scholarly journals Secrecy Performance Analysis of Wireless Powered Sensor Networks Under Saturation Nonlinear Energy Harvesting and Activation Threshold

Sensors ◽  
2020 ◽  
Vol 20 (6) ◽  
pp. 1632 ◽  
Author(s):  
Xiaohui Shang ◽  
Hao Yin ◽  
Yida Wang ◽  
Mu Li ◽  
Yong Wang

In this paper, we investigate the impact of saturation nonlinear energy harvesting (EH) and activation threshold on the multiuser wireless powered sensor networks (WPSNs) from the physical layer security (PLS) perspective. In particular, for improving the secrecy performance, the generalized multiuser scheduling (GMS) scheme is exploited, in which the Kth strongest sensor is chosen based on the legitimate link. For evaluating the impact of various key parameters on the security of system, we obtain the exact closed-form expressions for secrecy outage probability (SOP) under linear EH (LEH), saturation nonlinear EH (SNEH) and saturation nonlinear EH with activation threshold (SNAT), respectively, and solve the maximization problem of secure energy efficiency (SEE). Simulation results demonstrate that: (1) the number of source sensors, the EH efficiency and the transmit power of power beacon (PB) all have positive impact on SOP, and the smaller generalized selection coefficient is advantageous for secrecy performance; (2) LEH is an ideal situation for SNEH when the saturation threshold is large enough and SNEH is a special situation for SNAT when the activation threshold is low enough; (3) the time-switching factor and the activation threshold both have an important impact on the secrecy performance, which are worth considering carefully.

2018 ◽  
Vol 2018 ◽  
pp. 1-11 ◽  
Author(s):  
Dan Deng ◽  
Chao Li ◽  
Lisheng Fan ◽  
Xin Liu ◽  
Fasheng Zhou

This paper studies the impacts of antenna selection algorithms in decode-and-forward (DF) cooperative nonorthogonal multiple access (NOMA) networks, where the secure information from the relay can be overheard by an eavesdropper in the networks. In order to ensure the secure transmission, an optimal antenna selection algorithm is proposed to choose one best relay’s antenna to assist the secure transmission. We study the impact of antenna selection on the system secure communication through deriving the analytical expression of the secrecy outage probability along with the asymptotic expression in the high regime of signal-to-noise ratio (SNR) and main-to-eavesdropper ratio (MER). From the analytical and asymptotic expressions, we find that the system secure performance is highly dependent on the system parameters such as the number of antennas at the relay, SNR, and MER. In particular, the secrecy diversity order of the system is equal to the antenna number, when the interference from the second user is limited.


2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Xuehua Li ◽  
Yingjie Pei ◽  
Huan Jiang ◽  
Xinwei Yue ◽  
Yafei Wang ◽  
...  

Mobile edge computing (MEC) is becoming more and more popular because of improving computing power in virtual reality, augmented reality, unmanned driving, and other fields. This paper investigates a nonorthogonal multiple access- (NOMA-) based MEC system, which is under imperfect channel state information (ipCSI). In this system model, a pair of users offloads their tasks to the MEC server with the existence of an eavesdropper (Eve). To evaluate the impact of Eve on the performance of the NOMA-MEC system, the secrecy outage probability (SOP) expressions for two users with the conditions of imperfect CSI and perfect channel state information (pCSI) are derived. In addition, both throughput and energy efficiency are discussed in the delay-limited transmission mode. Simulation results reveal that (1) due to the influence of channel estimation errors, the secrecy outage behaviors of two users under ipCSI conditions are worse than those of users with pCSI; (2) the secrecy performance of NOMA-MEC is superior to orthogonal multiple access- (OMA-) aided MEC systems; and (3) the NOMA-MEC systems have the ability to attain better system throughput and energy efficiency compared with OMA-MEC.


Sensors ◽  
2021 ◽  
Vol 21 (17) ◽  
pp. 5692
Author(s):  
Van-Duc Phan ◽  
Tan N. Nguyen ◽  
Anh Vu Le ◽  
Miroslav Voznak

In this paper, we study the physical layer security for simultaneous wireless information and power transfer (SWIPT)-based half-duplex (HD) decode-and-forward relaying system. We consider a system model including one transmitter that tries to transmit information to one receiver under the help of multiple relay users and in the presence of one eavesdropper that attempts to overhear the confidential information. More specifically, to investigate the secrecy performance, we derive closed-form expressions of outage probability (OP) and secrecy outage probability for dynamic power splitting-based relaying (DPSBR) and static power splitting-based relaying (SPSBR) schemes. Moreover, the lower bound of secrecy outage probability is obtained when the source’s transmit power goes to infinity. The Monte Carlo simulations are given to corroborate the correctness of our mathematical analysis. It is observed from simulation results that the proposed DPSBR scheme outperforms the SPSBR-based schemes in terms of OP and SOP under the impact of different parameters on system performance.


2018 ◽  
Vol 2018 ◽  
pp. 1-15 ◽  
Author(s):  
Zhongwu Xiang ◽  
Weiwei Yang ◽  
Yueming Cai ◽  
Yunpeng Cheng ◽  
Heng Wu ◽  
...  

