CLC number: TN929.5
On-line Access: 2024-08-27
Received: 2023-10-17
Revision Accepted: 2024-05-08
Crosschecked: 2020-09-16
Cited: 0
Clicked: 5477
Citations: Bibtex RefMan EndNote GB/T7714
Wei-min Hou, Qing-shan Tang. Secure analysis on artificial-noise-aided simultaneous wireless information and power transfer systems[J]. Frontiers of Information Technology & Electronic Engineering, 2020, 21(11): 1651-1660.
@article{title="Secure analysis on artificial-noise-aided simultaneous wireless information and power transfer systems",
author="Wei-min Hou, Qing-shan Tang",
journal="Frontiers of Information Technology & Electronic Engineering",
volume="21",
number="11",
pages="1651-1660",
year="2020",
publisher="Zhejiang University Press & Springer",
doi="10.1631/FITEE.2000083"
}
%0 Journal Article
%T Secure analysis on artificial-noise-aided simultaneous wireless information and power transfer systems
%A Wei-min Hou
%A Qing-shan Tang
%J Frontiers of Information Technology & Electronic Engineering
%V 21
%N 11
%P 1651-1660
%@ 2095-9184
%D 2020
%I Zhejiang University Press & Springer
%DOI 10.1631/FITEE.2000083
TY - JOUR
T1 - Secure analysis on artificial-noise-aided simultaneous wireless information and power transfer systems
A1 - Wei-min Hou
A1 - Qing-shan Tang
J0 - Frontiers of Information Technology & Electronic Engineering
VL - 21
IS - 11
SP - 1651
EP - 1660
%@ 2095-9184
Y1 - 2020
PB - Zhejiang University Press & Springer
ER -
DOI - 10.1631/FITEE.2000083
Abstract: In this paper, we investigate the secrecy outage performance in simultaneous wireless information and power transfer (SWIPT) systems taking artificial noise assistance into account. Multiple antennas in the source and a single antenna in both the legitimate receiver and the eavesdropper are assumed. Specifically, the transmitted signal at the source is composed of two parts, where the first part is the information symbols and the other is the noise for the eavesdropper. To avoid making noise in the legitimate receiver, these two parts in the transmitted signals are modulated into two orthogonal dimensions according to the instantaneous channel state between the source and the legitimate receiver. We derive an approximate closed-form expression for the secrecy outage probability (SOP) by adopting the Gauss-Laguerre quadrature (GLQ) method, where the gap between the exact SOP and our approximate SOP converges with increase of the summation terms in the GLQ. To obtain the secrecy diversity order and secrecy array gain for the considered SWIPT system, the asymptotic result of the SOP is also derived. This is tight in the high signal-to-noise ratio region. A novel and robust SOP approximation is also analyzed given a small variance of the signal-to-interference-plus-noise ratio at the eavesdropper. Some selected Monte-Carlo numerical results are presented to validate the correctness of the derived closed-form expressions.
[1]Bloch M, Barros J, Rodrigues MRD, et al., 2008. Wireless information-theoretic security. IEEE Trans Inform Theory, 54(6):2515-2534.
[2]Chen XM, Jia RD, 2018. Exploiting rateless coding for massive access. IEEE Trans Veh Technol, 67(11):11253-11257.
[3]Chen XM, Ng DWK, Gerstacker WH, et al., 2017. A survey on multiple-antenna techniques for physical layer security. IEEE Commun Surv Tutor, 19(2):1027-1053.
[4]Deng YS, Wang LF, Zaidi SAR, et al., 2016. Artificial-noise aided secure transmission in large scale spectrum sharing networks. IEEE Trans Commun, 64(5):2116-2129.
[5]El Shafie A, Tourki K, Al-Dhahir N, 2017. An artificial-noise-aided hybrid TS/PS scheme for OFDM-based SWIPT systems. IEEE Commun Lett, 21(3):632-635.
[6]Gradshteyn IS, Ryzhik IM, 2007. Table of Integrals, Series, and Products (7th Ed.). Academic Press, Salt Lake City, USA.
[7]Holtzman JM, 1992. A simple, accurate method to calculate spread-spectrum multiple-access error probabilities. IEEE Trans Commun, 40(3):461-464.
[8]Khandaker MRA, Masouros C, Wong KK, et al., 2019. Secure SWIPT by exploiting constructive interference and artificial noise. IEEE Trans Commun, 67(2):1326-1340.
