4.7 Article

Charge-Then-Cooperate: Secure Resource Allocation for Wireless-Powered Relay Networks With Wireless Energy Transfer

期刊

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
卷 70, 期 5, 页码 5088-5093

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TVT.2021.3069752

关键词

Jamming; Wireless communication; Resource management; Eavesdropping; Wireless sensor networks; Communication system security; Sensors; Cooperative jamming; non-convex optimization; resource allocation; wireless-powered relay networks

资金

  1. National Natural Science Foundation of China [61775033, 61771120, 62025105]

向作者/读者索取更多资源

This study focuses on resource allocation for a wireless-powered relay network to support secure communications. A novel transmission protocol called charge-then-cooperate is proposed, aiming to maximize the secrecy rate of the system through joint optimization of power allocation and time assignment. Simulation results show that the proposed scheme can guarantee a satisfactory secrecy rate.
This correspondence studies resource allocation for a wireless-powered relay network, where a hybrid relay with constant energy supply assists an energy-constrained source to send confidential information to a destination in the presence of an eavesdropper. We propose a novel transmission protocol termed charge-then-cooperate to support secure communications in this network. Specifically, the hybrid relay charges the source in the energy transfer phase; then it forwards the confidential information from the source to the destination and concurrently injects jamming signals to combat eavesdropping. We aim to maximize the secrecy rate of the system via a joint optimization of power allocation and time assignment. To solve the formulated highly non-convex problem, we develop an efficient two-layer optimization algorithm that involves the one-dimensional search, the alternating optimization method, the successive convex approximation technique, and the Lagrange duality method. Simulation results demonstrate that the proposed scheme can guarantee a satisfactory secrecy rate.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据