Time Allocation Methods for Secure Wireless Powered Communication Networks

Jihwan Moon, Hoon Lee, Changick Song, Inkyu Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

In this work, we investigate a wireless powered communication network (WPCN) where multiple eavesdroppers attempt to intercept the information between a hybrid access-point (H-AP) and an energy harvesting (EH) user. During the first energy transfer (ET) phase, the EH user and an EH cooperative jammer harvest energy from the transmitted signals of the H-AP. Then, in the next information transfer (IT) phase, the user sends confidential information to the H-AP while the jammer broadcasts artificial noises to the eavesdroppers by utilizing their previously harvested energy. We particularly consider optimization of the time allocation between the ET and the IT phases by which the secrecy rate is maximized. To cut down a computational burden, a low-complexity closed-form solution of the time allocation factor with some interesting behaviors will be proposed by a worst-case approximation. Through simulation results, we evaluate the performance of our proposed scheme and show that a performance gain compared to conventional schemes becomes clearer with the increased number of eavesdroppers.

Original languageEnglish
Title of host publication2018 IEEE 88th Vehicular Technology Conference, VTC-Fall 2018 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781538663585
DOIs
Publication statusPublished - 2018 Jul 2
Event88th IEEE Vehicular Technology Conference, VTC-Fall 2018 - Chicago, United States
Duration: 2018 Aug 272018 Aug 30

Publication series

NameIEEE Vehicular Technology Conference
Volume2018-August
ISSN (Print)1550-2252

Conference

Conference88th IEEE Vehicular Technology Conference, VTC-Fall 2018
Country/TerritoryUnited States
CityChicago
Period18/8/2718/8/30

ASJC Scopus subject areas

  • Computer Science Applications
  • Electrical and Electronic Engineering
  • Applied Mathematics

Fingerprint

Dive into the research topics of 'Time Allocation Methods for Secure Wireless Powered Communication Networks'. Together they form a unique fingerprint.

Cite this