Secrecy in Wireless Information and Power Transfer for One-Way and Two-Way Untrusted Relaying with Friendly Jamming
An untrusted relay system combined with a simultaneous wireless information and power transfer (SWIPT) scheme is considered in one-way and two-way relaying transmission strategies. In the system, two source nodes can only communicate with each other via an untrusted energy harvesting relay node, whi...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi Limited
2017-01-01
|
Series: | Mobile Information Systems |
Online Access: | http://dx.doi.org/10.1155/2017/2192606 |
id |
doaj-2f2d25e879f6453683d528ccd0c7f641 |
---|---|
record_format |
Article |
spelling |
doaj-2f2d25e879f6453683d528ccd0c7f6412021-07-02T02:04:27ZengHindawi LimitedMobile Information Systems1574-017X1875-905X2017-01-01201710.1155/2017/21926062192606Secrecy in Wireless Information and Power Transfer for One-Way and Two-Way Untrusted Relaying with Friendly JammingLin Xiao0Tao Zhang1Xue Shen2Dingcheng Yang3Laurie Cuthbert4Information Engineering School, Nanchang University, Nanchang, ChinaInformation Engineering School, Nanchang University, Nanchang, ChinaInformation Engineering School, Nanchang University, Nanchang, ChinaInformation Engineering School, Nanchang University, Nanchang, ChinaInformation Systems Research Centre, Macao Polytechnic Institute, Rua de Luis Gonzaga Gomes, MacauAn untrusted relay system combined with a simultaneous wireless information and power transfer (SWIPT) scheme is considered in one-way and two-way relaying transmission strategies. In the system, two source nodes can only communicate with each other via an untrusted energy harvesting relay node, which sends the message by using its harvested energy from the source nodes. Specifically, we classify the intermediate relay as an eavesdropper into two modes: active eavesdropper and nonactive eavesdropper, depending on whether it has sufficient energy of its own to transmit the message or not. Under a simplified three-node fading wiretap channel setup, the transmit power allocation and power splitting ratio are jointly optimized to minimize the outage probability in the delay-sensitive case and to maximize the average rate in the delay-insensitive case, subject to the average and peak total power constraints. Applying the dual-decomposition method, the optimization problem can be efficiently solved in the delay-sensitive scenario. Moreover, an iterative algorithm is proposed to derive the solution to maximize the average rate in the delay-insensitive scenario. Numerical results demonstrate the performance of system outage probability in the two modes versus different rates and how efficiently the secrecy rate is improved compared with traditional schemes.http://dx.doi.org/10.1155/2017/2192606 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Lin Xiao Tao Zhang Xue Shen Dingcheng Yang Laurie Cuthbert |
spellingShingle |
Lin Xiao Tao Zhang Xue Shen Dingcheng Yang Laurie Cuthbert Secrecy in Wireless Information and Power Transfer for One-Way and Two-Way Untrusted Relaying with Friendly Jamming Mobile Information Systems |
author_facet |
Lin Xiao Tao Zhang Xue Shen Dingcheng Yang Laurie Cuthbert |
author_sort |
Lin Xiao |
title |
Secrecy in Wireless Information and Power Transfer for One-Way and Two-Way Untrusted Relaying with Friendly Jamming |
title_short |
Secrecy in Wireless Information and Power Transfer for One-Way and Two-Way Untrusted Relaying with Friendly Jamming |
title_full |
Secrecy in Wireless Information and Power Transfer for One-Way and Two-Way Untrusted Relaying with Friendly Jamming |
title_fullStr |
Secrecy in Wireless Information and Power Transfer for One-Way and Two-Way Untrusted Relaying with Friendly Jamming |
title_full_unstemmed |
Secrecy in Wireless Information and Power Transfer for One-Way and Two-Way Untrusted Relaying with Friendly Jamming |
title_sort |
secrecy in wireless information and power transfer for one-way and two-way untrusted relaying with friendly jamming |
publisher |
Hindawi Limited |
series |
Mobile Information Systems |
issn |
1574-017X 1875-905X |
publishDate |
2017-01-01 |
description |
An untrusted relay system combined with a simultaneous wireless information and power transfer (SWIPT) scheme is considered in one-way and two-way relaying transmission strategies. In the system, two source nodes can only communicate with each other via an untrusted energy harvesting relay node, which sends the message by using its harvested energy from the source nodes. Specifically, we classify the intermediate relay as an eavesdropper into two modes: active eavesdropper and nonactive eavesdropper, depending on whether it has sufficient energy of its own to transmit the message or not. Under a simplified three-node fading wiretap channel setup, the transmit power allocation and power splitting ratio are jointly optimized to minimize the outage probability in the delay-sensitive case and to maximize the average rate in the delay-insensitive case, subject to the average and peak total power constraints. Applying the dual-decomposition method, the optimization problem can be efficiently solved in the delay-sensitive scenario. Moreover, an iterative algorithm is proposed to derive the solution to maximize the average rate in the delay-insensitive scenario. Numerical results demonstrate the performance of system outage probability in the two modes versus different rates and how efficiently the secrecy rate is improved compared with traditional schemes. |
url |
http://dx.doi.org/10.1155/2017/2192606 |
work_keys_str_mv |
AT linxiao secrecyinwirelessinformationandpowertransferforonewayandtwowayuntrustedrelayingwithfriendlyjamming AT taozhang secrecyinwirelessinformationandpowertransferforonewayandtwowayuntrustedrelayingwithfriendlyjamming AT xueshen secrecyinwirelessinformationandpowertransferforonewayandtwowayuntrustedrelayingwithfriendlyjamming AT dingchengyang secrecyinwirelessinformationandpowertransferforonewayandtwowayuntrustedrelayingwithfriendlyjamming AT lauriecuthbert secrecyinwirelessinformationandpowertransferforonewayandtwowayuntrustedrelayingwithfriendlyjamming |
_version_ |
1721343795180601344 |