2020
DOI: 10.1109/access.2020.3044760
|View full text |Cite
|
Sign up to set email alerts
|

Performance Analysis of an Energy-Harvesting IoT System Using a UAV Friendly Jammer and NOMA Under Cooperative Attack

Abstract: In this paper, we consider the information leakage and outage probabilities of a multipleinput single-output (MISO) energy-harvesting (EH) Internet of Things (IoT) system in which a multiantenna ground base station (GBS) transmits messages to legitimate IoT destinations (LIDs) with the help of IoT relays (IRs) using non-orthogonal multiple access (NOMA) in the presence of a malicious jammer (MJ) and eavesdroppers (EAVs). The communication protocol is separated into two phases. In the EH phase, the IRs harvest … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
11
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 17 publications
(11 citation statements)
references
References 65 publications
0
11
0
Order By: Relevance
“…The second direction lies in EH. Recently, to enhance of the wireless communication networks in term of the EE, RF signals have been evaluated as viable new sources to implement EH as recent works in [29,30,31,32,33,34]. Motivated by these approaches, we design linear EH in the perspective of HetNet manner.…”
Section: A Related Work and Motivationmentioning
confidence: 99%
“…The second direction lies in EH. Recently, to enhance of the wireless communication networks in term of the EE, RF signals have been evaluated as viable new sources to implement EH as recent works in [29,30,31,32,33,34]. Motivated by these approaches, we design linear EH in the perspective of HetNet manner.…”
Section: A Related Work and Motivationmentioning
confidence: 99%
“…Lowpower designs are frequently employed for most IDs, resulting in restricted transmission coverage. Since unmanned aerial vehicles (UAVs) are easy to deploy, have high degrees of mobility, and have a low operating costs, they can be used to relay data from IDs to MEC servers [11]- [14]. Therefore, UAVs have emerged as one of the most essential technologies for establishing flexible MEC in IoT networks at any time and in any location [15]- [17].…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, we consider that UR and IDs can harvest RF energy from a PB [33] to improve the data offloading process. In addition, we consider UR communications via Line-of-Sight (LoS) and non-Line-of-Sight (NLoS) links [11], [14], as well as the Nakagami-m fading channel [13]. Furthermore, we investigate the performance of UR NOMA-based MEC systems in practical cases of ICSI at receiver nodes and ISIC [34].…”
Section: Introductionmentioning
confidence: 99%
“…Although wireless networks offer a huge number of advantages such as mobility, flexibility, scalability, lower cost and less delay for installation and updating, wireless transmissions are more vulnerable to jamming attacks due to the inherent open nature of wireless communication [17]- [19]. In fact, jamming and also co-operative attacks can severely interrupt legitimate ongoing transmissions.…”
Section: Introductionmentioning
confidence: 99%
“…However, there are rather few previous studies on anti jamming attacks and how they affect the outage performance, especially in networks relying on power allocation and channel estimation like NOMA. In [19], [30], a cooperative attack between a malicious jammer and an eavesdropper is introduced in the context that the locations of all nodes are fixed. However, these works do not show how to choose the power allocation while dealing with the jamming attack to maximize the communication reliability.…”
Section: Introductionmentioning
confidence: 99%