Power Splitting-Based SWIPT Systems With Full-Duplex Jamming

IEEE Transactions on Vehicular Technology(2020)

引用 28|浏览8
暂无评分
摘要
The simultaneous wireless information and power transfer (SWIPT) has recently attracted much attention since both information and energy are integrated within radio frequency signals, which is considered to be one of the most important technologies for future networks. However, security becomes one of the most critical issues in SWIPT networks due to its broadcasting features over wireless media and the transferring requirements for strong signal strength. To improve the security of SWIPT networks, in this paper, a SWIPT system enabled by full-duplex (FD) jamming is proposed, where an FD energy-limited receiver with the power splitting (PS) structure, powered by a transmitter, generates jamming signals. Both linear and nonlinear energy harvesting (EH) models are considered. To evaluate the secrecy throughput (ST) of the system, we derive the closed-form connection outage probability and secrecy outage probability for the proposed PS-based scheme in the delay-constrained transmission (DCT) mode. The ST is maximized by optimizing the PS ratio based on the asymptotic cases of the high signal-to-noise ratio as well as the perfect self-interference cancellation (SIC). Besides, the exact integral forms of the ergodic secrecy capacity and their closed-form lower bounds are presented for both the PS-based and the time switching (TS)-based schemes in the delay-tolerant transmission (DTT) mode. Simulation results suggest that the PS-based scheme outperforms the TS-based scheme for the DTT mode. For the DCT mode, the PS-based scheme can achieve better performance than the TS-based scheme only in low target communication rate, small PS/TS ratio, high transmit power, and weak path loss. Meanwhile, given a tolerable amount of SIC, the ST obtained in the linear EH model is higher than that achieved in the nonlinear EH model.
更多
查看译文
关键词
Jamming,Security,Receivers,Wireless communication,Communication system security,Discrete cosine transforms,Relays
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要