Skip to main content
Top
Published in: Telecommunication Systems 3/2021

05-07-2021

Impact of channel estimation-and-artificial noise cancellation imperfection on artificial noise-aided energy harvesting overlay networks

Authors: Khuong Ho-Van, Thiem Do-Dac

Published in: Telecommunication Systems | Issue 3/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

EHONs (Energy Harvesting Overlay Networks) satisfy stringent design requirements such as high energy-and-spectrum utilization efficiencies. However, due to open access nature of these networks, eavesdroppers can emulate cognitive radios to wire-tap legitimate information, inducing information security to become a great concern. In order to protect legitimate information against eavesdroppers, this paper generates artificial noise transmitted simultaneously with legitimate information to interfere eavesdroppers. Nonetheless, artificial noise cannot be perfectly suppressed at legitimate receivers as for its primary purpose of interfering only eavesdroppers. Moreover, channel information used for signal detection is hardly estimated at receivers with absolute accuracy. As such, to quickly evaluate impact of channel estimation-and-artificial noise cancellation imperfection on secrecy performance of secondary/primary communication in ANaEHONs (Artificial Noise-aided EHONs), this paper firstly proposes precise closed-form formulas of primary/secondary SOP (Secrecy Outage Probability). Then, computer simulations are provided to corroborate these formulas. Finally, various results are illustrated to shed insights into secrecy performance of ANaEHON with key system parameters from which optimum parameters are recognized. Notably, secondary/primary communication can be secured at different levels by flexibly adjusting various parameters of the proposed system model.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
[24] investigated the same system model as [14] and [15]. Nonetheless, the energy source which the secondary transmitter scavenges is not RF signals, significantly simplifying the analysis in [24]. Furthermore, [24] ignored artificial noise. Consequently, references such as [24] are not related works for survey.
 
2
Decoding with infinitesimal power is assumed. This assumption is popularized in previous publications (e.g., [16, 2729]).
 
3
In [16], Stage II allows ST to always relay primary data, leading to error propagation for primary data. Nonetheless, the secondary/primary SOP analysis was dissembled in [16]. Consequently, error propagation was not considered in the SOP analysis.
 
