Time Allocation Methods for Secure Wireless Powered Communication Networks

Jihwan Moon, Hoon Lee, Changick Song, Inkyu Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In this work, we investigate a wireless powered communication network (WPCN) where multiple eavesdroppers attempt to intercept the information between a hybrid access-point (H-AP) and an energy harvesting (EH) user. During the first energy transfer (ET) phase, the EH user and an EH cooperative jammer harvest energy from the transmitted signals of the H-AP. Then, in the next information transfer (IT) phase, the user sends confidential information to the H-AP while the jammer broadcasts artificial noises to the eavesdroppers by utilizing their previously harvested energy. We particularly consider optimization of the time allocation between the ET and the IT phases by which the secrecy rate is maximized. To cut down a computational burden, a low-complexity closed-form solution of the time allocation factor with some interesting behaviors will be proposed by a worst-case approximation. Through simulation results, we evaluate the performance of our proposed scheme and show that a performance gain compared to conventional schemes becomes clearer with the increased number of eavesdroppers.

Original languageEnglish
Title of host publication2018 IEEE 88th Vehicular Technology Conference, VTC-Fall 2018 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781538663585
DOIs
Publication statusPublished - 2019 Apr 12
Event88th IEEE Vehicular Technology Conference, VTC-Fall 2018 - Chicago, United States
Duration: 2018 Aug 272018 Aug 30

Publication series

NameIEEE Vehicular Technology Conference
Volume2018-August
ISSN (Print)1550-2252

Conference

Conference88th IEEE Vehicular Technology Conference, VTC-Fall 2018
CountryUnited States
CityChicago
Period18/8/2718/8/30

Fingerprint

Energy Harvesting
Secure Communication
Energy harvesting
Wireless Communication
Communication Networks
Telecommunication networks
Wireless Networks
Information Transfer
Energy Transfer
Energy transfer
Intercept
Energy
Closed-form Solution
Broadcast
Low Complexity
Optimization
Evaluate
Approximation
Simulation

ASJC Scopus subject areas

  • Computer Science Applications
  • Electrical and Electronic Engineering
  • Applied Mathematics

Cite this

Moon, J., Lee, H., Song, C., & Lee, I. (2019). Time Allocation Methods for Secure Wireless Powered Communication Networks. In 2018 IEEE 88th Vehicular Technology Conference, VTC-Fall 2018 - Proceedings [8690771] (IEEE Vehicular Technology Conference; Vol. 2018-August). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/VTCFall.2018.8690771

Time Allocation Methods for Secure Wireless Powered Communication Networks. / Moon, Jihwan; Lee, Hoon; Song, Changick; Lee, Inkyu.

