2018
DOI: 10.1109/tvt.2017.2756877
|View full text |Cite
|
Sign up to set email alerts
|

Wireless Powered Cooperative Jamming for Secure OFDM System

Abstract: This paper studies the secrecy communication in an orthogonal frequency division multiplexing (OFDM) system, where a source sends confidential information to a destination in the presence of a potential eavesdropper. We employ wireless powered cooperative jamming to improve the secrecy rate of this system with the assistance of a cooperative jammer, which works in the harvest-then-jam protocol over two time-slots. In the first slot, the source sends dedicated energy signals to power the jammer; in the second s… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
60
0
1

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
2
1

Relationship

2
7

Authors

Journals

citations
Cited by 94 publications
(61 citation statements)
references
References 41 publications
0
60
0
1
Order By: Relevance
“…Therefore, how to efficiently utilize the scarce harvested energy becomes particularly crucial for realizing sustainable and scalable IoT networks. To this end, a "harvest and then transmit" protocol is proposed in [3]- [5] for wireless powered communication networks (WPCNs), where devices first harvest energy in the downlink (DL) for wireless energy transfer (WET) and then transmit information signals in the uplink (UL) for wireless information transmission (WIT).…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, how to efficiently utilize the scarce harvested energy becomes particularly crucial for realizing sustainable and scalable IoT networks. To this end, a "harvest and then transmit" protocol is proposed in [3]- [5] for wireless powered communication networks (WPCNs), where devices first harvest energy in the downlink (DL) for wireless energy transfer (WET) and then transmit information signals in the uplink (UL) for wireless information transmission (WIT).…”
Section: Introductionmentioning
confidence: 99%
“…Here, E(·) and Tr(·) denote statistical expectation and the trace of a matrix, respectively. By ignoring the negligible receiver noise power for energy harvesting, the amount of energy harvested at device k under a linear energy harvesting model 1 [7], [8], [10], [13], [20] can be expressed as…”
Section: A System Modelmentioning
confidence: 99%
“…Recently, wireless-powered communication networks (WPCNs) have been proposed in [7] where a dedicated power station (PS) first broadcasts energy signals to devices for downlink (DL) WPT and then the devices exploit the harvested energy for uplink wireless information transmission (UL WIT). WPCNs have been extended to different practical scenarios such as multi-antenna [8], [9], multi-carrier [10], [11], secure relay [12], and cognitive networks [13], [14]. In particular, a distributed power control algorithm is proposed in [11] to maximize the user energy efficiency.…”
Section: Introductionmentioning
confidence: 99%
“…The physical-layer security in WPCNs has been investigated in [20]- [26]. In [20], the source node was assumed to harvest energy from the base station and use these energy for interfering with the EAVs, and the secrecy throughput was maximized under the secrecy constraint and the transmit power constraint.…”
Section: Related Workmentioning
confidence: 99%