Buffer-Aided Secure Relay Networks With SWIPT

被引:13
|
作者
Ren, Juanjuan [1 ]
Lei, Xianfu [1 ]
Diamantoulakis, Panagiotis D. [1 ,2 ]
Chen, Qingchun [3 ]
Karagiannidis, George K. [1 ,2 ]
机构
[1] Southwest Jiaotong Univ, Sch Informat Sci & Technol, Chengdu 610031, Peoples R China
[2] Aristotle Univ Thessaloniki, Dept Elect & Comp Engn, Thessaloniki 54124, Greece
[3] Guangzhou Univ, Sch Mech & Elect Engn, Guangzhou 510006, Peoples R China
关键词
Resource management; Buffer storage; Throughput; Optimization; Relay networks (telecommunications); Wireless communication; Buffer-aided; SWIPT; Cooperative networks; Physical layer security; Lyapunov optimization; SECRECY RATE MAXIMIZATION; POWER TRANSFER; WIRELESS INFORMATION; THROUGHPUT MAXIMIZATION; COOPERATIVE NETWORKS; JOINT POWER; COMMUNICATION; TRANSMISSION; SELECTION; DESIGN;
D O I
10.1109/TVT.2020.2988357
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we propose the use of data and energy buffering in wireless powered relays, while we also design scheduling schemes, with the aim to increase the secrecy throughput. More specifically, it is assumed that Alice transmits information to Bob by using half-duplex randomize-and-forward relaying with simultaneous wireless information and power transfer, under the existence of a passive eavesdropper. First, considering a conventional system, i.e., without energy and data buffering, an optimal baseline policy is designed. Then, focusing on buffer-aided relaying, we maximize the average secrecy throughput under the stability requirement for data and energy queues by using the framework of Lyapunov optimization, according to which, we transform the initial stochastic optimization problem into a sequence of online subproblems. The proposed online adaptive transmission policy dynamically allocates the available resources, i.e., time and power, with respect to the channel state information, as well as the states of the buffers. In addition, our analysis reveals the existence of an interesting trade-off between the average secrecy throughput and the average queue delay. Simulation results validate the analysis and demonstrate that the proposed buffer-aided scheme significantly improves the average secrecy throughput compared to the baseline one.
引用
收藏
页码:6485 / 6499
页数:15
相关论文
共 50 条
  • [1] On Effects of Feedback Delay in Secure Buffer-Aided Relay Networks
    Shrestha, Anish Prasad
    Kwak, Kyung Sup
    [J]. 2015 INTERNATIONAL CONFERENCE ON ICT CONVERGENCE (ICTC), 2015, : 116 - 120
  • [2] Secure Performance Analysis of Buffer-aided Cognitive Relay Networks
    Sun, Aiwei
    Liang, Tao
    Zhang, Yajun
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2015, : 490 - 495
  • [3] Secure Transmission for Buffer-Aided Relay Networks with Delay Constraints
    Du, Qinghe
    Xu, Ying
    [J]. 2019 COMPUTING, COMMUNICATIONS AND IOT APPLICATIONS (COMCOMAP), 2019, : 259 - 264
  • [4] Secure Transmission for Buffer-Aided Relay Networks in the Internet of Things
    Wei, Chen
    Yang, Wendong
    Cai, Yueming
    [J]. APPLIED SCIENCES-BASEL, 2019, 9 (21):
  • [5] Performance of Networks with an Energy Buffer-Aided Source and a Data Buffer-Aided Relay
    Bapatla, Dileep
    Prakriya, Shankar
    [J]. 2020 IEEE 31ST ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS (IEEE PIMRC), 2020,
  • [6] Secure Outage Analysis of Buffer-Aided Cognitive Relay Networks with Multiple Primary Users
    Sun, Aiwei
    Liang, Tao
    Tian, Hui
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2016, E99A (12): : 2296 - 2300
  • [7] Max-Ratio Relay Selection in Secure Buffer-Aided Cooperative Wireless Networks
    Chen, Gaojie
    Tian, Zhao
    Gong, Yu
    Chen, Zhi
    Chambers, Jonathon A.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (04) : 719 - 729
  • [8] Relay Selection for Average Throughput Maximization in Buffer-aided Relay Networks
    Huang, Shiwei
    Cai, Jun
    Zhang, Hong
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2015, : 1994 - 1998
  • [9] SECURE PERFORMANCE ANALYSIS OF BUFFER-AIDED COGNITIVE RELAY NETWORKS UNDER DELAY UNCONSTRAINT CASE
    Sun, Aiwei
    Liang, Tao
    Zhang, Yajun
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING PROCEEDINGS, 2016, : 2164 - 2168
  • [10] Link Selection for Secure Two-Hop Transmissions in Buffer-Aided Relay Wireless Networks
    He, Ji
    Zhang, Yuanyu
    Shen, Yulong
    Jiang, Xiaohong
    [J]. PROCEEDINGS 2016 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS NANA 2016, 2016, : 64 - 68