TY - JOUR
T1 - Accumulate Then Transmit: Toward Secure Wireless Powered Communication Networks
AU - Bi, Ying
AU - Jamalipour, Abbas
PY - 2018/7
Y1 - 2018/7
N2 - This paper considers a wireless powered communication network, where a multiantenna power beacon (PB) is employed to assist an energy constrained source to establish secure communications with a destination in the presence of multiple eavesdroppers. We propose a two-phase communication protocol termed as accumulate then transmit to enhance network secrecy. In the energy harvesting phase, the PB transfers radio frequency energy to charge the source; then in the information transmission phase, the PB acts as a friendly jammer to protect the source transmission against eavesdropping. We study the dynamic energy state transitions at the source using an energy discretization method and a finite-state Markov chain. Closed-form expressions are derived for connection outage probability, secrecy outage probability, and effective secrecy throughput, with the aim to evaluate both reliability and security of the proposed protocol. Furthermore, numerical results reveal the impacts of various system parameters on the secrecy performance and demonstrate the superior performance of our proposed protocol over an existing scheme.
AB - This paper considers a wireless powered communication network, where a multiantenna power beacon (PB) is employed to assist an energy constrained source to establish secure communications with a destination in the presence of multiple eavesdroppers. We propose a two-phase communication protocol termed as accumulate then transmit to enhance network secrecy. In the energy harvesting phase, the PB transfers radio frequency energy to charge the source; then in the information transmission phase, the PB acts as a friendly jammer to protect the source transmission against eavesdropping. We study the dynamic energy state transitions at the source using an energy discretization method and a finite-state Markov chain. Closed-form expressions are derived for connection outage probability, secrecy outage probability, and effective secrecy throughput, with the aim to evaluate both reliability and security of the proposed protocol. Furthermore, numerical results reveal the impacts of various system parameters on the secrecy performance and demonstrate the superior performance of our proposed protocol over an existing scheme.
KW - Cooperative jamming
KW - physical layer security
KW - RF energy harvesting
KW - wireless powered communication networks
UR - http://www.scopus.com/inward/record.url?scp=85044374655&partnerID=8YFLogxK
U2 - 10.1109/TVT.2018.2818823
DO - 10.1109/TVT.2018.2818823
M3 - Article
AN - SCOPUS:85044374655
SN - 0018-9545
VL - 67
SP - 6301
EP - 6310
JO - IEEE Transactions on Vehicular Technology
JF - IEEE Transactions on Vehicular Technology
IS - 7
ER -