Secrecy Outage Minimization for Wireless-Powered Relay Networks with Destination-Assisted Cooperative Jamming

Kisong Lee, Junseong Bang, Hyun Ho Choi

Research output: Contribution to journalArticlepeer-review

18 Scopus citations

Abstract

To solve security vulnerability and energy scarcity problems in relay, we propose two secure relaying protocols, power splitting-based relaying (PSR) and time switching-based relaying (TSR), in a wireless-powered relay network with destination-assisted cooperative jamming. In these protocols, the relay adaptively controls the amount of energy harvested from the received signals using PS or TS policy, considering information leakage to the eavesdropper. We first prove the convexity of the secrecy outage probability with respect to the PS ratio ( \rho ) and TS ratio ( \alpha ), and then derive the closed-form expressions of the optimal \rho and \alpha for minimizing secrecy outage under the signal-to-noise ratio (SNR) assumption. Numerical results reveal that the proposed PSR and TSR protocols using the derived \rho and \alpha can achieve near-optimal performance in terms of secrecy outage. It is observed that the optimal \rho and \alpha do not depend on the eavesdropping channels in a high SNR regime such that the near-optimal secrecy outage can be achieved practically without knowledge of the eavesdropper location. Furthermore, intensive simulations reveal that it is advantageous to allocate more power to energy harvesting for PSR, whereas more time to signal processing for TSR to minimize secrecy outage.

Original languageEnglish
Article number9154423
Pages (from-to)1467-1476
Number of pages10
JournalIEEE Internet of Things Journal
Volume8
Issue number3
DOIs
StatePublished - 1 Feb 2021

Keywords

  • Cooperative jamming
  • energy harvesting (EH)
  • physical-layer security
  • secrecy outage probability
  • secure relaying protocol

Fingerprint

Dive into the research topics of 'Secrecy Outage Minimization for Wireless-Powered Relay Networks with Destination-Assisted Cooperative Jamming'. Together they form a unique fingerprint.

Cite this