Secrecy Outage Minimization for Wireless-Powered Relay Networks With Destination-Assisted Cooperative Jamming

To solve security vulnerability and energy scarcity problems in relay, we propose two secure relaying protocols, power splitting-based relaying (PSR) and time switching-based relaying (TSR), in a wireless-powered relay network with destination-assisted cooperative jamming. In these protocols, the re...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE internet of things journal 2021-02, Vol.8 (3), p.1467-1476
Hauptverfasser: Lee, Kisong, Bang, Junseong, Choi, Hyun-Ho
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 1476
container_issue 3
container_start_page 1467
container_title IEEE internet of things journal
container_volume 8
creator Lee, Kisong
Bang, Junseong
Choi, Hyun-Ho
description To solve security vulnerability and energy scarcity problems in relay, we propose two secure relaying protocols, power splitting-based relaying (PSR) and time switching-based relaying (TSR), in a wireless-powered relay network with destination-assisted cooperative jamming. In these protocols, the relay adaptively controls the amount of energy harvested from the received signals using PS or TS policy, considering information leakage to the eavesdropper. We first prove the convexity of the secrecy outage probability with respect to the PS ratio ( \rho ) and TS ratio ( \alpha ), and then derive the closed-form expressions of the optimal \rho and \alpha for minimizing secrecy outage under the signal-to-noise ratio (SNR) assumption. Numerical results reveal that the proposed PSR and TSR protocols using the derived \rho and \alpha can achieve near-optimal performance in terms of secrecy outage. It is observed that the optimal \rho and \alpha do not depend on the eavesdropping channels in a high SNR regime such that the near-optimal secrecy outage can be achieved practically without knowledge of the eavesdropper location. Furthermore, intensive simulations reveal that it is advantageous to allocate more power to energy harvesting for PSR, whereas more time to signal processing for TSR to minimize secrecy outage.
doi_str_mv 10.1109/JIOT.2020.3013573
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_crossref_primary_10_1109_JIOT_2020_3013573</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9154423</ieee_id><sourcerecordid>2480866048</sourcerecordid><originalsourceid>FETCH-LOGICAL-c293t-38607de66e08bf51155a304bd6cddbe5b4ba57d1fbb6805d17f816c13eabab3f3</originalsourceid><addsrcrecordid>eNpNkF1PwjAUhhujiQT5AcabJV4P-7F22yXBLwiKUYyXTbudYZGt2A4J_nqLEONVT3qe55yTF6FzgvuE4PxqPJrO-hRT3GeYMJ6yI9ShjKZxIgQ9_lefop73C4xx0DjJRQfVL1A4KLbRdN2qOUQPpjG1-VatsU1UWRe9GQdL8D5-shtwUEbPsFTb6BHajXUfPvTb9-gafGuaXykeeG98G8ChtStw4fMLorGqa9PMz9BJpZYeeoe3i15vb2bD-3gyvRsNB5O4oDlrY5YJnJYgBOBMV5wQzhXDiS5FUZYauE604mlJKq1FhnlJ0iojoiAMlFaaVayLLvdzV85-rsNxcmHXrgkrJU0ynAmBkyxQZE8VznrvoJIrZ2rltpJguQtW7oKVu2DlIdjgXOwdAwB_fE54klDGfgD7AnY_</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2480866048</pqid></control><display><type>article</type><title>Secrecy Outage Minimization for Wireless-Powered Relay Networks With Destination-Assisted Cooperative Jamming</title><source>IEEE Electronic Library (IEL)</source><creator>Lee, Kisong ; Bang, Junseong ; Choi, Hyun-Ho</creator><creatorcontrib>Lee, Kisong ; Bang, Junseong ; Choi, Hyun-Ho</creatorcontrib><description><![CDATA[To solve security vulnerability and energy scarcity problems in relay, we propose two secure relaying protocols, power splitting-based relaying (PSR) and time switching-based relaying (TSR), in a wireless-powered relay network with destination-assisted cooperative jamming. In these protocols, the relay adaptively controls the amount of energy harvested from the received signals using PS or TS policy, considering information leakage to the eavesdropper. We first prove the convexity of the secrecy outage probability