Secrecy in Wireless Information and Power Transfer for One-Way and Two-Way Untrusted Relaying with Friendly Jamming

An untrusted relay system combined with a simultaneous wireless information and power transfer (SWIPT) scheme is considered in one-way and two-way relaying transmission strategies. In the system, two source nodes can only communicate with each other via an untrusted energy harvesting relay node, whi...

Full description

Bibliographic Details
Main Authors: Lin Xiao, Tao Zhang, Xue Shen, Dingcheng Yang, Laurie Cuthbert
Format: Article
Language:English
Published: Hindawi Limited 2017-01-01
Series:Mobile Information Systems
Online Access:http://dx.doi.org/10.1155/2017/2192606
id doaj-2f2d25e879f6453683d528ccd0c7f641
record_format Article
spelling doaj-2f2d25e879f6453683d528ccd0c7f6412021-07-02T02:04:27ZengHindawi LimitedMobile Information Systems1574-017X1875-905X2017-01-01201710.1155/2017/21926062192606Secrecy in Wireless Information and Power Transfer for One-Way and Two-Way Untrusted Relaying with Friendly JammingLin Xiao0Tao Zhang1Xue Shen2Dingcheng Yang3Laurie Cuthbert4Information Engineering School, Nanchang University, Nanchang, ChinaInformation Engineering School, Nanchang University, Nanchang, ChinaInformation Engineering School, Nanchang University, Nanchang, ChinaInformation Engineering School, Nanchang University, Nanchang, ChinaInformation Systems Research Centre, Macao Polytechnic Institute, Rua de Luis Gonzaga Gomes, MacauAn untrusted relay system combined with a simultaneous wireless information and power transfer (SWIPT) scheme is considered in one-way and two-way relaying transmission strategies. In the system, two source nodes can only communicate with each other via an untrusted energy harvesting relay node, which sends the message by using its harvested energy from the source nodes. Specifically, we classify the intermediate relay as an eavesdropper into two modes: active eavesdropper and nonactive eavesdropper, depending on whether it has sufficient energy of its own to transmit the message or not. Under a simplified three-node fading wiretap channel setup, the transmit power allocation and power splitting ratio are jointly optimized to minimize the outage probability in the delay-sensitive case and to maximize the average rate in the delay-insensitive case, subject to the average and peak total power constraints. Applying the dual-decomposition method, the optimization problem can be efficiently solved in the delay-sensitive scenario. Moreover, an iterative algorithm is proposed to derive the solution to maximize the average rate in the delay-insensitive scenario. Numerical results demonstrate the performance of system outage probability in the two modes versus different rates and how efficiently the secrecy rate is improved compared with traditional schemes.http://dx.doi.org/10.1155/2017/2192606
collection DOAJ
language English
format Article
sources DOAJ
author Lin Xiao
Tao Zhang
Xue Shen
Dingcheng Yang
Laurie Cuthbert
spellingShingle Lin Xiao
Tao Zhang
Xue Shen
Dingcheng Yang
Laurie Cuthbert
Secrecy in Wireless Information and Power Transfer for One-Way and Two-Way Untrusted Relaying with Friendly Jamming
Mobile Information Systems
author_facet Lin Xiao
Tao Zhang
Xue Shen
Dingcheng Yang
Laurie Cuthbert
author_sort Lin Xiao
title Secrecy in Wireless Information and Power Transfer for One-Way and Two-Way Untrusted Relaying with Friendly Jamming
title_short Secrecy in Wireless Information and Power Transfer for One-Way and Two-Way Untrusted Relaying with Friendly Jamming
title_full Secrecy in Wireless Information and Power Transfer for One-Way and Two-Way Untrusted Relaying with Friendly Jamming
title_fullStr Secrecy in Wireless Information and Power Transfer for One-Way and Two-Way Untrusted Relaying with Friendly Jamming
title_full_unstemmed Secrecy in Wireless Information and Power Transfer for One-Way and Two-Way Untrusted Relaying with Friendly Jamming
title_sort secrecy in wireless information and power transfer for one-way and two-way untrusted relaying with friendly jamming
publisher Hindawi Limited
series Mobile Information Systems
issn 1574-017X
1875-905X
publishDate 2017-01-01
description An untrusted relay system combined with a simultaneous wireless information and power transfer (SWIPT) scheme is considered in one-way and two-way relaying transmission strategies. In the system, two source nodes can only communicate with each other via an untrusted energy harvesting relay node, which sends the message by using its harvested energy from the source nodes. Specifically, we classify the intermediate relay as an eavesdropper into two modes: active eavesdropper and nonactive eavesdropper, depending on whether it has sufficient energy of its own to transmit the message or not. Under a simplified three-node fading wiretap channel setup, the transmit power allocation and power splitting ratio are jointly optimized to minimize the outage probability in the delay-sensitive case and to maximize the average rate in the delay-insensitive case, subject to the average and peak total power constraints. Applying the dual-decomposition method, the optimization problem can be efficiently solved in the delay-sensitive scenario. Moreover, an iterative algorithm is proposed to derive the solution to maximize the average rate in the delay-insensitive scenario. Numerical results demonstrate the performance of system outage probability in the two modes versus different rates and how efficiently the secrecy rate is improved compared with traditional schemes.
url http://dx.doi.org/10.1155/2017/2192606
work_keys_str_mv AT linxiao secrecyinwirelessinformationandpowertransferforonewayandtwowayuntrustedrelayingwithfriendlyjamming
AT taozhang secrecyinwirelessinformationandpowertransferforonewayandtwowayuntrustedrelayingwithfriendlyjamming
AT xueshen secrecyinwirelessinformationandpowertransferforonewayandtwowayuntrustedrelayingwithfriendlyjamming
AT dingchengyang secrecyinwirelessinformationandpowertransferforonewayandtwowayuntrustedrelayingwithfriendlyjamming
AT lauriecuthbert secrecyinwirelessinformationandpowertransferforonewayandtwowayuntrustedrelayingwithfriendlyjamming
_version_ 1721343795180601344