Skip to main content
Top
Published in: Wireless Personal Communications 1/2021

24-04-2021

Secrecy Analysis of Overlay Mechanism in Radio Frequency Energy Harvesting Networks with Jamming under Nakagami-m fading

Published in: Wireless Personal Communications | Issue 1/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Overlay mechanism offers secondary users (SUs) chances to access licensed spectrum of primary users (PUs) to improve spectrum utilization efficiency. However, these chances impose serious security challenges when wire-tappers emulate legal users (SUs/PUs) to eavesdrop secret information. Moreover, energy sources available for SUs to transmit its private information as well as assist PUs in the overlay mechanism are problematic in green communication age. This paper proposes SUs who are able to scavenge radio frequency energy in signals of PUs to meet green communication requirement and jam wire-tappers to secure both secondary and primary information. Important secrecy performance indicators of overlay mechanism in radio frequency energy harvesting networks with jamming under Nakagami-m fading are evaluated by proposed precise expressions. Various results validate these expressions and show that secrecy performances of SUs and PUs are flexibly controlled, compromised and optimized with proper selections of system parameters as well as are dramatically affected by fading severity.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Footnotes
1
The idea of this paper was conceived in our conference papers where we briefly presented a part of this paper for Rayleigh fading in [29] and Nakagami-m fading in [30]. However, we did not provide the detailed derivations of the performance expressions, various results, and thorough discussions on the results in both these conference papers. This paper presents the complete idea and derives elaborately the performance expressions as well as provides various results and discussions to obtain insights into the secrecy capability.
 
2
Energy which information decoder consumes is assumed to be negligible. This assumption is widely acknowledged in the literature (e.g., [1, 10, 13, 1620]).
 
3
For example, [1619] and [32] proposed a collaborative hand-shaking merely among \(\texttt {C}\), \(\texttt {B}\) and \(\texttt {D}\) for \(\texttt {C}\) to securely share the seed of its jamming signal generator with \(\texttt {B}\) and \(\texttt {D}\).
 