with respect to the PS ratio (<inline-formula> <tex-math notation="LaTeX">\rho </tex-math></inline-formula>) and TS ratio (<inline-formula> <tex-math notation="LaTeX">\alpha </tex-math></inline-formula>), and then derive the closed-form expressions of the optimal <inline-formula> <tex-math notation="LaTeX">\rho </tex-math></inline-formula> and <inline-formula> <tex-math notation="LaTeX">\alpha </tex-math></inline-formula> for minimizing secrecy outage under the signal-to-noise ratio (SNR) assumption. Numerical results reveal that the proposed PSR and TSR protocols using the derived <inline-formula> <tex-math notation="LaTeX">\rho </tex-math></inline-formula> and <inline-formula> <tex-math notation="LaTeX">\alpha </tex-math></inline-formula> can achieve near-optimal performance in terms of secrecy outage. It is observed that the optimal <inline-formula> <tex-math notation="LaTeX">\rho </tex-math></inline-formula> and <inline-formula> <tex-math notation="LaTeX">\alpha </tex-math></inline-formula> do not depend on the eavesdropping channels in a high SNR regime such that the near-optimal secrecy outage can be achieved practically without knowledge of the eavesdropper location. Furthermore, intensive simulations reveal that it is advantageous to allocate more power to energy harvesting for PSR, whereas more time to signal processing for TSR to minimize secrecy outage.]]></description><identifier>ISSN: 2327-4662</identifier><identifier>EISSN: 2327-4662</identifier><identifier>DOI: 10.1109/JIOT.2020.3013573</identifier><identifier>CODEN: IITJAU</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Convexity ; Cooperative jamming ; Eavesdropping ; Energy harvesting ; energy harvesting (EH) ; Internet of Things ; Jamming ; Optimization ; physical-layer security ; Protocol (computers) ; Protocols ; Relay networks ; Relay networks (telecommunications) ; Relaying ; secrecy outage probability ; secure relaying protocol ; Signal processing ; Signal to noise ratio ; Wireless networks</subject><ispartof>IEEE internet of things journal, 2021-02, Vol.8 (3), p.1467-1476</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c293t-38607de66e08bf51155a304bd6cddbe5b4ba57d1fbb6805d17f816c13eabab3f3</citedby><cites>FETCH-LOGICAL-c293t-38607de66e08bf51155a304bd6cddbe5b4ba57d1fbb6805d17f816c13eabab3f3</cites><orcidid>0000-0002-6785-2596 ; 0000-0001-8206-4558</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9154423$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,27901,27902,54733</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/9154423$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Lee, Kisong</creatorcontrib><creatorcontrib>Bang, Junseong</creatorcontrib><creatorcontrib>Choi, Hyun-Ho</creatorcontrib><title>Secrecy Outage Minimization for Wireless-Powered Relay Networks With Destination-Assisted Cooperative Jamming</title><title>IEEE internet of things journal</title><addtitle>JIoT</addtitle><description><![CDATA[To solve security vulnerability and energy scarcity problems in relay, we propose two secure relaying protocols, power splitting-based relaying (PSR) and time switching-based relaying (TSR), in a wireless-powered relay network with destination-assisted cooperative jamming. In these protocols, the relay adaptively controls the amount of energy harvested from the received signals using PS or TS policy, considering information leakage to the eavesdropper. We first prove the convexity of the secrecy outage probability with respect to the PS ratio (<inline-formula> <tex-math notation="LaTeX">\rho </tex-math></inline-formula>) and TS ratio (<inline-formula> <tex-math notation="LaTeX">\alpha </tex-math></inline-formula>), and then derive the closed-form expressions of the optimal <inline-formula> <tex-math notation="LaTeX">\rho </tex-math></inline-formula> and <inline-formula> <tex-math notation="LaTeX">\alpha </tex-math></inline-formula> for minimizing