, this technology incur extra computational overhead and leads to network complexity 11 . As a result of this, physical layer security technique, which is based on the randomness of the wireless links has been advocated as a promising technique to improve the wireless network security 12 .…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In recent years, simultaneous wireless information and power transfer (SWIPT) has attracted an increasing attention of researchers, which transmits information and energy to destinations simultaneously [4,5]. There are two protocols for SWIPT, namely time-switching scheme (TS) and power-splitting scheme (PS) [6,7]. Specifically, PS protocol divides the received RF signals into two parts, one for energy harvesting and the remaining for information processing.…”
Section: Introductionmentioning
confidence: 99%