Optimal Power Allocation for Energy-Efficient Data Transmission Against Full-Duplex Active Eavesdroppers in Wireless Sensor Networks (original) (raw)
Related papers
Mobile Networks and Applications, 2019
In this paper, we investigate the physical layer security (PLS) performance for the Internet of Things (IoT), which is modeled as an IoT sensor network (ISN). The considered system consists of multiple power transfer stations (PTSs), multiple IoT sensor nodes (SNs), one legitimate fusion center (LFC) and multiple eavesdropping fusion centers (EFCs), which attempt to extract the transmitted information at SNs without an active attack. The SNs and the EFCs are equipped with a single antenna, while the LFC is equipped with multiple antennas. Specifically, the SNs harvest energy from the PTSs and then use the harvested energy to transmit the information to the LFC. In this research, the energy harvesting (EH) process is considered in the following two strategies: 1) the SN harvests energy from all PTSs, and 2) the SN harvests energy from the best PTS. To guarantee security for the considered system before the SN sends the packet, the SN's power is controlled by a suitable power policy that is based on the channel state information (CSI), harvested energy, and security constraints. An algorithm for the nearly optimal EH time is implemented. Accordingly, the analytical expressions for the existence probability of secrecy capacity and secrecy outage probability (SOP) are derived by using the statistical characteristics of the signal-to-noise ratio (SNR). In addition, we analyze the secrecy performance for various system parameters, such as the location of system elements, the number of PTSs, and the number of EFCs. Finally, the results of Monte Carlo simulations are provided to confirm the correctness of our analysis and derivation.
Energy Efficient Secure Communication Model against Cooperative Eavesdropper
Applied Sciences
In a wiretap channel system model, the jammer node adopts the energy-harvesting signal as artificial noise (jamming signal) against the cooperative eavesdroppers. There are two eavesdroppers in the wiretap channel: eavesdropper E1 is located near the transmitter and eavesdropper E2 is located near the jammer. The eavesdroppers are equipped with multiple antennas and employ the iterative block decision feedback equalization decoder to estimate the received signal, i.e., information signal at E1 and jamming signal at E2. It is assumed that E1 has the channel state information (CSI) of the channel between transmitter and E1, and similarly, E2 has the CSI of channel between jammer and E2. The eavesdroppers establish communication link between them and cooperate with each other to reduce the information signal interference at E2 and jamming signal interference at E1. The performance of decoders depends on the signal to interference plus noise ratio (SINR) of the received signal. The powe...
Secrecy Rate-Optimum Energy Splitting for an Untrusted and Energy Harvesting Relay Network
IEEE Access
In this paper, a destination-assisted-jamming-based secure transmission is devised for an untrusted and energy harvesting relay network. In the proposed scheme, both source and destination split their energies into two parts for energy harvesting at the relay and transmissions of confidential and cooperative jamming signals, respectively. We formulate an optimization problem to maximize the achievable secrecy rate by jointly optimizing the energy splitting for the source and destination. The existence of the solution for the optimization is carefully analyzed. Due to high complexity of the joint optimization, an iterative optimization algorithm to obtain the near-optimal energy splitting policy is proposed. The numerical results validate that the optimized energy splitting policy leads to a higher achievable secrecy rate, and the iterative algorithm has a quick convergence rate. INDEX TERMS Destination-assisted-jamming (DAJ), energy harvesting (EH), secrecy rate, untrusted relay network.
Max-min fair wireless energy transfer for secure multiuser communication systems
2014 IEEE Information Theory Workshop (ITW 2014), 2014
This paper considers max-min fairness for wireless energy transfer in a downlink multiuser communication system. Our resource allocation design maximizes the minimum harvested energy among multiple multiple-antenna energy harvesting receivers (potential eavesdroppers) while providing quality of service (QoS) for secure communication to multiple singleantenna information receivers. In particular, the algorithm design is formulated as a non-convex optimization problem which takes into account a minimum required signal-to-interference-plusnoise ratio (SINR) constraint at the information receivers and a constraint on the maximum tolerable channel capacity achieved by the energy harvesting receivers for a given transmit power budget. The proposed problem formulation exploits the dual use of artificial noise generation for facilitating efficient wireless energy transfer and secure communication. A semidefinite programming (SDP) relaxation approach is exploited to obtain a global optimal solution of the considered problem. Simulation results demonstrate the significant performance gain in harvested energy that is achieved by the proposed optimal scheme compared to two simple baseline schemes.
Securing Untrusted RF-EH Relay Networks Using Cooperative Jamming Signals
IEEE Access
We propose a new scheme to secure a wireless-powered untrusted cooperative-communication network, where a legitimate source node (Alice) transmits her information messages to a legitimate destination node (Bob) through the multiple amplify-and-forward untrusted relays. The relay nodes are assumed to be honest but curious nodes; hence, they are trusted at the service level but are untrusted at the information level. To reduce the energy consumption of the network, only one relay node is selected in each time slot to forward Alice's information signal. We assume a power-splitting-based energy-harvesting scheme, where each relay node splits its received signal into information and energy streams. Since the relay nodes are assumed to be untrusted at the information level, they attempt to decode the information intended to Bob while harvesting energy at the same time. When the relaying mode is selected, the scheme is realized over two non-overlapping time phases. To prevent any information leakage to the untrusted relay nodes, Bob and a cooperative jammer (John) inject jamming (artificial noise) signals during the first phase. During the second phase, the untrusted relay nodes that will not be forwarding the information signal must harvest energy to accumulate more energy to help Alice in future time slots. Moreover, the cooperative jammer will jam the untrusted relays to further power their batteries and prevent them from decoding the information-forwarding relay signal in case they decided to cheat and decode it. We model the battery state transitions at each relay as a finite-state Markov chain and analyze it. Our numerical results show the security gains of our proposed scheme relative to two benchmark schemes.
