2019
DOI: 10.1109/access.2019.2915659
|View full text |Cite
|
Sign up to set email alerts
|

Secrecy Throughput Optimization for the WPCNs With Non-Linear EH Model

Abstract: This paper investigates secure communication from a wireless-powered transmitter to a desired receiver with multiple eavesdroppers in the wireless powered communication networks (WPCNs). Considering the non-linear energy harvesting (EH) model, we propose a secure two-phase communication protocol with the help of a hybrid base station (HBS). First, in the power transfer (PT) phase, the HBS transfers wireless power to the transmitter. Then in the subsequent secure information transmission (SIT) phase, the transm… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
16
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 16 publications
(16 citation statements)
references
References 45 publications
(83 reference statements)
0
16
0
Order By: Relevance
“…However, it will be more valuable and practical to investigate the energy accumulation for the unselected relays in the next T duration [26], [34], which is a novel research direction in the future. Besides, it is also a noteworthy point to extend our work to the nonlinear EH model [35]- [38].…”
Section: Introductionmentioning
confidence: 88%
See 3 more Smart Citations
“…However, it will be more valuable and practical to investigate the energy accumulation for the unselected relays in the next T duration [26], [34], which is a novel research direction in the future. Besides, it is also a noteworthy point to extend our work to the nonlinear EH model [35]- [38].…”
Section: Introductionmentioning
confidence: 88%
“…Although replacing or recharging batteries of relay nodes can avoid energy harvesting, it incurs a high cost and cannot be convenient or even hazardous, such as in toxic environments. Therefore, researchers begin to pay more attention on combining the energy harvesting and cooperation communication to prolong the lifetime of wireless networks and solve the scarcity of energy resources [25]- [38]. Literature [27] investigated the secrecy performance of a two-hop communication between a source and a destination using destination-assisted jamming, for the reason that the source used an AF wireless energyharvesting untrusted relay to forward the confidential information to the legitimate destination.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Although imperfect CSI for WPCNs is studied in several studies [23]- [32], these works focus on specific application scenarios and associated optimizations. For example, in [23] the EH process is optimized by considering beamforming design, power allocation, antenna selection and time division based on imperfect CSI.…”
Section: Performance With Imperfect Csimentioning
confidence: 99%