Journal on Communications ›› 2019, Vol. 40 ›› Issue (2): 70-81.doi: 10.11959/j.issn.1000-436x.2019036

• Papers • Previous Articles     Next Articles

Opportunistic secure transmission scheme for simultaneous wireless information and power transfer

Keming MA,Yajun CHEN(),Xin HU,Kaizhi HUANG,Xinsheng JI   

  1. National Digital Switching System Engineering &Technological Research Center,Zhengzhou 450002,China
  • Revised:2018-12-20 Online:2019-02-01 Published:2019-03-04
  • Supported by:
    The National Key Research and Development Program of China(2017YFB0801903);The Natural Science Foundation of China(61401510);The Natural Science Foundation of China(61521003);The Natural Science Foundation of China(61501516);The Natural Science Foundation of China(61701538);The Natural Science Foundation of China(61871404)

Abstract:

Aiming at the different requirements of energy transmission and information transmission in simultaneous wireless information and power transfer (SWIPT),an opportunistic transmission scheme was proposed for enhancing physical layer security.Firstly,a SWIPT network with multi-cells was considered where multi-users,multi-eavesdroppers and the users were assumed to adopt time-switching based receivers and employ non-linear conversion model to harvest energy.The transmitter could dynamically switch between information transmission and power transfer according to the channel state,breaking the traditional fixed slot allocation scheme of energy transmission and information transmission.On this basis,the performances of energy transmission and information transmission were analyzed comprehensively,including the stability and efficiency of energy transmission,and the reliability and security of information transmission in the scenario of independent eavesdropping and joint eavesdropping.Next,a switching threshold optimization model was given to maximize its secrecy throughput under the constraint of the energy transmission,the reliability and secrecy performance requirements of information transmission.Finally,simulation results verify the validity of the proposed scheme.

Key words: simultaneous wireless information and power transfer, physical layer security, secrecy throughput, outage probability, opportunistic transmission

CLC Number: 

No Suggested Reading articles found!