Literature
1.
go back to reference Yu, L., Liu, Z., Wen, M., Cai, D., Dang, S., Wang, Y., & Xiao, P. (2021). Sparse code multiple access for 6G wireless communication networks: Recent advances and future directions. IEEE Communications Standards Magazine, 5(2), 92–99. Yu, L., Liu, Z., Wen, M., Cai, D., Dang, S., Wang, Y., & Xiao, P. (2021). Sparse code multiple access for 6G wireless communication networks: Recent advances and future directions. IEEE Communications Standards Magazine, 5(2), 92–99.
2.
go back to reference Li, W., Wang, N., Jiao, L., & Zeng, K. (2021). Physical layer spoofing attack detection in MmWave massive MIMO 5G networks. IEEE Access, 9, 60419–60432.CrossRef Li, W., Wang, N., Jiao, L., & Zeng, K. (2021). Physical layer spoofing attack detection in MmWave massive MIMO 5G networks. IEEE Access, 9, 60419–60432.CrossRef
3.
go back to reference De Alwis, C., Kalla, A., Pham, Q. V., Kumar, P., Dev, K., Hwang, W. J., et al. (2021). Survey on 6G frontiers: Trends, applications, requirements, technologies and future research. IEEE OJCS, 2, 836–886. De Alwis, C., Kalla, A., Pham, Q. V., Kumar, P., Dev, K., Hwang, W. J., et al. (2021). Survey on 6G frontiers: Trends, applications, requirements, technologies and future research. IEEE OJCS, 2, 836–886.
4.
go back to reference Motz, C., Paireder, T., & Huemer, M. (2021). Low-complex digital cancellation of transmitter harmonics in LTE-A/5G transceivers. IEEE OJCS, 2, 948–963. Motz, C., Paireder, T., & Huemer, M. (2021). Low-complex digital cancellation of transmitter harmonics in LTE-A/5G transceivers. IEEE OJCS, 2, 948–963.
5.
go back to reference Savic, M., Lukic, M., Danilovic, D., Bodroski, Z., Bajović, D., Mezei, I., et al. (2021). Deep learning anomaly detection for cellular IoT with applications in smart logistics. IEEE Access, 9, 59406–59419.CrossRef Savic, M., Lukic, M., Danilovic, D., Bodroski, Z., Bajović, D., Mezei, I., et al. (2021). Deep learning anomaly detection for cellular IoT with applications in smart logistics. IEEE Access, 9, 59406–59419.CrossRef
6.
go back to reference Ali, M., Qaisar, S., Naeem, M., Ejaz, W., & Kvedaraite, N. (2020). LTE-U WiFi HetNets: Enabling spectrum sharing for 5G/beyond 5G systems. IEEE Internet of Things Magazine, 3(4), 60–65.CrossRef Ali, M., Qaisar, S., Naeem, M., Ejaz, W., & Kvedaraite, N. (2020). LTE-U WiFi HetNets: Enabling spectrum sharing for 5G/beyond 5G systems. IEEE Internet of Things Magazine, 3(4), 60–65.CrossRef
7.
go back to reference Tian, Z., Yi, S., Zhiwen, P., Nan, L., & Xiaohu, Y. (2021). Matching theory based physical layer secure transmission strategy for cognitive radio networks. IEEE Access, 9, 46201–46209.CrossRef Tian, Z., Yi, S., Zhiwen, P., Nan, L., & Xiaohu, Y. (2021). Matching theory based physical layer secure transmission strategy for cognitive radio networks. IEEE Access, 9, 46201–46209.CrossRef
8.
go back to reference Fakharian, M. M. (2021). RF energy harvesting using high impedance asymmetric antenna array without impedance matching network. Radio Science, 56(3), 1–10.CrossRef Fakharian, M. M. (2021). RF energy harvesting using high impedance asymmetric antenna array without impedance matching network. Radio Science, 56(3), 1–10.CrossRef
9.
go back to reference Eltresy, N. A., Abd Elhamid, M., Elsheakh, D. M., Elhennawy, H. M., & Abdallah, E. A. (2021). Silver sandwiched ITO based transparent antenna array for RF energy harvesting in 5G mid-range of frequencies. IEEE Access, 9, 49476–49486.CrossRef Eltresy, N. A., Abd Elhamid, M., Elsheakh, D. M., Elhennawy, H. M., & Abdallah, E. A. (2021). Silver sandwiched ITO based transparent antenna array for RF energy harvesting in 5G mid-range of frequencies. IEEE Access, 9, 49476–49486.CrossRef
11.