[9]Liu YW, Qin ZJ, Elkashlan M, et al., 2017. Enhancing the physical layer security of non-orthogonal multiple access in large-scale networks. IEEE Trans Wirel Commun, 16(3):1656-1672.
[10]Pan GF, Tang CQ, Li TT, et al., 2015. Secrecy performance analysis for SIMO simultaneous wireless information and power transfer systems. IEEE Trans Commun, 63(9):3423-3433.
[11]Pan GF, Tang CQ, Zhang X, et al., 2016a. Physical-layer security over non-small-scale fading channels. IEEE Trans Veh Technol, 65(3):1326-1339.
[12]Pan GF, Lei HJ, Deng YS, et al., 2016b. On secrecy performance of MISO SWIPT systems with TAS and imperfect CSI. IEEE Trans Commun, 64(9):3831-3843.
[13]Pan GF, Lei HJ, Yuan Y, et al., 2017a. Performance analysis and optimization for SWIPT wireless sensor networks. IEEE Trans Commun, 65(5):2291-2302.
[14]Pan GF, Ye J, Ding ZG, 2017b. Secure hybrid VLC-RF systems with light energy harvesting. IEEE Trans Commun, 65(10):4348-4359.
[15]Qi Q, Chen XM, Zhong CJ, et al., 2020. Physical layer security for massive access in cellular Internet of Things. Sci China Inform Sci, 63(2):121301.
[16]Shi QJ, Liu L, Xu WQ, et al., 2014. Joint transmit beamforming and receive power splitting for MISO SWIPT systems. IEEE Trans Wirel Commun, 13(6):3269-3280.
[17]Sudevalayam S, Kulkarni P, 2011. Energy harvesting sensor nodes: survey and implications. IEEE Commun Surv Tutor, 13(3):443-461.
[18]Tian FY, Chen XM, 2019. Multiple-antenna techniques in nonorthogonal multiple access: a review. Front Inform Technol Electron Eng, 20(12):1665-1697.
[19]Wang ZJ, Zhao H, Wang S, et al., 2019. Secrecy analysis in SWIPT systems over generalized-$K$ fading channels. IEEE Commun Lett, 23(5):834-837.
[20]Yang N, Yan SH, Yuan JH, et al., 2015. Artificial noise: transmission optimization in multi-input single-output wiretap channels. IEEE Trans Commun, 63(5):1771-1783.
[21]Zhang M, Liu Y, Zhang R, 2016. Artificial noise aided secrecy information and power transfer in OFDMA systems. IEEE Trans Wirel Commun, 15(4):3085-3096.
[22]Zhang R, Ho CK, 2013. MIMO broadcasting for simultaneous wireless information and power transfer. IEEE Trans Wirel Commun, 12(5):1989-2001.
[23]Zhang X, McKay MR, Zhou XY, et al., 2015. Artificial-noise-aided secure multi-antenna transmission with limited feedback. IEEE Trans Wirel Commun, 14(5):2742-2754.
[24]Zhao H, Tan YY, Pan GF, et al., 2016. Secrecy outage on transmit antenna selection/maximal ratio combining in MIMO cognitive radio networks. IEEE Trans Veh Technol, 65(12):10236-10242.
[25]Zhao H, Tan YY, Pan GF, et al., 2017. Ergodic secrecy capacity of MRC/SC in single-input multiple-output wiretap systems with imperfect channel state information. Front Inform Technol Electron Eng, 18(4):578-590.
[26]Zhao H, Liu ZD, Yang L, et al., 2019a. Secrecy analysis in DF relay over generalized-K fading channels. IEEE Trans Commun, 67(10):7168-7182.
[27]Zhao H, Zhang JY, Yang L, et al., 2019b. Secure mmWave communications in cognitive radio networks. IEEE Wirel Commun Lett, 8(4):1171-1174.
[28]Zhao H, Liu YW, Sultan-Salem A, et al., 2019c. A simple evaluation for the secrecy outage probability over generalized-K
[30]Zou YL, Champagne B, Zhu WP, et al., 2015. Relay-selection improves the security-reliability trade-off in cognitive radio systems. IEEE Trans Commun, 63(1):215-228.
Open peer comments: Debate/Discuss/Question/Opinion
<1>