Journal on Communications ›› 2021, Vol. 42 ›› Issue (3): 100-110.doi: 10.11959/j.issn.1000-436x.2021048
• Papers • Previous Articles Next Articles
Wanming HAO1,2,3, Jinkun XIE1,3, Gangcan SUN2,3, Zhengyu ZHU2,3, Yiqing ZHOU1,4
Revised:
2021-01-04
Online:
2021-03-25
Published:
2021-03-01
Supported by:
CLC Number:
Wanming HAO, Jinkun XIE, Gangcan SUN, Zhengyu ZHU, Yiqing ZHOU. Robust chance-constrained optimization algorithm design for secure wireless powered backscatter communication system[J]. Journal on Communications, 2021, 42(3): 100-110.
[1] | 叶迎晖, 施丽琴, 卢光跃 . 反向散射辅助的无线供能通信网络中用户能效公平性研究[J]. 通信学报, 2020,41(7): 84-94. |
YE Y H , SHI L Q , LU G Y . User-centric energy efficiency fairness in backscatter-assisted wireless powered communication network[J]. Journal on Communications, 2020,41(7): 84-94. | |
[2] | NIYATO D , KIM D I , MASO M ,et al. Wireless powered communication networks:research directions and technological approaches[J]. IEEE Wireless Communications, 2017,24(6): 88-97. |
[3] | CHOI K W , GINTING L , AZIZ A A ,et al. Toward realization of long-range wireless-powered sensor networks[J]. IEEE Wireless Communications, 2019,26(4): 184-192. |
[4] | 徐勇军, 胡圆, 李国权 ,等. 异构携能通信网络顽健资源分配算法[J]. 通信学报, 2019,40(7): 186-196. |
XU Y J , HU Y , LI G Q ,et al. Robust resource allocation algorithm for heterogeneous wireless network with SWIPT[J]. Journal on Communications, 2019,40(7): 186-196. | |
[5] | BOYER C , ROY S . Backscatter communication and RFID:coding,energy,and MIMO analysis[J]. IEEE Transactions on Communications, 2014,62(3): 770-785. |
[6] | KONSTANTOPOULOS C , KOUTROULIS E , MITIANOUDIS N ,et al. Converting a plant to a battery and wireless sensor with scatter radio and ultra-low cost[J]. IEEE Transactions on Instrumentation and Measurement, 2016,65(2): 388-398. |
[7] | HUYNH N V , HOANG D T , LU X ,et al. Ambient backscatter communications:a contemporary survey[J]. IEEE Communications Surveys and Tutorials, 2018,20(4): 2889-2922. |
[8] | HOANG D T , NIYATO D , WANG P ,et al. Ambient backscatter:a new approach to improve network performance for RF-powered cognitive radio networks[J]. IEEE Transactions on Communications, 2017,65(9): 3659-3674. |
[9] | WANG P , WANG N , DABAGHCHIAN M ,et al. Optimal resource allocation for secure multi-user wireless powered backscatter communication with artificial noise[C]// 2019 IEEE Conference on Computer Communications. Piscataway:IEEE Press, 2019: 460-468. |
[10] | HAN K F , HUANG K B . Wirelessly powered backscatter communication networks:modeling,coverage,and capacity[J]. IEEE Transactions on Wireless Communications, 2017,16(4): 2548-2561. |
[11] | WEI L , MIAO W W , JIANG C L ,et al. Power wireless private network in energy IoT:challenges,opportunities and solutions[C]// 2017 International Smart Cities Conference. Piscataway:IEEE Press, 2017,DOI:10.1109/ISC2.2017.8090803. |
[12] | MA L , LI W H , HOU Y T ,et al. Application of wireless communication technology in ubiquitous power internet of things[C]// 2020 IEEE 3rd International Conference on Computer and Communication Engineering Technology. Piscataway:IEEE Press, 2020,DOI:10.1109/CCET50901.2020.9213170. |
[13] | SAAD W , ZHOU X Y , HAN Z ,et al. On the physical layer security of backscatter wireless systems[J]. IEEE Transactions on Wireless Communications, 2014,13(6): 3442-3451. |