Literature
1.
go back to reference Ho, C. D., et al. (2021). Short-packet communications in wireless-powered cognitive IoT networks: Performance analysis and deep learning evaluation. IEEE Transactions on Vehicular Technology, 70(3), 2894–2899.CrossRef Ho, C. D., et al. (2021). Short-packet communications in wireless-powered cognitive IoT networks: Performance analysis and deep learning evaluation. IEEE Transactions on Vehicular Technology, 70(3), 2894–2899.CrossRef
2.
go back to reference Askar, R., et al. (2021). Interference handling challenges toward full duplex evolution in 5G and beyond cellular networks. IEEE Wireless Communications, 28(1), 51–59.CrossRef Askar, R., et al. (2021). Interference handling challenges toward full duplex evolution in 5G and beyond cellular networks. IEEE Wireless Communications, 28(1), 51–59.CrossRef
3.
go back to reference Akhmetkaziyev, Y., et al. (2021). Performance of NOMA-enabled cognitive satellite-terrestrial networks with non-ideal system limitations. IEEE Access, 9, 35932–35946.CrossRef Akhmetkaziyev, Y., et al. (2021). Performance of NOMA-enabled cognitive satellite-terrestrial networks with non-ideal system limitations. IEEE Access, 9, 35932–35946.CrossRef
5.
go back to reference Duy, T. T. et al. (2021). Outage Probability of Interference Cancellation Based Two-Way Relaying Cognitive Radio Protocol with Primary MIMO Communication, In Proc. IEEE ICCE, Phu Quoc Island, Vietnam, 13-15, pp. 481-486. Duy, T. T. et al. (2021). Outage Probability of Interference Cancellation Based Two-Way Relaying Cognitive Radio Protocol with Primary MIMO Communication, In Proc. IEEE ICCE, Phu Quoc Island, Vietnam, 13-15, pp. 481-486.
6.
go back to reference Albreem, M. A., et al. (2021). Green Internet of Things (GIoT): Applications, practices, awareness, and challenges. IEEE Access, 9, 38833–38858.CrossRef Albreem, M. A., et al. (2021). Green Internet of Things (GIoT): Applications, practices, awareness, and challenges. IEEE Access, 9, 38833–38858.CrossRef
7.
go back to reference Shaikh, F. K., et al. (2016). Energy harvesting in wireless sensor networks: A comprehensive review. Renewable and Sustainable Energy Reviews, 55, 1041–1054.CrossRef Shaikh, F. K., et al. (2016). Energy harvesting in wireless sensor networks: A comprehensive review. Renewable and Sustainable Energy Reviews, 55, 1041–1054.CrossRef
8.
go back to reference Zeadally, S., et al. (2020). Design architectures for energy harvesting in the Internet of Things. Renewable and Sustainable Energy Reviews, 128, 1–22.CrossRef Zeadally, S., et al. (2020). Design architectures for energy harvesting in the Internet of Things. Renewable and Sustainable Energy Reviews, 128, 1–22.CrossRef
9.
go back to reference Wang, M., et al. (2021). Performance analysis of millimeter wave wireless power transfer with imperfect beam alignment. IEEE Transactions on Vehicular Technology, 70(3), 2605–2618.CrossRef Wang, M., et al. (2021). Performance analysis of millimeter wave wireless power transfer with imperfect beam alignment. IEEE Transactions on Vehicular Technology, 70(3), 2605–2618.CrossRef
10.
go back to reference Al-Obiedollah, H., et al. (2021). A joint beamforming and power-splitter optimization technique for SWIPT in MISO-NOMA system. IEEE Access, 9, 33018–33029.CrossRef Al-Obiedollah, H., et al. (2021). A joint beamforming and power-splitter optimization technique for SWIPT in MISO-NOMA system. IEEE Access, 9, 33018–33029.CrossRef
12.
go back to reference Song, K., et al. (2021). On the secrecy for relay-aided SWIPT internet of things system with cooperative eavesdroppers. IEEE Access, 9, 28204–28212.CrossRef Song, K., et al. (2021). On the secrecy for relay-aided SWIPT internet of things system with cooperative eavesdroppers. IEEE Access, 9, 28204–28212.CrossRef
14.
go back to reference Ho-Van, K., et al. (2020). Security performance of underlay cognitive relaying networks with energy harvesting. Wireless Personal Communications, 110(2), 829–846.CrossRef Ho-Van, K., et al. (2020). Security performance of underlay cognitive relaying networks with energy harvesting. Wireless Personal Communications, 110(2), 829–846.CrossRef
15.
go back to reference Ho-Van, K., et al. (2020). Security analysis for underlay cognitive network with energy scavenging capable relay over Nakagami-m fading channels. Wireless Personal Communications, 110(2), 829–846.CrossRef Ho-Van, K., et al. (2020). Security analysis for underlay cognitive network with energy scavenging capable relay over Nakagami-m fading channels. Wireless Personal Communications, 110(2), 829–846.CrossRef
16.
go back to reference Su, R. et al. (2019). Secure Cooperative Transmission in Cognitive AF Relay Systems with Destination-Aided Jamming and Energy Harvesting, In Proc. IEEE PIMRC, Istanbul, Turkey, 8-11 Sept. 2019, pp. 1-5 Su, R. et al. (2019). Secure Cooperative Transmission in Cognitive AF Relay Systems with Destination-Aided Jamming and Energy Harvesting, In Proc. IEEE PIMRC, Istanbul, Turkey, 8-11 Sept. 2019, pp. 1-5
