TY - GEN
T1 - Secrecy outage minimization for wireless powered communication networks with an energy harvesting jammer
AU - Moon, Jihwan
AU - Lee, Hoon
AU - Song, Changick
AU - Lee, Inkyu
N1 - Funding Information:
This work was supported by the National Research Foundation of Korea (NRF) funded by the Korea Government (MSIP) under Grant 2014R1A2A1A10049769
Publisher Copyright:
© 2016 IEEE.
Copyright:
Copyright 2017 Elsevier B.V., All rights reserved.
PY - 2016
Y1 - 2016
N2 - In this work, we consider a wireless powered communication network (WPCN) with an energy harvesting (EH) jammer where an eavesdropper tries to wiretap the communication between a user and a hybrid access-point (H-AP). In our system, the H-AP first transmits an energy signal to recharge the batteries of the EH user and the EH jammer in the energy transfer (ET) phase. Then, in the subsequent information transfer (IT) phase, the user sends its information signal to the H-AP, while the jammer generates the jamming signal to interfere the eavesdropper utilizing the harvested energy in the ET phase. Assuming only the channel distribution information (CDI) of the eavesdropper is available at the legitimate nodes, we analyze and minimize the secrecy outage probability by optimizing the time allocation between the two phases. To reduce the complexity, we also provide a simple closed-form solution, and the simulation results verify that its performance approaches the optimum.
AB - In this work, we consider a wireless powered communication network (WPCN) with an energy harvesting (EH) jammer where an eavesdropper tries to wiretap the communication between a user and a hybrid access-point (H-AP). In our system, the H-AP first transmits an energy signal to recharge the batteries of the EH user and the EH jammer in the energy transfer (ET) phase. Then, in the subsequent information transfer (IT) phase, the user sends its information signal to the H-AP, while the jammer generates the jamming signal to interfere the eavesdropper utilizing the harvested energy in the ET phase. Assuming only the channel distribution information (CDI) of the eavesdropper is available at the legitimate nodes, we analyze and minimize the secrecy outage probability by optimizing the time allocation between the two phases. To reduce the complexity, we also provide a simple closed-form solution, and the simulation results verify that its performance approaches the optimum.
UR - http://www.scopus.com/inward/record.url?scp=85015361714&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85015361714&partnerID=8YFLogxK
U2 - 10.1109/GLOCOM.2016.7842246
DO - 10.1109/GLOCOM.2016.7842246
M3 - Conference contribution
AN - SCOPUS:85015361714
T3 - 2016 IEEE Global Communications Conference, GLOBECOM 2016 - Proceedings
BT - 2016 IEEE Global Communications Conference, GLOBECOM 2016 - Proceedings
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 59th IEEE Global Communications Conference, GLOBECOM 2016
Y2 - 4 December 2016 through 8 December 2016
ER -