secrecy outage under the signal-to-noise ratio (SNR) assumption. Numerical results reveal that the proposed PSR and TSR protocols using the derived <inline-formula> <tex-math notation="LaTeX">\rho </tex-math></inline-formula> and <inline-formula> <tex-math notation="LaTeX">\alpha </tex-math></inline-formula> can achieve near-optimal performance in terms of secrecy outage. It is observed that the optimal <inline-formula> <tex-math notation="LaTeX">\rho </tex-math></inline-formula> and <inline-formula> <tex-math notation="LaTeX">\alpha </tex-math></inline-formula> do not depend on the eavesdropping channels in a high SNR regime such that the near-optimal secrecy outage can be achieved practically without knowledge of the eavesdropper location. Furthermore, intensive simulations reveal that it is advantageous to allocate more power to energy harvesting for PSR, whereas more time to signal processing for TSR to minimize secrecy outage.]]></description><subject>Convexity</subject><subject>Cooperative jamming</subject><subject>Eavesdropping</subject><subject>Energy harvesting</subject><subject>energy harvesting (EH)</subject><subject>Internet of Things</subject><subject>Jamming</subject><subject>Optimization</subject><subject>physical-layer security</subject><subject>Protocol (computers)</subject><subject>Protocols</subject><subject>Relay networks</subject><subject>Relay networks (telecommunications)</subject><subject>Relaying</subject><subject>secrecy outage probability</subject><subject>secure relaying protocol</subject><subject>Signal processing</subject><subject>Signal to noise ratio</subject><subject>Wireless networks</subject><issn>2327-4662</issn><issn>2327-4662</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpNkF1PwjAUhhujiQT5AcabJV4P-7F22yXBLwiKUYyXTbudYZGt2A4J_nqLEONVT3qe55yTF6FzgvuE4PxqPJrO-hRT3GeYMJ6yI9ShjKZxIgQ9_lefop73C4xx0DjJRQfVL1A4KLbRdN2qOUQPpjG1-VatsU1UWRe9GQdL8D5-shtwUEbPsFTb6BHajXUfPvTb9-gafGuaXykeeG98G8ChtStw4fMLorGqa9PMz9BJpZYeeoe3i15vb2bD-3gyvRsNB5O4oDlrY5YJnJYgBOBMV5wQzhXDiS5FUZYauE604mlJKq1FhnlJ0iojoiAMlFaaVayLLvdzV85-rsNxcmHXrgkrJU0ynAmBkyxQZE8VznrvoJIrZ2rltpJguQtW7oKVu2DlIdjgXOwdAwB_fE54klDGfgD7AnY_</recordid><startdate>20210201</startdate><enddate>20210201</enddate><creator>Lee, Kisong</creator><creator>Bang, Junseong</creator><creator>Choi, Hyun-Ho</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0002-6785-2596</orcidid><orcidid>https://orcid.org/0000-0001-8206-4558</orcidid></search><sort><creationdate>20210201</creationdate><title>Secrecy Outage Minimization for Wireless-Powered Relay Networks With Destination-Assisted Cooperative Jamming</title><author>Lee, Kisong ; Bang, Junseong ; Choi, Hyun-Ho</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c293t-38607de66e08bf51155a304bd6cddbe5b4ba57d1fbb6805d17f816c13eabab3f3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Convexity</topic><topic>Cooperative jamming</topic><topic>Eavesdropping</topic><topic>Energy harvesting</topic><topic>energy harvesting (EH)</topic><topic>Internet of Things</topic><topic>Jamming</topic><topic>Optimization</topic><topic>physical-layer security</topic><topic>Protocol (computers)</topic><topic>Protocols</topic><topic>Relay networks</topic><topic>Relay networks (telecommunications)</topic><topic>Relaying</topic><topic>secrecy outage probability</topic><topic>secure relaying protocol</topic><topic>Signal processing</topic><topic>Signal to noise ratio</topic><topic>Wireless networks</topic><toplevel>online_resources</toplevel><creatorcontrib>Lee, Kisong</creatorcontrib><creatorcontrib>Bang, Junseong</creatorcontrib><creatorcontrib>Choi, Hyun-Ho</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE internet of things journal</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Lee, Kisong</au><au>Bang, Junseong</au><au>Choi, Hyun-Ho</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Secrecy Outage Minimization for