Secrecy Outage Minimization for Wireless-Powered Relay Networks With Destination-Assisted Cooperative Jamming
To solve security vulnerability and energy scarcity problems in relay, we propose two secure relaying protocols, power splitting-based relaying (PSR) and time switching-based relaying (TSR), in a wireless-powered relay network with destination-assisted cooperative jamming. In these protocols, the re...
Gespeichert in:
Veröffentlicht in: | IEEE internet of things journal 2021-02, Vol.8 (3), p.1467-1476 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1476 |
---|---|
container_issue | 3 |
container_start_page | 1467 |
container_title | IEEE internet of things journal |
container_volume | 8 |
creator | Lee, Kisong Bang, Junseong Choi, Hyun-Ho |
description | To solve security vulnerability and energy scarcity problems in relay, we propose two secure relaying protocols, power splitting-based relaying (PSR) and time switching-based relaying (TSR), in a wireless-powered relay network with destination-assisted cooperative jamming. In these protocols, the relay adaptively controls the amount of energy harvested from the received signals using PS or TS policy, considering information leakage to the eavesdropper. We first prove the convexity of the secrecy outage probability with respect to the PS ratio ( \rho ) and TS ratio ( \alpha ), and then derive the closed-form expressions of the optimal \rho and \alpha for minimizing secrecy outage under the signal-to-noise ratio (SNR) assumption. Numerical results reveal that the proposed PSR and TSR protocols using the derived \rho and \alpha can achieve near-optimal performance in terms of secrecy outage. It is observed that the optimal \rho and \alpha do not depend on the eavesdropping channels in a high SNR regime such that the near-optimal secrecy outage can be achieved practically without knowledge of the eavesdropper location. Furthermore, intensive simulations reveal that it is advantageous to allocate more power to energy harvesting for PSR, whereas more time to signal processing for TSR to minimize secrecy outage. |
doi_str_mv | 10.1109/JIOT.2020.3013573 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_crossref_primary_10_1109_JIOT_2020_3013573</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9154423</ieee_id><sourcerecordid>2480866048</sourcerecordid><originalsourceid>FETCH-LOGICAL-c293t-38607de66e08bf51155a304bd6cddbe5b4ba57d1fbb6805d17f816c13eabab3f3</originalsourceid><addsrcrecordid>eNpNkF1PwjAUhhujiQT5AcabJV4P-7F22yXBLwiKUYyXTbudYZGt2A4J_nqLEONVT3qe55yTF6FzgvuE4PxqPJrO-hRT3GeYMJ6yI9ShjKZxIgQ9_lefop73C4xx0DjJRQfVL1A4KLbRdN2qOUQPpjG1-VatsU1UWRe9GQdL8D5-shtwUEbPsFTb6BHajXUfPvTb9-gafGuaXykeeG98G8ChtStw4fMLorGqa9PMz9BJpZYeeoe3i15vb2bD-3gyvRsNB5O4oDlrY5YJnJYgBOBMV5wQzhXDiS5FUZYauE604mlJKq1FhnlJ0iojoiAMlFaaVayLLvdzV85-rsNxcmHXrgkrJU0ynAmBkyxQZE8VznrvoJIrZ2rltpJguQtW7oKVu2DlIdjgXOwdAwB_fE54klDGfgD7AnY_</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2480866048</pqid></control><display><type>article</type><title>Secrecy Outage Minimization for Wireless-Powered Relay Networks With Destination-Assisted Cooperative Jamming</title><source>IEEE Electronic Library (IEL)</source><creator>Lee, Kisong ; Bang, Junseong ; Choi, Hyun-Ho</creator><creatorcontrib>Lee, Kisong ; Bang, Junseong ; Choi, Hyun-Ho</creatorcontrib><description><![CDATA[To solve security vulnerability and energy scarcity problems in relay, we propose two secure relaying protocols, power splitting-based relaying (PSR) and time switching-based relaying (TSR), in a wireless-powered relay network with destination-assisted cooperative jamming. In these protocols, the relay adaptively controls the amount of energy harvested from the received signals using PS or TS policy, considering information leakage to the eavesdropper. We first prove the convexity of the secrecy outage probability with respect to the PS ratio (<inline-formula> <tex-math notation="LaTeX">\rho </tex-math></inline-formula>) and TS ratio (<inline-formula> <tex-math notation="LaTeX">\alpha </tex-math></inline-formula>), and then derive the closed-form expressions of the optimal <inline-formula> <tex-math notation="LaTeX">\rho </tex-math></inline-formula> and <inline-formula> <tex-math notation="LaTeX">\alpha </tex-math></inline-formula> for minimizing secrecy outage under the signal-to-noise ratio (SNR) assumption. Numerical results reveal that the proposed PSR and TSR protocols using the derived <inline-formula> <tex-math notation="LaTeX">\rho </tex-math></inline-formula> and <inline-formula> <tex-math notation="LaTeX">\alpha </tex-math></inline-formula> can achieve near-optimal performance in terms of secrecy outage. It is observed that the optimal <inline-formula> <tex-math notation="LaTeX">\rho </tex-math></inline-formula> and <inline-formula> <tex-math notation="LaTeX">\alpha </tex-math></inline-formula> do not depend on the eavesdropping channels in a high SNR regime such that the near-optimal secrecy outage can be achieved practically without knowledge of the eavesdropper location. Furthermore, intensive simulations reveal that it is advantageous to allocate more power to energy harvesting for PSR, whereas more time to signal processing for TSR to minimize secrecy outage.]]></description><identifier>ISSN: 2327-4662</identifier><identifier>EISSN: 2327-4662</identifier><identifier>DOI: 10.1109/JIOT.2020.3013573</identifier><identifier>CODEN: IITJAU</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Convexity ; Cooperative jamming ; Eavesdropping ; Energy harvesting ; energy harvesting (EH) ; Internet of Things ; Jamming ; Optimization ; physical-layer security ; Protocol (computers) ; Protocols ; Relay networks ; Relay networks (telecommunications) ; Relaying ; secrecy outage probability ; secure relaying protocol ; Signal processing ; Signal to noise ratio ; Wireless networks</subject><ispartof>IEEE internet of things journal, 2021-02, Vol.8 (3), p.1467-1476</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c293t-38607de66e08bf51155a304bd6cddbe5b4ba57d1fbb6805d17f816c13eabab3f3</citedby><cites>FETCH-LOGICAL-c293t-38607de66e08bf51155a304bd6cddbe5b4ba57d1fbb6805d17f816c13eabab3f3</cites><orcidid>0000-0002-6785-2596 ; 0000-0001-8206-4558</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9154423$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,27901,27902,54733</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/9154423$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Lee, Kisong</creatorcontrib><creatorcontrib>Bang, Junseong</creatorcontrib><creatorcontrib>Choi, Hyun-Ho</creatorcontrib><title>Secrecy Outage Minimization for Wireless-Powered Relay Networks With Destination-Assisted Cooperative Jamming</title><title>IEEE internet of things journal</title><addtitle>JIoT</addtitle><description><![CDATA[To solve security vulnerability and energy scarcity problems in relay, we propose two secure relaying protocols, power splitting-based relaying (PSR) and time switching-based relaying (TSR), in a wireless-powered relay network with destination-assisted cooperative jamming. In these protocols, the relay adaptively controls the amount of energy harvested from the received signals using PS or TS policy, considering information leakage to the eavesdropper. We first prove the convexity of the secrecy outage probability with respect to the PS ratio (<inline-formula> <tex-math notation="LaTeX">\rho </tex-math></inline-formula>) and TS ratio (<inline-formula> <tex-math notation="LaTeX">\alpha </tex-math></inline-formula>), and then derive the closed-form expressions of the optimal <inline-formula> <tex-math notation="LaTeX">\rho </tex-math></inline-formula> and <inline-formula> <tex-math notation="LaTeX">\alpha </tex-math></inline-formula> for minimizing secrecy outage under the