go back to reference Le, Q. N., Yadav, A., Nguyen, N. P., Dobre, O. A., & Zhao, R. (2021). Full-duplex non-orthogonal multiple access cooperative overlay spectrum-sharing networks with SWIPT. IEEE Transactions on Green Communications and Networking, 5(1), 322–334.CrossRef Le, Q. N., Yadav, A., Nguyen, N. P., Dobre, O. A., & Zhao, R. (2021). Full-duplex non-orthogonal multiple access cooperative overlay spectrum-sharing networks with SWIPT. IEEE Transactions on Green Communications and Networking, 5(1), 322–334.CrossRef
12.
go back to reference Sadique, J. J., Ullah, S. E., Islam, M. R., Raad, R., Kouzani, A. Z., & Mahmud, M. P. (2021). Transceiver design for full-duplex UAV based zero-padded OFDM system with physical layer security. IEEE Access, 9, 59432–59445.CrossRef Sadique, J. J., Ullah, S. E., Islam, M. R., Raad, R., Kouzani, A. Z., & Mahmud, M. P. (2021). Transceiver design for full-duplex UAV based zero-padded OFDM system with physical layer security. IEEE Access, 9, 59432–59445.CrossRef
13.
go back to reference Shang, X., Yin, H., Wang, Y., Li, M., & Wang, Y. (2021). Secure multiuser scheduling for hybrid relay-assisted wireless powered cooperative communication networks with full-duplex destination-based jamming. IEEE Access, 9, 49774–49787.CrossRef Shang, X., Yin, H., Wang, Y., Li, M., & Wang, Y. (2021). Secure multiuser scheduling for hybrid relay-assisted wireless powered cooperative communication networks with full-duplex destination-based jamming. IEEE Access, 9, 49774–49787.CrossRef
14.
go back to reference Su, R., Wang, Y., & Sun, R. (2019). Secure cooperative transmission in cognitive AF relay systems with destination-aided jamming and energy harvesting. Proc (pp. 1–5). Turkey: IEEE PIMRC. Su, R., Wang, Y., & Sun, R. (2019). Secure cooperative transmission in cognitive AF relay systems with destination-aided jamming and energy harvesting. Proc (pp. 1–5). Turkey: IEEE PIMRC.
15.
go back to reference Su, R., Wang, Y., & Sun, R. (2018). Destination-assisted jamming for physical-layer security in SWIPT cognitive radio systems. Proc (pp. 1–6). Spain: IEEE WCNC. Su, R., Wang, Y., & Sun, R. (2018). Destination-assisted jamming for physical-layer security in SWIPT cognitive radio systems. Proc (pp. 1–6). Spain: IEEE WCNC.
16.
go back to reference Wang, D., Zhou, F., & Leung, V. C. (2020). Primary privacy preserving with joint wireless power and information transfer for cognitive radio networks. IEEE Transactions on Cognitive Communications and Networking, 6(2), 683–693.CrossRef Wang, D., Zhou, F., & Leung, V. C. (2020). Primary privacy preserving with joint wireless power and information transfer for cognitive radio networks. IEEE Transactions on Cognitive Communications and Networking, 6(2), 683–693.CrossRef
17.
go back to reference Xu, M., Jing, T., Fan, X., Wen, Y., & Huo, Y. (2018). Secure transmission solutions in energy harvesting enabled cooperative cognitive radio networks. Proc (pp. 1–6). Spain: IEEE WCNC. Xu, M., Jing, T., Fan, X., Wen, Y., & Huo, Y. (2018). Secure transmission solutions in energy harvesting enabled cooperative cognitive radio networks. Proc (pp. 1–6). Spain: IEEE WCNC.
19.
go back to reference Dang-Ngoc, H., Ho-Quoc, B., & Ho-Van, K. (2020). Key secrecy performance metrics of overlay networks with energy scavenging and artificial noise. In Proc. IEEE SigTelCom, Vietnam, 28-29 Aug. (pp. 77–81). Dang-Ngoc, H., Ho-Quoc, B., & Ho-Van, K. (2020). Key secrecy performance metrics of overlay networks with energy scavenging and artificial noise. In Proc. IEEE SigTelCom, Vietnam, 28-29 Aug. (pp. 77–81).
20.
go back to reference Pham-Thi-Dan, N., Ho-Quoc, B., Ho-Van, K., Do-Dac, T., Nguyen-Huu, P., Vo-Que, S., Pham-Ngoc, S., & Pham-Hong, L. (2020). Secrecy throughput analysis of energy scavenging overlay networks with artificial noise. In Proc. IEEE ATC, Vietnam, 8-10 Aug (pp. 90–94). Pham-Thi-Dan, N., Ho-Quoc, B., Ho-Van, K., Do-Dac, T., Nguyen-Huu, P., Vo-Que, S., Pham-Ngoc, S., & Pham-Hong, L. (2020). Secrecy throughput analysis of energy scavenging overlay networks with artificial noise. In Proc. IEEE ATC, Vietnam, 8-10 Aug (pp. 90–94).
22.