[14] | YANG Q , WANG H M , ZHANG Y ,et al. Physical layer security in MIMO backscatter wireless systems[J]. IEEE Transactions on Wireless Communications, 2016,15(11): 7547-7560. |
[15] | JUELS A . RFID security and privacy:a research survey[J]. IEEE Journal on Selected Areas in Communications, 2006,24(2): 381-394. |
[16] | GARFINKEL S L , JUELS A , PAPPU R . RFID privacy:an overview of problems and proposed solutions[J]. IEEE Security & Privacy, 2005,3(3): 34-43. |
[17] | 胡爱群, 李古月 . 无线通信物理层安全方法综述[J]. 数据采集与处理, 2014,29(3): 341-350. |
HU A Q , LI G Y . Physical layer security in wireless communication:survey[J]. Journal of Data Acquisition and Processing, 2014,29(3): 341-350. | |
[18] | XU D , ZHU H B . Secure transmission for SWIPT IoT systems with full-duplex IoT devices[J]. IEEE Internet of Things Journal, 2019,6(6): 10915-10933. |
[19] | REZAEI R , SUN S M , KANG X ,et al. Secrecy throughput maximization for full-duplex wireless powered IoT networks under fairness constraints[J]. IEEE Internet of Things Journal, 2019,6(4): 6964-6976. |
[20] | ZHU Z Y , WANG N , CHU Z ,et al. AN-aided secure transmission in multi-user MIMO SWIPT systems[C]// 2018 IEEE Wireless Communications and Networking Conference. Piscataway:IEEE Press, 2018: 1558-2612. |
[21] | HE C , WANG Z J , MIAO C Y . Query diversity schemes for backscatter RFID communications with single-antenna tags[J]. IEEE Transactions on Vehicular Technology, 2017,66(8): 6932-6941. |
[22] | LYU B , GUO H Y , YANG Z ,et al. Throughput maximization for hybrid backscatter assisted cognitive wireless powered radio networks[J]. IEEE Internet of Things Journal, 2018,5(3): 2015-2024. |
[23] | MA S , WANG G P , FAN R F ,et al. Blind channel estimation for ambient backscatter communication systems[J]. IEEE Communications Letters, 2018,22(6): 1296-1299. |
[24] | ZHAO W J , WANG G P , ATAPATTU S ,et al. Channel estimation for ambient backscatter communication systems with massive-antenna reader[J]. IEEE Transactions on Vehicular Technology, 2019,68(8): 8254-8258. |
[25] | CHU Z , ZHU Z Y , JOHNSTON M ,et al. Simultaneous wireless information power transfer for MISO secrecy channel[J]. IEEE Transactions on Vehicular Technology, 2016,65(9): 6913-6925. |
[26] | ZHANG Y , LI B , GAO F F ,et al. A robust design for ultra reliable ambient backscatter communication systems[J]. IEEE Internet of Things Journal, 2019,6(5): 8989-8999. |
[27] | SHI L Q , ROSE H Q Y , GUNTHER J ,et al. Energy efficiency for RF-powered backscatter networks using HTT protocol[J]. IEEE Transactions on Vehicular Technology, 2020,69(11): 13932-13936. |
[28] | YAO Q Z , HUANG A P , SHAN H G ,et al. WET-enabled passive communication networks:robust energy minimization with uncertain CSI distribution[J]. IEEE Transactions on Wireless Communications, 2018,17(1): 282-295. |
[29] | WANG T , VANDENDORPE L . On the optimum energy efficiency for flat-fading channels with rate-dependent circuit power[J]. IEEE Transactions on Communications, 2013,61(12): 4910-4921. |
[30] | LE T A , VIEN Q T , NGUYEN H X ,et al. Robust chance-constrained optimization for power-efficient and secure SWIPT systems[J]. IEEE Transactions on Green Communications and Networking, 2017,1(3): 333-346. |
[31] | MA S , HONG M Y , SONG E B ,et al. Outage constrained robust secure transmission for MISO wiretap channels[J]. IEEE Transactions on Wireless Communications, 2014,13(10): 5558-5570. |