2018 IEEE 88th Vehicular Technology Conference, VTC-Fall 2018 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 2019. 8690771 (IEEE Vehicular Technology Conference; Vol. 2018-August).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Moon, J, Lee, H, Song, C & Lee, I 2019, Time Allocation Methods for Secure Wireless Powered Communication Networks. in 2018 IEEE 88th Vehicular Technology Conference, VTC-Fall 2018 - Proceedings., 8690771, IEEE Vehicular Technology Conference, vol. 2018-August, Institute of Electrical and Electronics Engineers Inc., 88th IEEE Vehicular Technology Conference, VTC-Fall 2018, Chicago, United States, 18/8/27. https://doi.org/10.1109/VTCFall.2018.8690771
Moon J, Lee H, Song C, Lee I. Time Allocation Methods for Secure Wireless Powered Communication Networks. In 2018 IEEE 88th Vehicular Technology Conference, VTC-Fall 2018 - Proceedings. Institute of Electrical and Electronics Engineers Inc. 2019. 8690771. (IEEE Vehicular Technology Conference). https://doi.org/10.1109/VTCFall.2018.8690771
Moon, Jihwan ; Lee, Hoon ; Song, Changick ; Lee, Inkyu. / Time Allocation Methods for Secure Wireless Powered Communication Networks. 2018 IEEE 88th Vehicular Technology Conference, VTC-Fall 2018 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 2019. (IEEE Vehicular Technology Conference).
@inproceedings{b7ad59497c6944edb6ca558b8e29e6e0,
title = "Time Allocation Methods for Secure Wireless Powered Communication Networks",
abstract = "In this work, we investigate a wireless powered communication network (WPCN) where multiple eavesdroppers attempt to intercept the information between a hybrid access-point (H-AP) and an energy harvesting (EH) user. During the first energy transfer (ET) phase, the EH user and an EH cooperative jammer harvest energy from the transmitted signals of the H-AP. Then, in the next information transfer (IT) phase, the user sends confidential information to the H-AP while the jammer broadcasts artificial noises to the eavesdroppers by utilizing their previously harvested energy. We particularly consider optimization of the time allocation between the ET and the IT phases by which the secrecy rate is maximized. To cut down a computational burden, a low-complexity closed-form solution of the time allocation factor with some interesting behaviors will be proposed by a worst-case approximation. Through simulation results, we evaluate the performance of our proposed scheme and show that a performance gain compared to conventional schemes becomes clearer with the increased number of eavesdroppers.",
author = "Jihwan Moon and Hoon Lee and Changick Song and Inkyu Lee",
year = "2019",
month = "4",
day = "12",
doi = "10.1109/VTCFall.2018.8690771",
language = "English",
series = "IEEE Vehicular Technology Conference",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
booktitle = "2018 IEEE 88th Vehicular Technology Conference, VTC-Fall 2018 - Proceedings",

}

TY - GEN

T1 - Time Allocation Methods for Secure Wireless Powered Communication Networks

AU - Moon, Jihwan

AU - Lee, Hoon

AU - Song, Changick

AU - Lee, Inkyu

PY - 2019/4/12

Y1 - 2019/4/12

N2 - In this work, we investigate a wireless powered communication network (WPCN) where multiple eavesdroppers attempt to intercept the information between a hybrid access-point (H-AP) and an energy harvesting (EH) user. During the first energy transfer (ET) phase, the EH user and an EH cooperative jammer harvest energy from the transmitted signals of the H-AP. Then, in the next information transfer (IT) phase, the user sends confidential information to the H-AP while the jammer broadcasts artificial noises to the eavesdroppers by utilizing their previously harvested energy. We particularly consider optimization of the time allocation between the ET and the IT phases by which the secrecy rate is maximized. To cut down a computational burden, a low-complexity closed-form solution of the time allocation factor with some interesting behaviors will be proposed by a worst-case approximation. Through simulation results, we evaluate the performance of our proposed scheme and show that a performance gain compared to conventional schemes becomes clearer with the increased number of eavesdroppers.

AB - In this work, we investigate a wireless powered communication network (WPCN) where multiple eavesdroppers attempt to intercept the information between a hybrid access-point (H-AP) and an energy harvesting (EH) user. During the first energy transfer (ET) phase, the EH user and an EH cooperative jammer harvest energy from the transmitted signals of the H-AP. Then, in the next information transfer (IT) phase, the user sends confidential information to the H-AP while the jammer broadcasts artificial noises to the eavesdroppers by utilizing their previously harvested energy. We particularly consider optimization of the time allocation between the ET and the IT phases by which the secrecy rate is maximized. To cut down a computational burden, a low-complexity closed-form solution of the time allocation factor with some interesting behaviors will be proposed by a worst-case approximation. Through simulation results, we evaluate the performance of our proposed scheme and show that a performance gain compared to conventional schemes becomes clearer with the increased number of eavesdroppers.

UR - http://www.scopus.com/inward/record.url?scp=85064922263&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85064922263&partnerID=8YFLogxK

U2 - 10.1109/VTCFall.2018.8690771

DO - 10.1109/VTCFall.2018.8690771

M3 - Conference contribution

T3 - IEEE Vehicular Technology Conference

BT - 2018 IEEE 88th Vehicular Technology Conference, VTC-Fall 2018 - Proceedings

PB - Institute of Electrical and Electronics Engineers Inc.

ER -