2018
DOI: 10.1155/2018/8747420
|View full text |Cite
|
Sign up to set email alerts
|

On the Secrecy Performance of SWIPT Receiver Architectures with Multiple Eavesdroppers

Abstract: Physical layer security (PLS) has been shown to hold promise as a new paradigm for securing wireless links. In contrast with the conventional cryptographic techniques, PLS methods exploit the random fading in wireless channels to provide link security. As the channel dynamics prevent a constant rate of secure communications between the legitimate terminals, the outage probability of the achievable secrecy rate is used as a measure of the secrecy performance. This work investigates the secrecy outage probabilit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5

Relationship

2
3

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 47 publications
(88 reference statements)
0
3
0
Order By: Relevance
“…Xu et al [7] considered multi‐party EVE‐collusion in simultaneous wireless information and power transfer (SWIPT), and discussed the optimisation problem to achieve the maximise secure transmission rate for both the perfect channel state information (CSI) and imperfect CSI cases. The loss in secrecy performance due to eavesdropper collusion on SWIPT system was shown in [8]. Jiang et al [9] investigated the secrecy performance in the uplink non‐orthogonal multiple access multi‐eavesdropper wiretap channels, where the secrecy performance in non‐colluding scenario outperforms that in the former outperformed the later as expected.…”
Section: Introductionmentioning
confidence: 92%
“…Xu et al [7] considered multi‐party EVE‐collusion in simultaneous wireless information and power transfer (SWIPT), and discussed the optimisation problem to achieve the maximise secure transmission rate for both the perfect channel state information (CSI) and imperfect CSI cases. The loss in secrecy performance due to eavesdropper collusion on SWIPT system was shown in [8]. Jiang et al [9] investigated the secrecy performance in the uplink non‐orthogonal multiple access multi‐eavesdropper wiretap channels, where the secrecy performance in non‐colluding scenario outperforms that in the former outperformed the later as expected.…”
Section: Introductionmentioning
confidence: 92%
“…Therefore, instead of point to point communication, intermediate relays can be used to improve the performance of the network, in terms of lifetime and reliability. The relay can be charged using one of these methods: 1) using dedicated power transfer source 2) using power splitting (PS) [283], [284], time switching (TS) [285] or antenna selection (AS) [286] receiver architecture. If the relay uses a dedicated power source then the secrecy rate at the relay is similar to conventional relaying networks.…”
Section: A Wireless Information and Power Transfer Cooperative Networkmentioning
confidence: 99%
“…PLS has found applications in almost all emerging areas of modern wireless communications, such as, Unmanned Aerial Vehicle (UAV) communications [3,4], Ultra-Reliable Low-Latency Communications (URLLC) [1,5], and Intelligent Reflecting Surface (IRS) assisted communications [6] to name a few. Symmetric and asymmetric encryption are used in most modern day wireless communications for securing information against malicious wireless nodes [7]. However, secret key distribution and management infrastructure could become challenging in some modern modes of communications like Device-to-Device (D2D) communications due to limited device resources [8].…”
Section: Introductionmentioning
confidence: 99%