17.
go back to reference Su, R. et al. (2018). Destination-Assisted Jamming for Physical-Layer Security in SWIPT Cognitive Radio Systems, In Proc. IEEE WCNC, Barcelona, Spain, 15-18 April 2018, pp. 1-6. Su, R. et al. (2018). Destination-Assisted Jamming for Physical-Layer Security in SWIPT Cognitive Radio Systems, In Proc. IEEE WCNC, Barcelona, Spain, 15-18 April 2018, pp. 1-6.
18.
go back to reference Wang, D., et al. (2019). Primary privacy preserving with joint wireless power and information transfer for cognitive radio networks. IEEE Transactions on Cognitive Communications and Networking, 6(2), 683–693.CrossRef Wang, D., et al. (2019). Primary privacy preserving with joint wireless power and information transfer for cognitive radio networks. IEEE Transactions on Cognitive Communications and Networking, 6(2), 683–693.CrossRef
19.
go back to reference Xu, M. et al. (2018). Secure Transmission Solutions in Energy Harvesting Enabled Cooperative Cognitive Radio Networks, in Proc. IEEE WCNC, Barcelona, Spain, 15-18 April 2018, pp. 1-6. Xu, M. et al. (2018). Secure Transmission Solutions in Energy Harvesting Enabled Cooperative Cognitive Radio Networks, in Proc. IEEE WCNC, Barcelona, Spain, 15-18 April 2018, pp. 1-6.
20.
go back to reference Li, M., et al. (2018). Physical layer security in overlay cognitive radio networks with energy harvesting. IEEE Transactions on Vehicular Technology, 67(11), 11274–11279.CrossRef Li, M., et al. (2018). Physical layer security in overlay cognitive radio networks with energy harvesting. IEEE Transactions on Vehicular Technology, 67(11), 11274–11279.CrossRef
21.
go back to reference Khan, R., et al. (2020). A survey on security and privacy of 5G technologies: Potential solutions, recent advancements, and future directions. IEEE Communications Surveys and Tutorials, 22, 196–248.CrossRef Khan, R., et al. (2020). A survey on security and privacy of 5G technologies: Potential solutions, recent advancements, and future directions. IEEE Communications Surveys and Tutorials, 22, 196–248.CrossRef
24.
go back to reference Alnagar, S. I., et al. (2021). Q-learning-based power allocation for secure wireless communication in UAV-aided relay network. IEEE Access, 9, 33169–33180.CrossRef Alnagar, S. I., et al. (2021). Q-learning-based power allocation for secure wireless communication in UAV-aided relay network. IEEE Access, 9, 33169–33180.CrossRef
27.
go back to reference Sun, L., et al. (2020). Alternate-jamming-aided wireless physical-layer surveillance: Protocol design and performance analysis. IEEE Transactions on Information Forensics and Security, 16, 1989–2003.CrossRef Sun, L., et al. (2020). Alternate-jamming-aided wireless physical-layer surveillance: Protocol design and performance analysis. IEEE Transactions on Information Forensics and Security, 16, 1989–2003.CrossRef
28.
go back to reference Islam, S. H., et al. (2021). Impact of correlation and pointing error on secure outage performance over arbitrary correlated Nakagami-m and M-turbulent fading mixed RF-FSO channel. IEEE Photonics Journal, 13(2), 1–17.CrossRef Islam, S. H., et al. (2021). Impact of correlation and pointing error on secure outage performance over arbitrary correlated Nakagami-m and M-turbulent fading mixed RF-FSO channel. IEEE Photonics Journal, 13(2), 1–17.CrossRef
29.
go back to reference Dang-Ngoc, H. et al. (2020). Key secrecy performance metrics of overlay networks with energy scavenging and artificial noise,” In Proc. IEEE SigTelCom, Ha Noi, Vietnam, 28-29 Aug. 2020, pp. 77-81. Dang-Ngoc, H. et al. (2020). Key secrecy performance metrics of overlay networks with energy scavenging and artificial noise,” In Proc. IEEE SigTelCom, Ha Noi, Vietnam, 28-29 Aug. 2020, pp. 77-81.
30.
go back to reference Pham-Thi-Dan, N. et al. (2020) Secrecy throughput analysis of energy scavenging overlay networks with artificial noise,” In Proc. IEEE ATC, Khanh Hoa, Vietnam, 08-10 Oct. 2020, pp. 90-94. Pham-Thi-Dan, N. et al. (2020) Secrecy throughput analysis of energy scavenging overlay networks with artificial noise,” In Proc. IEEE ATC, Khanh Hoa, Vietnam, 08-10 Oct. 2020, pp. 90-94.
31.
go back to reference Gradshteyn, I. S., et al. (2000). Table of integrals, series and products (6th ed.). San Diego, CA: Academic.MATH Gradshteyn, I. S., et al. (2000). Table of integrals, series and products (6th ed.). San Diego, CA: Academic.MATH
Metadata
Title
Secrecy Analysis of Overlay Mechanism in Radio Frequency Energy Harvesting Networks with Jamming under Nakagami-m fading
Publication date
24-04-2021
Published in
Wireless Personal Communications / Issue 1/2021
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-021-08468-2

Other articles of this Issue 1/2021

Wireless Personal Communications 1/2021 Go to the issue