Wireless-Powered Relay Networks With Destination-Assisted Cooperative Jamming</atitle><jtitle>IEEE internet of things journal</jtitle><stitle>JIoT</stitle><date>2021-02-01</date><risdate>2021</risdate><volume>8</volume><issue>3</issue><spage>1467</spage><epage>1476</epage><pages>1467-1476</pages><issn>2327-4662</issn><eissn>2327-4662</eissn><coden>IITJAU</coden><abstract><![CDATA[To solve security vulnerability and energy scarcity problems in relay, we propose two secure relaying protocols, power splitting-based relaying (PSR) and time switching-based relaying (TSR), in a wireless-powered relay network with destination-assisted cooperative jamming. In these protocols, the relay adaptively controls the amount of energy harvested from the received signals using PS or TS policy, considering information leakage to the eavesdropper. We first prove the convexity of the secrecy outage probability with respect to the PS ratio (<inline-formula> <tex-math notation="LaTeX">\rho </tex-math></inline-formula>) and TS ratio (<inline-formula> <tex-math notation="LaTeX">\alpha </tex-math></inline-formula>), and then derive the closed-form expressions of the optimal <inline-formula> <tex-math notation="LaTeX">\rho </tex-math></inline-formula> and <inline-formula> <tex-math notation="LaTeX">\alpha </tex-math></inline-formula> for minimizing secrecy outage under the signal-to-noise ratio (SNR) assumption. Numerical results reveal that the proposed PSR and TSR protocols using the derived <inline-formula> <tex-math notation="LaTeX">\rho </tex-math></inline-formula> and <inline-formula> <tex-math notation="LaTeX">\alpha </tex-math></inline-formula> can achieve near-optimal performance in terms of secrecy outage. It is observed that the optimal <inline-formula> <tex-math notation="LaTeX">\rho </tex-math></inline-formula> and <inline-formula> <tex-math notation="LaTeX">\alpha </tex-math></inline-formula> do not depend on the eavesdropping channels in a high SNR regime such that the near-optimal secrecy outage can be achieved practically without knowledge of the eavesdropper location. Furthermore, intensive simulations reveal that it is advantageous to allocate more power to energy harvesting for PSR, whereas more time to signal processing for TSR to minimize secrecy outage.]]></abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/JIOT.2020.3013573</doi><tpages>10</tpages><orcidid>https://orcid.org/0000-0002-6785-2596</orcidid><orcidid>https://orcid.org/0000-0001-8206-4558</orcidid></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 2327-4662
ispartof IEEE internet of things journal, 2021-02, Vol.8 (3), p.1467-1476
issn 2327-4662
2327-4662
language eng
recordid cdi_crossref_primary_10_1109_JIOT_2020_3013573
source IEEE Electronic Library (IEL)
subjects Convexity
Cooperative jamming
Eavesdropping
Energy harvesting
energy harvesting (EH)
Internet of Things
Jamming
Optimization
physical-layer security
Protocol (computers)
Protocols
Relay networks
Relay networks (telecommunications)
Relaying
secrecy outage probability
secure relaying protocol
Signal processing
Signal to noise ratio
Wireless networks
title Secrecy Outage Minimization for Wireless-Powered Relay Networks With Destination-Assisted Cooperative Jamming
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-06T20%3A29%3A52IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Secrecy%20Outage%20Minimization%20for%20Wireless-Powered%20Relay%20Networks%20With%20Destination-Assisted%20Cooperative%20Jamming&rft.jtitle=IEEE%20internet%20of%20things%20journal&rft.au=Lee,%20Kisong&rft.date=2021-02-01&rft.volume=8&rft.issue=3&rft.spage=1467&rft.epage=1476&rft.pages=1467-1476&rft.issn=2327-4662&rft.eissn=2327-4662&rft.coden=IITJAU&rft_id=info:doi/10.1109/JIOT.2020.3013573&rft_dat=%3Cproquest_RIE%3E2480866048%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2480866048&rft_id=info:pmid/&rft_ieee_id=9154423&rfr_iscdi=true