Advertisement

Outage and Intercept Probability Analysis for Energy-Harvesting-Based Half-Duplex Relay Networks Assisted by Power Beacon Under the Existence of Eavesdropper

  • Tan N. Nguyen
  • Phuong T. TranEmail author
  • Nguyen Dao
  • Miroslav Voznak
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 554)

Abstract

In this paper, we propose a half-duplex relaying schemes for wireless sensor networks, in which both source node and relay node are equipped with energy harvesting technology and assisted by a power beacon (PB) to supply energy for their transmission duty. In this network, the security and privacy issues are significant due to the possible eavesdropping by surrounding users. Motivated by this observation, we carefully investigate the security and reliability performance of the proposed systems under the existence of an eavesdropper in the nearby environment. Here, the security performance and the reliability performance are represented by outage probability (OP) and intercept probability (IP), respectively. The power-splitting energy harvesting protocol is applied in our analysis. We rigorously derive the closed-form expressions of both OP and IP of the system and study the effect of various parameters, including power-splitting factors, channel parameters, transmit power, and noise power, on these performance factors. Finally, Monte Carlo simulation results are also performed to confirm the correctness of all theoretical analysis derived.

Keywords

Energy harvesting Physical layer security Half-duplex Power beacon Intercept probability Outage probability 

Notes

Acknowledgment

This research received funding from the grant No. SP2018/59 conducted by VSB-Technical University of Ostrava, Czech Republic.

