Accumulate Then Transmit: Toward Secure Wireless Powered Communication Networks

Ying Bi, Abbas Jamalipour

Research output: Contribution to journalArticle

5 Citations (Scopus)

Abstract

This paper considers a wireless powered communication network, where a multiantenna power beacon (PB) is employed to assist an energy constrained source to establish secure communications with a destination in the presence of multiple eavesdroppers. We propose a two-phase communication protocol termed as accumulate then transmit to enhance network secrecy. In the energy harvesting phase, the PB transfers radio frequency energy to charge the source; then in the information transmission phase, the PB acts as a friendly jammer to protect the source transmission against eavesdropping. We study the dynamic energy state transitions at the source using an energy discretization method and a finite-state Markov chain. Closed-form expressions are derived for connection outage probability, secrecy outage probability, and effective secrecy throughput, with the aim to evaluate both reliability and security of the proposed protocol. Furthermore, numerical results reveal the impacts of various system parameters on the secrecy performance and demonstrate the superior performance of our proposed protocol over an existing scheme.

Original languageEnglish
Pages (from-to)6301-6310
Number of pages10
JournalIEEE Transactions on Vehicular Technology
Volume67
Issue number7
DOIs
Publication statusPublished - 23 Mar 2018
Externally publishedYes

Fingerprint

Secure Communication
Accumulate
Wireless Communication
Communication Networks
Telecommunication networks
Wireless Networks
Network protocols
Outages
Outage Probability
Energy harvesting
Energy
Electron transitions
Markov processes
Electron energy levels
Energy Harvesting
Discretization Method
Energy Method
Communication Protocol
State Transition
Throughput

Cite this

@article{07fb757e3e5e48a8a66a76e25f6d7b9d,
title = "Accumulate Then Transmit: Toward Secure Wireless Powered Communication Networks",
abstract = "This paper considers a wireless powered communication network, where a multiantenna power beacon (PB) is employed to assist an energy constrained source to establish secure communications with a destination in the presence of multiple eavesdroppers. We propose a two-phase communication protocol termed as accumulate then transmit to enhance network secrecy. In the energy harvesting phase, the PB transfers radio frequency energy to charge the source; then in the information transmission phase, the PB acts as a friendly jammer to protect the source transmission against eavesdropping. We study the dynamic energy state transitions at the source using an energy discretization method and a finite-state Markov chain. Closed-form expressions are derived for connection outage probability, secrecy outage probability, and effective secrecy throughput, with the aim to evaluate both reliability and security of the proposed protocol. Furthermore, numerical results reveal the impacts of various system parameters on the secrecy performance and demonstrate the superior performance of our proposed protocol over an existing scheme.",
keywords = "Cooperative jamming, physical layer security, RF energy harvesting, wireless powered communication networks",
author = "Ying Bi and Abbas Jamalipour",
year = "2018",
month = "3",
day = "23",
doi = "10.1109/TVT.2018.2818823",
language = "English",
volume = "67",
pages = "6301--6310",
journal = "IEEE Transactions on Vehicular Communications",
issn = "0018-9545",
publisher = "IEEE, Institute of Electrical and Electronics Engineers",
number = "7",

}

Accumulate Then Transmit: Toward Secure Wireless Powered Communication Networks. / Bi, Ying; Jamalipour, Abbas.

In: IEEE Transactions on Vehicular Technology, Vol. 67, No. 7, 23.03.2018, p. 6301-6310.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Accumulate Then Transmit: Toward Secure Wireless Powered Communication Networks

AU - Bi, Ying

AU - Jamalipour, Abbas

PY - 2018/3/23

Y1 - 2018/3/23

N2 - This paper considers a wireless powered communication network, where a multiantenna power beacon (PB) is employed to assist an energy constrained source to establish secure communications with a destination in the presence of multiple eavesdroppers. We propose a two-phase communication protocol termed as accumulate then transmit to enhance network secrecy. In the energy harvesting phase, the PB transfers radio frequency energy to charge the source; then in the information transmission phase, the PB acts as a friendly jammer to protect the source transmission against eavesdropping. We study the dynamic energy state transitions at the source using an energy discretization method and a finite-state Markov chain. Closed-form expressions are derived for connection outage probability, secrecy outage probability, and effective secrecy throughput, with the aim to evaluate both reliability and security of the proposed protocol. Furthermore, numerical results reveal the impacts of various system parameters on the secrecy performance and demonstrate the superior performance of our proposed protocol over an existing scheme.

AB - This paper considers a wireless powered communication network, where a multiantenna power beacon (PB) is employed to assist an energy constrained source to establish secure communications with a destination in the presence of multiple eavesdroppers. We propose a two-phase communication protocol termed as accumulate then transmit to enhance network secrecy. In the energy harvesting phase, the PB transfers radio frequency energy to charge the source; then in the information transmission phase, the PB acts as a friendly jammer to protect the source transmission against eavesdropping. We study the dynamic energy state transitions at the source using an energy discretization method and a finite-state Markov chain. Closed-form expressions are derived for connection outage probability, secrecy outage probability, and effective secrecy throughput, with the aim to evaluate both reliability and security of the proposed protocol. Furthermore, numerical results reveal the impacts of various system parameters on the secrecy performance and demonstrate the superior performance of our proposed protocol over an existing scheme.

KW - Cooperative jamming

KW - physical layer security

KW - RF energy harvesting

KW - wireless powered communication networks

UR - http://www.scopus.com/inward/record.url?scp=85044374655&partnerID=8YFLogxK

U2 - 10.1109/TVT.2018.2818823

DO - 10.1109/TVT.2018.2818823

M3 - Article

VL - 67

SP - 6301

EP - 6310

JO - IEEE Transactions on Vehicular Communications

JF - IEEE Transactions on Vehicular Communications

SN - 0018-9545

IS - 7

ER -