go back to reference Wang, D., & Tellambura, C. (2020). Performance analysis of energy beamforming WPCN links with channel estimation errors. IEEE OJ-CS, 1, 1153–1170. Wang, D., & Tellambura, C. (2020). Performance analysis of energy beamforming WPCN links with channel estimation errors. IEEE OJ-CS, 1, 1153–1170.
23.
go back to reference Li, M., Yin, H., Huang, Y., Wang, Y., & Yu, R. (2018). Physical layer security in overlay cognitive radio networks with energy harvesting. IEEE Transactions on Vehicular Technology, 67, 11274–11279.CrossRef Li, M., Yin, H., Huang, Y., Wang, Y., & Yu, R. (2018). Physical layer security in overlay cognitive radio networks with energy harvesting. IEEE Transactions on Vehicular Technology, 67, 11274–11279.CrossRef
24.
go back to reference Chen, L., Huang, L., Xu, H., Yang, C., Sun, Z., & Wang, X., (2015). Primary secrecy is achievable: Optimal secrecy rate in overlay CRNs with an energy harvesting secondary transmitter. Proc (pp. 1–6). USA: ICCCN. Chen, L., Huang, L., Xu, H., Yang, C., Sun, Z., & Wang, X., (2015). Primary secrecy is achievable: Optimal secrecy rate in overlay CRNs with an energy harvesting secondary transmitter. Proc (pp. 1–6). USA: ICCCN.
25.
go back to reference Kazmi, S. A. A., & Coleri, S. (2020). Optimization of full-duplex relaying system with non-linear energy harvester. IEEE Access, 8, 201566–201576.CrossRef Kazmi, S. A. A., & Coleri, S. (2020). Optimization of full-duplex relaying system with non-linear energy harvester. IEEE Access, 8, 201566–201576.CrossRef
26.
go back to reference Tran, T. N., Vo, T. P., Fazio, P., & Voznak, M. SWIPT model adopting a PS framework to Aid IoT networks inspired by the emerging cooperative NOMA technique. IEEE Access, accepted. Tran, T. N., Vo, T. P., Fazio, P., & Voznak, M. SWIPT model adopting a PS framework to Aid IoT networks inspired by the emerging cooperative NOMA technique. IEEE Access, accepted.
27.
go back to reference Ho-Van, K., & Do-Dac, T. (2019). Security analysis for underlay cognitive network with energy scavenging capable relay over Nakagami-m fading channels. Wireless Communications and Mobile Computing, 2019, 1–16. Ho-Van, K., & Do-Dac, T. (2019). Security analysis for underlay cognitive network with energy scavenging capable relay over Nakagami-m fading channels. Wireless Communications and Mobile Computing, 2019, 1–16.
28.
go back to reference Nguyen-Huu, P., Ho-Van, K., & Bao, V. N. Q. (2019). Secrecy outage analysis of energy harvesting two-way relaying networks with friendly jammer. IET Communications, 13(13), 1877–1885.CrossRef Nguyen-Huu, P., Ho-Van, K., & Bao, V. N. Q. (2019). Secrecy outage analysis of energy harvesting two-way relaying networks with friendly jammer. IET Communications, 13(13), 1877–1885.CrossRef
29.
go back to reference Ge, L., Chen, G., Zhang, Y., Tang, J., Wang, J., & Chambers, J. A. (2020). Performance analysis for multihop cognitive radio networks with energy harvesting by using stochastic geometry. IEEE IoT Journal, 7(2), 1154–1163. Ge, L., Chen, G., Zhang, Y., Tang, J., Wang, J., & Chambers, J. A. (2020). Performance analysis for multihop cognitive radio networks with energy harvesting by using stochastic geometry. IEEE IoT Journal, 7(2), 1154–1163.
30.
go back to reference Gradshteyn, I. S., & Ryzhik, I. M. (2000). Table of integrals, series and products (6th ed.). Academic. Gradshteyn, I. S., & Ryzhik, I. M. (2000). Table of integrals, series and products (6th ed.). Academic.
Metadata
Title
Impact of channel estimation-and-artificial noise cancellation imperfection on artificial noise-aided energy harvesting overlay networks
Authors
Khuong Ho-Van
Thiem Do-Dac
Publication date
05-07-2021
Publisher
Springer US
Published in
Telecommunication Systems / Issue 3/2021
Print ISSN: 1018-4864
Electronic ISSN: 1572-9451
DOI
https://doi.org/10.1007/s11235-021-00808-8

Other articles of this Issue 3/2021

Telecommunication Systems 3/2021 Go to the issue