Secrecy Performance of Wireless Powered Communication Networks With Multiple Eavesdroppers and Outdated CSI

被引:14
|
作者
Huang, Yuzhen [1 ,2 ]
Zhang, Ping [1 ]
Wu, Qihui [3 ]
Wang, Jinlong [4 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Informat & Commun, Beijing 100876, Peoples R China
[2] Natl Innovat Inst Def Technol, Artificial Intelligence Res Ctr, Beijing 100166, Peoples R China
[3] Nanjing Univ Aeronaut & Astronaut, Dept Elect & Informat Engn, Nanjing 210007, Jiangsu, Peoples R China
[4] PLA Univ Sci & Technol, Coll Commun Engn, Nanjing 210007, Jiangsu, Peoples R China
来源
IEEE ACCESS | 2018年 / 6卷
基金
中国博士后科学基金; 美国国家科学基金会;
关键词
Physical layer security; wireless powered wiretap channel; outdated channel state information; secrecy outage probability; ergodic secrecy capacity; SECURE TRANSMISSION; WIRETAP CHANNELS; INFORMATION; INTERFERENCE; ARCHITECTURE; SELECTION;
D O I
10.1109/ACCESS.2018.2835832
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we present a comprehensive secrecy performance analysis of wireless powered communication networks with multiple eavesdroppers, where an energy-limited information source with multiple antennas harvests the radio frequency energy from a dedicated power beacon (PB) before transmission. To exploit the benefits of multiple antennas at source, two popular multi-antenna transmission schemes, i.e., maximal ratio transmission and transmit antenna selection, are investigated for two intercepting ways at Eves, i.e., non-colluding and colluding scenarios, respectively. Specifically, adopting the time-switching protocol at PB, we derive exact closed-form expressions of the secrecy outage probability and the average secrecy rate for both two transmission schemes taking into account the outdated channel state information. Furthermore, in order to deeply extract insights on the system design, we further present tractable asymptotic secrecy outage probability and ergodic secrecy capacity at high signal-to-noise ratio regimes, which easily enable us to obtain the secrecy diversity order and coding gain of two transmission schemes, respectively. From our analysis, several important concluding remarks are obtained as follows: 1) full secrecy diversity order can be achieved by both two transmission schemes with no feedback delay, however, it reduces to one in the presence of feedback delay; 2) as the number of eavesdroppers increases, the secrecy performance gap between non-colluding and colluding scenarios becomes large; and 3) maximal ratio transmission (MRT) scheme always outperforms transmit antenna selection (TAS) scheme with no feedback delay. However, TAS scheme achieves a similar performance as MRT scheme or even better in moderate and even serious feedback delay conditions.
引用
收藏
页码:33774 / 33788
页数:15
相关论文
共 50 条
  • [11] Secrecy performance of TAS in MIMOME system with outdated CSI
    Hu, Jianwei
    Cai, Yueming
    Yang, Weiwei
    [J]. Journal of Information and Computational Science, 2014, 11 (13): : 4535 - 4545
  • [12] Secure Communication with Wireless Powered Friendly Jammers under Multiple Eavesdroppers
    He, Dongxuan
    Zhou, He
    Wang, Hua
    Yang, Dewei
    [J]. 2019 IEEE 89TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2019-SPRING), 2019,
  • [13] On Covert Communication Performance With Outdated CSI in Wireless Greedy Relay Systems
    Bai, Jiaqing
    He, Ji
    Chen, Yanping
    Shen, Yulong
    Jiang, Xiaohong
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 2920 - 2935
  • [14] Robust Resource Allocation for Secrecy Wireless Powered Communication Networks
    Wu, Yanan
    Chen, Xiaoming
    Yuen, Chau
    Zhong, Caijun
    [J]. IEEE COMMUNICATIONS LETTERS, 2016, 20 (12) : 2430 - 2433
  • [15] Secrecy Performance Analysis of Energy Harvesting Wireless Networks with Multiple Power Transfer Stations and Destinations in the Presence of Multiple Eavesdroppers
    Tien-Vu Truong
    Dac-Binh Ha
    Nhan-Van Vo
    Due-Dung Tran
    [J]. 2016 3RD NATIONAL FOUNDATION FOR SCIENCE AND TECHNOLOGY DEVELOPMENT CONFERENCE ON INFORMATION AND COMPUTER SCIENCE (NICS), 2016, : 107 - 112
  • [16] On the secrecy capacity of fading wireless channel with multiple eavesdroppers
    Wang, Peiya
    Yu, Guanding
    Zhang, Zhaoyang
    [J]. 2007 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, VOLS 1-7, 2007, : 1301 - 1305
  • [17] Secrecy Outage Performance of MISO Wiretap Channels with Outdated CSI
    Ferdinand, Nuwan S.
    da Costa, Daniel Benevides
    de Almeida, Andre L. F.
    Latva-aho, Matti
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC), 2014, : 789 - 793
  • [18] Secrecy performance analysis for transmit antenna selection with outdated CSI
    Wang, Songqing
    Yang, Weiwei
    Zhu, Yun
    [J]. IEICE COMMUNICATIONS EXPRESS, 2013, 2 (10): : 421 - 427
  • [19] Secrecy Outage Performance of Buffer-Aided Underlay Cognitive Relay Networks with Outdated CSI
    Wei, Chen
    Yang, Wendong
    Cai, Yueming
    Tang, Xuanxuan
    Yin, Tinghui
    [J]. 2018 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), 2018, : 168 - 173
  • [20] Impact of outdated CSI on the secrecy performance of dual-hop networks using cooperative jamming
    Mallat, Walid
    Alouane, Wided Hadj
    Boujemaa, Hatem
    Touati, Farid
    [J]. 2019 15TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2019, : 543 - 548