Reference : Physical Layer Security Analysis of SWIPT-Enabled Cooperative Wireless IoT Networks i... |
Scientific journals : Article | |||
Engineering, computing & technology : Computer science | |||
Educational Sciences | |||
http://hdl.handle.net/10993/53395 | |||
Physical Layer Security Analysis of SWIPT-Enabled Cooperative Wireless IoT Networks in the Presence of Friendly Jammer and Eavesdropper | |
English | |
Nguyen, Tan N. [] | |
Tran Dinh, Hieu ![]() | |
Phan, Van-Duc [] | |
Voznak, Miroslav [] | |
Chatzinotas, Symeon ![]() | |
Ottersten, Björn ![]() | |
Kim, Byung Seo [] | |
Poor, Vincent [] | |
2022 | |
IEEE Internet of Things Journal | |
IEEE | |
9 | |
21 | |
Yes | |
International | |
[en] —Physical layer security (PLS) and simultane ous wireless information and power transfer (SWIPT) in
cooperative relaying have gained great interest as technolo gies for security and energy enhancement in Internet-of Things (IoT) networks. In this work, we investigate PLS for a SWIPT- and AF-enabled cooperative wireless IoT system, consisting of one source, multiple energy harvesting (EH) relays, and one destination, in the presence of an eaves dropper that tries to overhear the confidential information. Furthermore, an EH-friendly jammer is deployed to trans mit jamming signals aimed at the eavesdropper to improve the security system. In this context, a low complexity, sub optimal, but efficient relay selection method is proposed. More specifically, the relay is selected to convey informa tion such that it has the best channel to the source. Based on the proposed system model, the performance analysis of intercept probability (IP), asymptotic IP, and non-zero secrecy probability (NZSP) is analyzed by considering the time switching (TS)-based relaying strategy. Particularly, Tan N. Nguyen is with the Wireless Communications Re search Group, Faculty of Electrical and Electronics Engineering, Ton Duc Thang University, Ho Chi Minh City, Vietnam. (e mail:nguyennhattan@tdtu.edu.vn). Dinh-Hieu Tran, Symeon Chatzinotas, and Bjorn Ottersten are with ¨ the Interdisciplinary Centre for Security, Reliability and Trust (SnT), the University of Luxembourg, Luxembourg. (e-mail: {hieu.tran-dinh, symeon.chatzinotas, bjorn.ottersten} @uni.lu). Miroslav Voznak is with VSB - Technical University of Ostrava, 17. listopadu 15/2172, 708 33 Ostrava - Poruba, Czech Republic. (e-mail:miroslav.voznak@vsb.cz). H. V. Poor is with the Department of Electrical and Computer Engineering, Princeton University, Princeton, NJ 08544 USA. (email: poor@princeton.edu). Byung-Seo Kim is with the Department of Software and Com munications Engineering, Hongik University, Sejong 30016, South Korea (e-mail: jsnbs@hongik.ac.kr). Corresponding author: Van-Duc Phan is at Faculty of Automobile Technology, Van Lang University, Ho Chi Minh City, Vietnam. (email: duc.pv@vlu.edu.vn). This research was supported by the Ministry of Education, Youth and Sports of the Czech Republic under the grant SP2021/25 and e-INFRA CZ (ID:90140). the exact closed-form expression of IP is achieved applying modified Bessel function expansion. Finally, Monte-Carlo simulations are employed to corroborate the correctness and the efficiency of our mathematical analysis. | |
http://hdl.handle.net/10993/53395 |
File(s) associated to this reference | ||||||||||||||
Fulltext file(s):
| ||||||||||||||
All documents in ORBilu are protected by a user license.