signal-to-noise ratio (SNR) assumption. Numerical results reveal that the proposed PSR and TSR protocols using the derived <inline-formula> <tex-math notation="LaTeX">\rho </tex-math></inline-formula> and <inline-formula> <tex-math notation="LaTeX">\alpha </tex-math></inline-formula> can achieve near-optimal performance in terms of secrecy outage. It is observed that the optimal <inline-formula> <tex-math notation="LaTeX">\rho </tex-math></inline-formula> and <inline-formula> <tex-math notation="LaTeX">\alpha </tex-math></inline-formula> do not depend on the eavesdropping channels in a high SNR regime such that the near-optimal secrecy outage can be achieved practically without knowledge of the eavesdropper location. Furthermore, intensive simulations reveal that it is advantageous to allocate more power to energy harvesting for PSR, whereas more time to signal processing for TSR to minimize secrecy outage.]]></description><subject>Convexity</subject><subject>Cooperative jamming</subject><subject>Eavesdropping</subject><subject>Energy harvesting</subject><subject>energy harvesting (EH)</subject><subject>Internet of Things</subject><subject>Jamming</subject><subject>Optimization</subject><subject>physical-layer security</subject><subject>Protocol (computers)</subject><subject>Protocols</subject><subject>Relay networks</subject><subject>Relay networks (telecommunications)</subject><subject>Relaying</subject><subject>secrecy outage probability</subject><subject>secure relaying protocol</subject><subject>Signal processing</subject><subject>Signal to noise ratio</subject><subject>Wireless networks</subject><issn>2327-4662</issn><issn>2327-4662</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpNkF1PwjAUhhujiQT5AcabJV4P-7F22yXBLwiKUYyXTbudYZGt2A4J_nqLEONVT3qe55yTF6FzgvuE4PxqPJrO-hRT3GeYMJ6yI9ShjKZxIgQ9_lefop73C4xx0DjJRQfVL1A4KLbRdN2qOUQPpjG1-VatsU1UWRe9GQdL8D5-shtwUEbPsFTb6BHajXUfPvTb9-gafGuaXykeeG98G8ChtStw4fMLorGqa9PMz9BJpZYeeoe3i15vb2bD-3gyvRsNB5O4oDlrY5YJnJYgBOBMV5wQzhXDiS5FUZYauE604mlJKq1FhnlJ0iojoiAMlFaaVayLLvdzV85-rsNxcmHXrgkrJU0ynAmBkyxQZE8VznrvoJIrZ2rltpJguQtW7oKVu2DlIdjgXOwdAwB_fE54klDGfgD7AnY_</recordid><startdate>20210201</startdate><enddate>20210201</enddate><creator>Lee, Kisong</creator><creator>Bang, Junseong</creator><creator>Choi, Hyun-Ho</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0002-6785-2596</orcidid><orcidid>https://orcid.org/0000-0001-8206-4558</orcidid></search><sort><creationdate>20210201</creationdate><title>Secrecy Outage Minimization for Wireless-Powered Relay Networks With Destination-Assisted Cooperative Jamming</title><author>Lee, Kisong ; Bang, Junseong ; Choi, Hyun-Ho</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c293t-38607de66e08bf51155a304bd6cddbe5b4ba57d1fbb6805d17f816c13eabab3f3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Convexity</topic><topic>Cooperative jamming</topic><topic>Eavesdropping</topic><topic>Energy harvesting</topic><topic>energy harvesting (EH)</topic><topic>Internet of Things</topic><topic>Jamming</topic><topic>Optimization</topic><topic>physical-layer security</topic><topic>Protocol (computers)</topic><topic>Protocols</topic><topic>Relay networks</topic><topic>Relay networks (telecommunications)</topic><topic>Relaying</topic><topic>secrecy outage probability</topic><topic>secure relaying protocol</topic><topic>Signal processing</topic><topic>Signal to noise ratio</topic><topic>Wireless networks</topic><toplevel>online_resources</toplevel><creatorcontrib>Lee, Kisong</creatorcontrib><creatorcontrib>Bang, Junseong</creatorcontrib><creatorcontrib>Choi, Hyun-Ho</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE internet of things journal</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Lee, Kisong</au><au>Bang, Junseong</au><au>Choi, Hyun-Ho</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Secrecy Outage Minimization for Wireless-Powered Relay Networks With