Secure Information Transmissions in Wireless-Powered Cognitive Radio Networks for Internet of Medical Things

被引:0
|
作者
Tang, Kun [1 ,2 ]
Tang, Wenjuan [3 ]
Luo, Entao [2 ]
Tan, Zhiyuan [4 ]
Meng, Weizhi [5 ]
Qi, Lianyong [6 ]
机构
[1] Guangdong Provincial Key Laboratory of Millimeter-Wave and Terahertz, School of Electronic and Information Engineering, South China University of Technology, Guangzhou,510641, China
[2] School of Electronics and Information Engineering, Hunan University of Science and Engineering, Yongzhou,425000, China
[3] College of Computer Science and Electronic Engineering, Hunan University, Changsha,410082, China
[4] School of Computing, Edinburgh Napier University, Edinburgh,EH11 4BN, United Kingdom
[5] Department of Applied Mathematics and Computer Science, Technical University of Denmark, Kongens Lyngby, Lyngby,2800, Denmark
[6] School of Information Science and Engineering, Qufu Normal University, Rizhao,276826, China
来源
基金
中国博士后科学基金;
关键词
Secure communication - Convex optimization - Cognitive radio - Medical information systems - Antennas - Network security - Radio transmission - Transmitters - Beamforming;
D O I
暂无
中图分类号
学科分类号
摘要
In this paper, we consider the issue of the secure transmissions for the cognitive radio-based Internet of Medical Things (IoMT) with wireless energy harvesting. In these systems, a primary transmitter (PT) will transmit its sensitive medical information to a primary receiver (PR) by a multi-antenna-based secondary transmitter (ST), where we consider that a potential eavesdropper may listen to the PT's sensitive information. Meanwhile, the ST also transmits its own information concurrently by utilizing spectrum sharing. We aim to propose a novel scheme for jointly designing the optimal parameters, i.e., energy harvesting (EH) time ratio and secure beamforming vectors, for maximizing the primary secrecy transmission rate while guaranteeing secondary transmission requirement. For solving the nonconvex optimization problem, we transfer the problem into convex optimization form by adopting the semidefinite relaxation (SDR) method and Charnes-Cooper transformation technique. Then, the optimal secure beamforming vectors and energy harvesting duration can be obtained easily by utilizing the CVX tools. According to the simulation results of secrecy transmission rate, i.e., secrecy capacity, we can observe that the proposed protocol for the considered system model can effectively promote the primary secrecy transmission rate when compared with traditional zero-forcing (ZF) scheme, while ensuring the transmission rate of the secondary system. © 2020 Kun Tang et al.
引用
收藏
相关论文
共 50 条
  • [1] Secure Information Transmissions in Wireless-Powered Cognitive Radio Networks for Internet of Medical Things
    Tang, Kun
    Tang, Wenjuan
    Luo, Entao
    Tan, Zhiyuan
    Meng, Weizhi
    Qi, Lianyong
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [2] Secure Beamforming Design with Bidirectional Secondary Transmissions in Wireless-Powered Cognitive Radio Networks
    Tang, Kun
    Shi, Ronghua
    Luo, Entao
    [J]. 2017 15TH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS AND 2017 16TH IEEE INTERNATIONAL CONFERENCE ON UBIQUITOUS COMPUTING AND COMMUNICATIONS (ISPA/IUCC 2017), 2017, : 428 - 432
  • [3] Secure Beamforming in Wireless-Powered Cooperative Cognitive Radio Networks
    Jiang, Li
    Tian, Hui
    Qin, Cheng
    Gjessing, Stein
    Zhang, Yan
    [J]. IEEE COMMUNICATIONS LETTERS, 2016, 20 (03) : 522 - 525
  • [4] A Novel Distributed Resource Allocation Scheme for Wireless-Powered Cognitive Radio Internet of Things Networks
    He, Tengjiao
    Chin, Kwan-Wu
    Soh, Sieteng
    Zhang, Zhen
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (20): : 15486 - 15499
  • [5] Energy-Efficient Secure Communications for Wireless-Powered Cognitive Radio Networks
    Lee, Kisong
    [J]. SENSORS, 2021, 21 (23)
  • [6] Secrecy Wireless-Powered Sensor Networks for Internet of Things
    Li, Junxia
    Zhao, Hui
    Chen, Xueyan
    Chu, Zheng
    Zhen, Li
    Jiang, Jing
    Pervaiz, Haris
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020
  • [7] Full-duplex wireless-powered jammer aided secure communication for cognitive radio networks
    Chen, Xueyan
    Guo, Li
    Li, Xingwang
    Dong, Chao
    Lin, Jiaru
    Cavalcante, Charles C.
    [J]. PHYSICAL COMMUNICATION, 2018, 31 : 103 - 112
  • [8] Secure Green-Oriented Multiuser Scheduling for Wireless-Powered Internet of Things
    Shang, Xiaohui
    Yin, Hao
    Liu, Aijun
    Li, Mu
    Wang, Yida
    Wang, Yong
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020
  • [9] Low-Complexity Transmit Power Control for Secure Communications in Wireless-Powered Cognitive Radio Networks
    Lee, Kisong
    [J]. SENSORS, 2021, 21 (23)
  • [10] Performance analysis of wireless-powered cognitive radio networks with ambient backscatter
    Munir, Daniyal
    Shah, Syed Tariq
    Choi, Kae Won
    Lee, Tae-Jin
    Chung, Min Young
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2019,