[32] | DENG Y F , OHTSUKI T . Low-complexity subspace MMSE channel estimation in massive MU-MIMO system[J]. IEEE Access, 2020,8: 124371-124381. |
[1] | Shiqi ZHAO, Xiaohong HUANG, Zhigang ZHONG. Research and implementation of reputation-based inter-domain routing selection mechanism [J]. Journal on Communications, 2023, 44(6): 47-56. |
[2] | Biao JIN, Yikang LI, Zhiqiang YAO, Yulin CHEN, Jinbo XIONG. GenFedRL: a general federated reinforcement learning framework for deep reinforcement learning agents [J]. Journal on Communications, 2023, 44(6): 183-197. |
[3] | Yuancheng LI, Yongtai QIN. Deep reinforcement learning based algorithm for real-time QoS optimization of software-defined security middle platform [J]. Journal on Communications, 2023, 44(5): 181-192. |
[4] | Yingze LIU, Yuanbo GUO, Chen FANG, Yongfei LI, Qingli CHEN. Intelligent planning method for cyber defense strategies based on bounded rationality [J]. Journal on Communications, 2023, 44(5): 52-63. |
[5] | Renchao XIE, Wen WEN, Qinqin TANG, Yunlong LIU, Gaochang XIE, Tao HUANG. Survey on rail transit mobile edge computing network security [J]. Journal on Communications, 2023, 44(4): 201-215. |
[6] | Zhiyong LUO, Yu ZHANG, Qing WANG, Weiwei SONG. Study of SDN intrusion intent identification algorithm based on Bayesian attack graph [J]. Journal on Communications, 2023, 44(4): 216-225. |
[7] | Ming XU, Baojun ZHANG, Yiming WU, Chenduo YING, Ning ZHENG. Cyber attacks and privacy protection distributed consensus algorithm for multi-agent systems [J]. Journal on Communications, 2023, 44(3): 117-127. |
[8] | Haiyan KANG, Molan LONG. Research on network attack analysis method based on attack graph of absorbing Markov chain [J]. Journal on Communications, 2023, 44(2): 122-135. |
[9] | Caixia LIU, Xinsheng JI, Jiangxing WU. Endogenous security common problems and solutions of the mobile communication networks [J]. Journal on Communications, 2022, 43(9): 70-79. |
[10] | Runhua SHI, Hui YU, Weiyang KE, Xiaotong XU. Quantum anonymous one-vote veto protocol based on BB84 states [J]. Journal on Communications, 2022, 43(8): 109-120. |
[11] | Weiyu CHEN, Junshan LUO, Fanggang WANG, Haiyang DING, Shilian WANG, Guojiang XIA. Survey of capacity limits and implementation techniques in wireless covert communication [J]. Journal on Communications, 2022, 43(8): 203-218. |
[12] | Zhenyu WANG, Yang GUO, Shaoqing LI, Shen HOU, Ding DENG. Design of efficient anonymous identity authentication protocol for lightweight IoT devices [J]. Journal on Communications, 2022, 43(7): 49-61. |
[13] | Yuanbo GUO, Yongfei LI, Qingli CHEN, Chen FANG, Yangyang HU. Fusion of Focal Loss’s cyber threat intelligence entity extraction [J]. Journal on Communications, 2022, 43(7): 85-92. |
[14] | Haijun LIAO, Zehan JIA, Zhenyu ZHOU, Nian LIU, Fei WANG, Zhong GAN, Xianjiong YAO. Dispatching and control information freshness guaranteed resource optimization in simplified power Internet of things [J]. Journal on Communications, 2022, 43(7): 203-214. |
[15] | Xiaodong YANG, Tian TIAN, Jiaqi WANG, Meijuan LI, Caifen WANG. Certificateless ciphertext retrieval scheme with multi-user and multi-keyword based on cloud-edge collaboration [J]. Journal on Communications, 2022, 43(5): 144-154. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|