Robust Beamforming for Secure Communication in Systems With Wireless Information and Power Transfer
IEEE Transactions on Wireless Communications, 2014
This paper considers a multiuser multiple-input single-output (MISO) downlink system with simultaneous wireless information and power transfer. In particular, we focus on secure communication in the presence of passive eavesdroppers and potential eavesdroppers (idle legitimate receivers). We study the design of a resource allocation algorithm minimizing the total transmit power for the case when the legitimate receivers are able to harvest energy from radio frequency signals. Our design advocates the dual use of both artificial noise and energy signals in providing secure communication and facilitating efficient wireless energy transfer. The algorithm design is formulated as a non-convex optimization problem. The problem formulation takes into account artificial noise and energy signal generation for protecting the transmitted information against both considered types of eavesdroppers when imperfect channel state information (CSI) of the potential eavesdroppers and no CSI of the passive eavesdroppers are available at the transmitter. Besides, the problem formulation also takes into account different quality of service (QoS) requirements: a minimum required signal-tointerference-plus-noise ratio (SINR) at the desired receiver; maximum tolerable SINRs at the potential eavesdroppers; a minimum required outage probability at the passive eavesdroppers; and minimum required heterogeneous amounts of power transferred to the idle legitimate receivers. In light of the intractability of the problem, we reformulate the considered problem by replacing a non-convex probabilistic constraint with a convex deterministic constraint. Then, a semi-definite programming (SDP) relaxation approach is adopted to obtain the optimal solution for the reformulated problem. Furthermore, we propose a suboptimal resource allocation scheme with low computational complexity for providing communication secrecy and facilitating efficient energy transfer. Simulation results demonstrate the close-tooptimal performance of the proposed schemes and significant transmit power savings by optimization of the artificial noise and energy signal generation.
Secure D2D Communication in Large-Scale Cognitive Cellular Networks: A Wireless Power Transfer Model
—In this paper, we investigate secure device-to-device (D2D) communication in energy harvesting large-scale cognitive cellular networks. The energy constrained D2D transmitter harvests energy from multi-antenna equipped power beacons (PBs), and communicates with the corresponding receiver using the spectrum of the primary base stations (BSs). We introduce a power transfer model and an information signal model to enable wireless energy harvesting and secure information transmission. In the power transfer model, three wireless power transfer (WPT) policies are proposed: 1) cooperative power beacons (CPB) power transfer, 2) best power beacon (BPB) power transfer, and 3) nearest power beacon (NPB) power transfer. To characterize the power transfer reliability of the proposed three policies, we derive new expressions for the exact power outage probability. Moreover, the analysis of the power outage probability is extended to the case when PBs are equipped with large antenna arrays. In the information signal model, we present a new comparative framework with two receiver selection schemes: 1) best receiver selection (BRS), where the receiver with the strongest channel is selected, and 2) nearest receiver selection (NRS), where the nearest receiver is selected. To assess the secrecy performance, we derive new analytical expressions for the secrecy outage probability and the secrecy throughput considering the two receiver selection schemes using the proposed WPT policies. We presented Monte-carlo simulation results to corroborate our analysis and show: 1) secrecy performance improves with increasing densities of PBs and D2D receivers due to larger multiuser diversity gain, 2) CPB achieves better secrecy performance than BPB and NPB but consumes more power, and 3) BRS achieves better secrecy performance than NRS but demands more instantaneous feedback and overhead. A pivotal conclusion is reached that with increasing number of antennas at PBs, NPB offers a comparable secrecy performance to that of BPB but with a lower complexity.
Secrecy Wireless Information and Power Transfer in Fading Wiretap Channel
Simultaneous wireless information and power transfer (SWIPT) has recently drawn significant interest for its dual use of radio signals to provide wireless data and energy access at the same time. However, a challenging secrecy communication issue arises as the messages sent to the information receivers (IRs) may be eavesdropped upon by energy receivers (ERs), which are presumed to harvest energy only from received signals. To tackle this problem, we propose in this paper an artificial-noise (AN)-aided transmission scheme to facilitate the secrecy information transmission to IRs and, yet, meet the energy harvesting requirement for ERs, under the assumption that the AN can be canceled at IRs but not at ERs. Specifically, the proposed scheme splits the transmit power into two parts: to send the confidential message to the IR and an AN to interfere with the ER, respectively. Under a simplified three-node wiretap channel setup, the transmit power allocations and power splitting ratios over fading channels are jointly optimized to minimize the outage probability for delay-limited secrecy information transmission or to maximize the average rate for no-delay-limited secrecy information transmission, subject to a combination of average and peak power constraints (APC and PPC) at the transmitter (Tx) and an average energy harvesting constraint at the ER. Both the secrecy outage probability minimization and average rate maximization problems are shown to be nonconvex, and for each, we propose the optimal solution based on the dual decomposition and the suboptimal solution based on the alternating optimization. Furthermore, two benchmark schemes are introduced for comparison where the AN is not used at the Tx and where the AN is used but cannot be canceled by the IR, respectively. Finally, the performances of proposed schemes are evaluated by simulations in terms of various tradeoffs for wireless (secrecy) information versus energy transmissions.