LAUSR.org creates dashboard-style pages of related content for over 1.5 million academic articles. Sign Up to like articles & get recommendations!

Secrecy Throughput Optimization for the WPCNs With Non-Linear EH Model

Photo by jeannasong from unsplash

This paper investigates secure communication from a wireless-powered transmitter to a desired receiver with multiple eavesdroppers in the wireless powered communication networks (WPCNs). Considering the non-linear energy harvesting (EH) model,… Click to show full abstract

This paper investigates secure communication from a wireless-powered transmitter to a desired receiver with multiple eavesdroppers in the wireless powered communication networks (WPCNs). Considering the non-linear energy harvesting (EH) model, we propose a secure two-phase communication protocol with the help of a hybrid base station (HBS). First, in the power transfer (PT) phase, the HBS transfers wireless power to the transmitter. Then in the subsequent secure information transmission (SIT) phase, the transmitter sends the secret information using the energy harvested in the PT, under the protection of artificial noise (AN) generated by the HBS. First, based on this communication protocol, we maximize the secrecy throughput with perfect channel information state (CSI) under the transmit power constraint at the HBS. The secrecy throughput maximization (STM) problem is non-convex, and hence we reformulate it by exploiting the primal decomposition method (PDM) to obtain tractable forms. The PDM-based transmit scheme (PDM-TS) is proposed for the STM. In addition, considering the imperfect CSI of wiretap channel, we further design the robust transmit scheme for the worst-case secrecy throughput maximization (wSTM) problem. Since the wSTM shows high non-convexity, we extend the PDM by combining it with the ${S}$ -procedure, and the PDM-based robust transmit scheme (PDM-RTS) is proposed for the wSTM. Finally, the numerical simulations are provided to show the effectiveness of the proposed transmit schemes.

Keywords: non linear; secrecy throughput; throughput; pdm; transmit

Journal Title: IEEE Access
Year Published: 2019

Link to full text (if available)


Share on Social Media:                               Sign Up to like & get
recommendations!

Related content

More Information              News              Social Media              Video              Recommended



                Click one of the above tabs to view related content.