References

  1. 1.
    Alshaheen, H., Takruri-Rizk, H.: Energy saving and reliability for wireless body sensor networks (WBSN). IEEE Access 6, 16678–16695 (2018)CrossRefGoogle Scholar
  2. 2.
    Wei, Y., Ma, X., Yang, N., Chen, Y.: Energy-saving traffic scheduling in hybrid software defined wireless rechargeable sensor networks. Sensors 17(9), 2126 (2017)CrossRefGoogle Scholar
  3. 3.
    Lei, L., Yuan, D., Ho, C.K., Sun, S.: Optimal cell clustering and activation for energy saving in load-coupled wireless networks. IEEE Trans. Wirel. Commun. 14(11), 6150–6163 (2015)CrossRefGoogle Scholar
  4. 4.
    Ren, J., Zhang, Y., Zhang, N., Zhang, D., Shen, X.: Dynamic channel access to improve energy efficiency in cognitive radio sensor networks. IEEE Trans. Wirel. Commun. 15(5), 3143–3156 (2016)CrossRefGoogle Scholar
  5. 5.
    Ulukus, S., Yener, A., Erkip, E., Simeone, O., Zorzi, M., Grover, P., Huang, K.: Energy harvesting wireless communications: a review of recent advances. IEEE J. Sel. Areas Commun. 33(3), 360–381 (2015)CrossRefGoogle Scholar
  6. 6.
    Bi, S., Ho, C.K., Zhang, R.: Recent advances in joint wireless energy and information transfer. In: 2014 IEEE Information Theory Workshop (ITW), pp. 341–345, November 2014Google Scholar
  7. 7.
    Varshney, L.R.: Transporting information and energy simultaneously. In: 2008 IEEE International Symposium on Information Theory, pp. 1612–1616, July 2008Google Scholar
  8. 8.
    Zhou, X., Li, Q.: Energy efficiency for swipt in mimo two-way amplify-and-forward relay networks. IEEE Trans. Veh. Technol. 67(6), 4910–4924 (2018)CrossRefGoogle Scholar
  9. 9.
    Huang, K., Lau, V.K.N.: Enabling wireless power transfer in cellular networks: architecture, modeling and deployment. IEEE Trans. Wirel. Commun. 13(2), 902–912 (2014)CrossRefGoogle Scholar
  10. 10.
    Nguyen, T.N., Quang Minh, T.H., Tran, P.T., Vozňák, M.: Energy harvesting over Rician fading channel: a performance analysis for half-duplex bidirectional sensor networks under hardware impairments. Sensors 18(6), 1781 (2018)CrossRefGoogle Scholar
  11. 11.
    Peng, H., Lin, Y., Lu, W., Xie, L., Liu, X., Hua, J.: Joint resource optimization for DF relaying SWIPT based cognitive sensor networks. Phys. Commun. 27, 93–98 (2018). http://www.sciencedirect.com/science/article/pii/S1874490717306213CrossRefGoogle Scholar
  12. 12.
    Grover, P., Sahai, A.: Shannon meets Tesla: wireless information and power transfer. In: 2010 IEEE International Symposium on Information Theory, pp. 2363–2367, June 2010Google Scholar
  13. 13.
    Zhang, R., Ho, C.K.: Mimo broadcasting for simultaneous wireless information and power transfer. In: Global Telecommunications Conference (GLOBECOM 2011), pp. 1–5. IEEE, December 2011Google Scholar
  14. 14.
    Nasir, A.A., Zhou, X., Durrani, S., Kennedy, R.A.: Relaying protocols for wireless energy harvesting and information processing. IEEE Trans. Wirel. Commun. 12(7), 3622–3636 (2013)CrossRefGoogle Scholar
  15. 15.
    Nasir, A.A., Zhou, X., Durrani, S., Kennedy, R.A.: Throughput and ergodic capacity of wireless energy harvesting based DF relaying network. In: 2014 IEEE International Conference on Communications (ICC), pp. 4066–4071, June 2014Google Scholar
  16. 16.
    Le, N.P.: Throughput analysis of power-beacon-assisted energy harvesting wireless systems over non-identical Nakagami- \({m}\) fading channels. IEEE Commun. Lett. 22(4), 840–843 (2018)Google Scholar
  17. 17.
    Zhou, X., Guo, J., Durrani, S., Renzo, M.D.: Power beacon-assisted millimeter wave Ad Hoc networks. IEEE Trans. Commun. 66(2), 830–844 (2018)CrossRefGoogle Scholar
  18. 18.
    Liang, H., Zhong, C., Lin, H., Suraweera, H.A., Qu, F., Zhang, Z.: Optimization of power beacon assisted wireless powered two-way relaying systems under user fairness. In: 2017 IEEE Global Communications Conference, GLOBECOM 2017, pp. 1–6, December 2017Google Scholar
  19. 19.
    Wyner, A.D.: The wire-tap channel. Bell Syst. Tech. J. 54(8), 1355–1387 (1975)MathSciNetCrossRefGoogle Scholar
  20. 20.
    Wang, L., Wong, K., Jin, S., Zheng, G., Heath Jr., R.W.: A new look at physical layer security, caching, and wireless energy harvesting for heterogeneous ultra-dense networks. IEEE Commun. Mag. 56(6), 49–55 (2018).  https://doi.org/10.1109/MCOM.2018.1700439CrossRefGoogle Scholar
  21. 21.
    Obeed, M., Mesbah, W.: Efficient algorithms for physical layer security in two-way relay systems. Phys. Commun. 28, 78–88 (2018). http://www.sciencedirect.com/science/article/pii/S1874490717304378CrossRefGoogle Scholar
  22. 22.
    Shah, H.A., Koo, I.: A novel physical layer security scheme in OFDM-based cognitive radio networks. IEEE Access 6, 29486–29498 (2018)CrossRefGoogle Scholar
  23. 23.
    Huang, Y., Zhang, P., Wang, J., Wu, Q.: Secure transmission in power beacon assisted wireless communication networks. In: 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), pp. 1–6, October 2017Google Scholar
  24. 24.
    Jiang, X., Zhong, C., Zhang, Z., Karagiannidis, G.K.: Power beacon assisted wiretap channels with jamming. IEEE Trans. Wirel. Commun. 15(12), 8353–8367 (2016)CrossRefGoogle Scholar
  25. 25.
    Zhong, C., Jin, S., Wong, K.K., McKay, M.R.: Ergodic mutual information analysis for multi-keyhole MIMO channels. IEEE Trans. Wirel. Commun. 10(6), 1754–1763 (2011)CrossRefGoogle Scholar
  26. 26.
    Mo, J., Tao, M., Liu, Y.: Relay placement for physical layer security: a secure connection perspective. IEEE Commun. Lett. 16(6), 878–881 (2012)CrossRefGoogle Scholar
  27. 27.
    Duy, T.T., Son, P.N.: Secrecy performances of multicast underlay cognitive protocols with partial relay selection and without eavesdropper’s information. KSII Trans. Internet Inf. Syst. 9(11), 4623–4643 (2015)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Tan N. Nguyen
    • 1
    • 2
  • Phuong T. Tran
    • 1
    Email author
  • Nguyen Dao
    • 3
  • Miroslav Voznak
    • 1
    • 2
  1. 1.Wireless Communications Research Group, Faculty of Electrical and Electronics EngineeringTon Duc Thang UniversityHo Chi Minh CityVietnam
  2. 2.VSB-Technical University of OstravaOstrava - PorubaCzech Republic
  3. 3.Faculty of Electrical and Electronics EngineeringTon Duc Thang UniversityHo Chi Minh CityVietnam

Personalised recommendations