Destination-Assisted Cooperative Jamming</atitle><jtitle>IEEE internet of things journal</jtitle><stitle>JIoT</stitle><date>2021-02-01</date><risdate>2021</risdate><volume>8</volume><issue>3</issue><spage>1467</spage><epage>1476</epage><pages>1467-1476</pages><issn>2327-4662</issn><eissn>2327-4662</eissn><coden>IITJAU</coden><abstract><![CDATA[To solve security vulnerability and energy scarcity problems in relay, we propose two secure relaying protocols, power splitting-based relaying (PSR) and time switching-based relaying (TSR), in a wireless-powered relay network with destination-assisted cooperative jamming. In these protocols, the relay adaptively controls the amount of energy harvested from the received signals using PS or TS policy, considering information leakage to the eavesdropper. We first prove the convexity of the secrecy outage probability with respect to the PS ratio (<inline-formula> <tex-math notation="LaTeX">\rho </tex-math></inline-formula>) and TS ratio (<inline-formula> <tex-math notation="LaTeX">\alpha </tex-math></inline-formula>), and then derive the closed-form expressions of the optimal <inline-formula> <tex-math notation="LaTeX">\rho </tex-math></inline-formula> and <inline-formula> <tex-math notation="LaTeX">\alpha </tex-math></inline-formula> for minimizing secrecy outage under the signal-to-noise ratio (SNR) assumption. Numerical results reveal that the proposed PSR and TSR protocols using the derived <inline-formula> <tex-math notation="LaTeX">\rho </tex-math></inline-formula> and <inline-formula> <tex-math notation="LaTeX">\alpha </tex-math></inline-formula> can achieve near-optimal performance in terms of secrecy outage. It is observed that the optimal <inline-formula> <tex-math notation="LaTeX">\rho </tex-math></inline-formula> and <inline-formula> <tex-math notation="LaTeX">\alpha </tex-math></inline-formula> do not depend on the eavesdropping channels in a high SNR regime such that the near-optimal secrecy outage can be achieved practically without knowledge of the eavesdropper location. Furthermore, intensive simulations reveal that it is advantageous to allocate more power to energy harvesting for PSR, whereas more time to signal processing for TSR to minimize secrecy outage.]]></abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/JIOT.2020.3013573</doi><tpages>10</tpages><orcidid>https://orcid.org/0000-0002-6785-2596</orcidid><orcidid>https://orcid.org/0000-0001-8206-4558</orcidid></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 2327-4662 |
ispartof | IEEE internet of things journal, 2021-02, Vol.8 (3), p.1467-1476 |
issn | 2327-4662 2327-4662 |
language | eng |
recordid | cdi_crossref_primary_10_1109_JIOT_2020_3013573 |
source | IEEE Electronic Library (IEL) |
subjects | Convexity Cooperative jamming Eavesdropping Energy harvesting energy harvesting (EH) Internet of Things Jamming Optimization physical-layer security Protocol (computers) Protocols Relay networks Relay networks (telecommunications) Relaying secrecy outage probability secure relaying protocol Signal processing Signal to noise ratio Wireless networks |
title | Secrecy Outage Minimization for Wireless-Powered Relay Networks With Destination-Assisted Cooperative Jamming |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-06T20%3A29%3A52IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Secrecy%20Outage%20Minimization%20for%20Wireless-Powered%20Relay%20Networks%20With%20Destination-Assisted%20Cooperative%20Jamming&rft.jtitle=IEEE%20internet%20of%20things%20journal&rft.au=Lee,%20Kisong&rft.date=2021-02-01&rft.volume=8&rft.issue=3&rft.spage=1467&rft.epage=1476&rft.pages=1467-1476&rft.issn=2327-4662&rft.eissn=2327-4662&rft.coden=IITJAU&rft_id=info:doi/10.1109/JIOT.2020.3013573&rft_dat=%3Cproquest_RIE%3E2480866048%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2480866048&rft_id=info:pmid/&rft_ieee_id=9154423&rfr_iscdi=true |