This paper exploits nonorthogonal multiple access (NOMA) to enhance the uplink secure transmission in Internet of Things (IoT) networks. Considering the different intercept ability of eavesdroppers (Eve), secrecy performances of both strong and weak Eve wiretap scenarios have been investigated. In strong Eve wiretap scenario (SWS), Eve is assumed to be powerful enough to decode message without interference and, in weak Eve wiretap scenario (WWS), Eve is assumed to have significant demodulation capability constraint. The new closed-form expressions of joint connection outage probability (JCOP), joint secrecy outage probability (JSOP), and sum secrecy throughput (SST) are derived in these two scenarios to indicate the impact of parameters, i.e., transmit power, codeword rate, and the placement of devices, on security performance. In order to demonstrate the superiority of NOMA, we also investigate the secrecy performance of orthogonal multiple access (OMA) system as a benchmark. Analysis results show that the performance in WWS is always better than that in SWS and, in low signal-to-noise ratio (SNR) or high codeword rate region, the performances of these two scenarios are close. In addition, we present the condition that NOMA outperforms OMA in terms of SST. Moreover, the placements of devices are significant to the SST performance of NOMA system. The suboptimal device placement scheme has been designed to maximize SST. Analysis results demonstrate that when Eve is far away from legal users, the suboptimal results tend to optimal.


2021 ◽  
Author(s):  
Saeid Pakravan ◽  
Ghosheh Abed Hodtani

Abstract In this paper, a discrete memoryless wiretap channel with non-causal side information known at the encoder is considered. We (i) characterize capacity region for the Gaussian version of this channel by considering correlation between channel input and side information available at the transmitter; (ii) analyze the impact of correlation on the performance of physical layer security in a Rayleigh fading wiretap channel by deriving closed-form expressions on the average secrecy capacity (ASC) and secrecy outage probability (SOP). Further, to more show the impact of side information, asymptotic behavior of SOP is studied. Numerical evaluation of theoretical results is done finally.


Author(s):  
Amir Darabi ◽  
Michael Leamy

This work proposes a clearance-type electromechanical nonlinear energy sink (NES) to increase the electrical energy harvested from non-stationary mechanical waves, such as those encountered during impact and intermittent events. The key idea is to trap energy in the NES such that it can be harvested over a time period longer than that afforded by the passing disturbance itself. This leads to an asymmetrical, piece-wise nonlinear device whose functionality and analysis lie at the intersection of several current research topics, including wave-based energy harvesting, non-reciprocal wave propagation, nonlinear energy sinks (NES’s), and hybrid dynamical systems. The nonlinear energy sink concept explored uses a clearance-type nonlinearity, and resulting impact, to pass the energy of the propagating wave from a primary subdomain to a secondary subdomain where a significant portion of it is subsequently trapped and harvested. Moreover, unlike traditionally-studied single-DOF NESs, both subdomains of the NES (i.e., on either side of the clearance) contain displaceable degrees of freedom, significantly increasing the complexity of analytical solution approaches as compared to systems where one side is constrained by a known (or zero) displacement. Computational and analytical techniques are employed to optimize the energy sink and explore qualitative behavior (to include bifurcations). The analysis includes insight from Poincaré sections and bifurcation diagrams, with and without harvesters. Bifurcation diagrams and trends therein provide insight into the number and state of impact events at the NES as excitation amplitude increases. However, analytic formulations are found which quantify the relationship between the impact amplitude and the energy produced, parameterized by system properties such as the harvester effective resistance, the clearance gap, and the domain mass and stiffness. Importantly, a linear relationship between the input energy amplitude and the number of NES impacts has been observed and captured by an approximate, closed-form Poincaré map. In addition to this linear relationship, a closed-form Poincaré map is derived which maps one NES impact location to the next, greatly simplifying the analysis while providing an important tool for follow-on bifurcation studies. The results may justify further exploration in which complex structures (e.g., plates and/or three-dimensional structures) incorporate one or more of the clearance-type NESs to enhance non-stationary electroacoustic wave energy harvesting.


Sensors ◽  
2020 ◽  
Vol 20 (3) ◽  
pp. 895
Author(s):  
Tan-Phuoc Huynh ◽  
Duy-Hung Ha ◽  
Cong Truong Thanh ◽  
Peppino Fazio ◽  
Miroslav Voznak

Security performance and the impact of imperfect channel state information (CSI) in underlay cooperative cognitive networks (UCCN) is investigated in this paper. In the proposed scheme, relay R uses non-orthogonal multiple access (NOMA) technology to transfer messages e 1 , e 2 from the source node S to User 1 (U1) and User 2 (U2), respectively. An eavesdropper (E) is also proposed to wiretap the messages of U1 and U2. The transmission’s security performance in the proposed system was analyzed and performed over Rayleigh fading channels. Through numerical analysis, the results showed that the proposed system’s secrecy performance became more efficient when the eavesdropper node E was farther away from the source node S and the intermediate cooperative relay R. The secrecy performance of U1 was also compared to the secrecy performance of U2. Finally, the simulation results matched the Monte Carlo simulations well.


Sign in / Sign up

Export Citation Format

Share Document