Advertisement

Wireless Power Transfer Under Secure Communication with Multiple Antennas and Eavesdroppers

  • Duc-Dung Tran
  • Dac-Binh HaEmail author
  • Anand Nayyar
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 257)

Abstract

In this paper, we analyze the physical layer secrecy performance of a 5G radio frequency energy harvesting (RF-EH) network in the presence of multiple passive eavesdroppers. In this system, the source is considered as an energy-limited node, hence it harvests energy from RF signals generated by a power transfer station to use for information transmission. Additionally, in order to enhance the energy harvesting and system performance, the source is equipped with multiple antennas and employs maximal ratio combining (MRC) and transmit antenna selection (TAS) techniques to exploit the benefits of spatial diversity. Given these settings, the exact close-form expressions of existence probability of secrecy capacity and secrecy outage probability are derived. Furthermore, the obtained results indicate that multiple antennas technique applied at the source not only facilitates energy harvesting but also improves secrecy performance of the investigated network. Finally, Monte-Carlo simulation is provided to confirm our analytical results.

Keywords

Energy harvesting Maximal ratio combining Secrecy capacity Transmit antenna selection Wireless power transfer 

Notes

Acknowledgement

This work was supported by Newton Prize 2017 and by a Research Environment Links grant, ID 339568416, under the Newton Programme Vietnam partnership. The grant is funded by the UK Department of Business, Energy and Industrial Strategy (BEIS) and delivered by the British Council. For further information, please visit www.newtonfund.ac.uk/.

References

  1. 1.
    Lu, X., Wang, P., Niyato, D., Kim, D.I., Han, Z.: Wireless networks with RF energy harvesting: a contemporary survey. IEEE Commun. Surv. Tutor. 17(2), 757–789 (2015)CrossRefGoogle Scholar
  2. 2.
    Krikidis, I., Timotheou, S., Nikolaou, S., Zheng, G., Ng, D.W.K., Schober, R.: Simultaneous wireless information and power transfer in modern communication systems. IEEE Commun. Mag. 52(11), 104–110 (2014)CrossRefGoogle Scholar
  3. 3.
    Ha, D.B., Tran, D.D., Tran, H.V., Hong, E.K.: Performance of amplify-and-forward relaying with wireless power transfer over dissimilar channels. Elektronika ir Elektrotechnika J. 21(5), 90–95 (2015)Google Scholar
  4. 4.
    Bloch, M., Barros, J., Rodrigues, M.R., McLaughlin, S.W.: Wireless information-theoretic security. IEEE Trans. Inform. Theory 54(6), 2515–2534 (2008)MathSciNetCrossRefGoogle Scholar
  5. 5.
    Tran, D.D., Ha, D.-B., Tran-Ha, V., Hong, E.K.: Secrecy analysis with MRC/SC-based eavesdropper over heterogeneous channels. IETE J. Res. 61(4), 363–371 (2015)CrossRefGoogle Scholar
  6. 6.
    Liu, Y., Wang, L., Duy, T.T., Elkashlan, M., Duong, T.Q.: Relay selection for security enhancement in cognitive relay networks. IEEE Wirel. Commun. Lett. 4, 46–49 (2015)CrossRefGoogle Scholar
  7. 7.
    Yang, N., Yeoh, P.L., Elkashlan, M.: Transmit antenna selection for security enhancement in MIMO wiretap channels. IEEE Trans. Comm. 61(1), 144–154 (2013)CrossRefGoogle Scholar
  8. 8.
    Li, Q., Zhang, Q., Qin, J.: Secure relay beamforming for simultaneous wireless information and power transfer in nonregenerative relay networks. IEEE Trans. Veh. Technol. 63(5), 2462–2467 (2014)CrossRefGoogle Scholar
  9. 9.
    Kalamkar, S.S., Banerjee, A.: Secure communication via a wireless energy harvesting untrusted relay. IEEE Trans. Veh. Technol. 66(3), 2199–2213 (2017)CrossRefGoogle Scholar
  10. 10.
    Chen, X., Chen, J., Liu, T.: Secure wireless information and power transfer in large-scale MIMO relaying systems with imperfect CSI. In: IEEE GLOBECOM, pp. 4131–4136 (2014)Google Scholar
  11. 11.
    He, B., Zhou, X.: On the placement of RF energy harvesting node in wireless networks with secrecy considerations. In: IEEE Globecom Workshops, pp. 1355–1360 (2014)Google Scholar
  12. 12.
    Xing, H., Liu, L., Zhang, R.: Secrecy wireless information and power transfer in fading wiretap channel. IEEE Trans. Veh. Technol. 65(1), 180–190 (2016)CrossRefGoogle Scholar
  13. 13.
    Shi, Q., Xu, W., Wu, J., Song, E., Wang, Y.: Secure beamforming for MIMO broadcasting with wireless information and power transfer. IEEE Trans. Wirel. Commun. 14(5), 2841–2853 (2015)CrossRefGoogle Scholar
  14. 14.
    Ng, D.W.K., Lo, E.S., Schober, R.: Robust beamforming for secure communication in systems with wireless information and power transfer. IEEE Trans. Wirel. Commun. 13(8), 4599–4615 (2014)CrossRefGoogle Scholar
  15. 15.
    Nasir, A.A., Zhou, X., Durrani, S., Kennedy, R.A.: Relaying protocols for wireless energy harvesting and information processing. IEEE Trans. Wirel. Commun. 12(7), 3622–3636 (2013)CrossRefGoogle Scholar
  16. 16.
    Gradshteyn, I., Ryzhik, I.: Table of Integrals, Series, and Products, 7th edn. Academic Press, Cambridge (2007)zbMATHGoogle Scholar

Copyright information

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2019

Authors and Affiliations

  1. 1.Faculty of Electrical and Electronics EngineeringDuy Tan UniversityDanangVietnam
  2. 2.Graduate SchoolDuy Tan UniversityDanangVietnam

Personalised recommendations