Cited 20 time in
Secrecy Outage Minimization for Wireless-Powered Relay Networks With Destination-Assisted Cooperative Jamming
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Lee, Kisong | - |
| dc.contributor.author | Bang, Junseong | - |
| dc.contributor.author | Choi, Hyun-Ho | - |
| dc.date.accessioned | 2023-04-27T18:40:50Z | - |
| dc.date.available | 2023-04-27T18:40:50Z | - |
| dc.date.issued | 2021-02-01 | - |
| dc.identifier.issn | 2327-4662 | - |
| dc.identifier.uri | https://scholarworks.dongguk.edu/handle/sw.dongguk/5340 | - |
| dc.description.abstract | To solve security vulnerability and energy scarcity problems in relay, we propose two secure relaying protocols, power splitting-based relaying (PSR) and time switching-based relaying (TSR), in a wireless-powered relay network with destination-assisted cooperative jamming. In these protocols, the relay adaptively controls the amount of energy harvested from the received signals using PS or TS policy, considering information leakage to the eavesdropper. We first prove the convexity of the secrecy outage probability with respect to the PS ratio (rho) and TS ratio (alpha), and then derive the closed-form expressions of the optimal rho and alpha for minimizing secrecy outage under the signalto-noise ratio (SNR) assumption. Numerical results reveal that the proposed PSR and TSR protocols using the derived rho and alpha can achieve near-optimal performance in terms of secrecy outage. It is observed that the optimal rho and alpha do not depend on the eavesdropping channels in a high SNR regime such that the near-optimal secrecy outage can be achieved practically without knowledge of the eavesdropper location. Furthermore, intensive simulations reveal that it is advantageous to allocate more power to energy harvesting for PSR, whereas more time to signal processing for TSR to minimize secrecy outage. | - |
| dc.format.extent | 10 | - |
| dc.language | 영어 | - |
| dc.language.iso | ENG | - |
| dc.publisher | IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC | - |
| dc.title | Secrecy Outage Minimization for Wireless-Powered Relay Networks With Destination-Assisted Cooperative Jamming | - |
| dc.type | Article | - |
| dc.publisher.location | 미국 | - |
| dc.identifier.doi | 10.1109/JIOT.2020.3013573 | - |
| dc.identifier.scopusid | 2-s2.0-85100270257 | - |
| dc.identifier.wosid | 000612146000017 | - |
| dc.identifier.bibliographicCitation | IEEE INTERNET OF THINGS JOURNAL, v.8, no.3, pp 1467 - 1476 | - |
| dc.citation.title | IEEE INTERNET OF THINGS JOURNAL | - |
| dc.citation.volume | 8 | - |
| dc.citation.number | 3 | - |
| dc.citation.startPage | 1467 | - |
| dc.citation.endPage | 1476 | - |
| dc.type.docType | Article | - |
| dc.description.isOpenAccess | N | - |
| dc.description.journalRegisteredClass | scie | - |
| dc.description.journalRegisteredClass | scopus | - |
| dc.relation.journalResearchArea | Computer Science | - |
| dc.relation.journalResearchArea | Engineering | - |
| dc.relation.journalResearchArea | Telecommunications | - |
| dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
| dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
| dc.relation.journalWebOfScienceCategory | Telecommunications | - |
| dc.subject.keywordPlus | PHYSICAL LAYER SECURITY | - |
| dc.subject.keywordPlus | INFORMATION | - |
| dc.subject.keywordPlus | PROTOCOLS | - |
| dc.subject.keywordPlus | INTERNET | - |
| dc.subject.keywordAuthor | Jamming | - |
| dc.subject.keywordAuthor | Protocols | - |
| dc.subject.keywordAuthor | Signal to noise ratio | - |
| dc.subject.keywordAuthor | Relay networks (telecommunications) | - |
| dc.subject.keywordAuthor | Internet of Things | - |
| dc.subject.keywordAuthor | Eavesdropping | - |
| dc.subject.keywordAuthor | Cooperative jamming | - |
| dc.subject.keywordAuthor | energy harvesting (EH) | - |
| dc.subject.keywordAuthor | physical-layer security | - |
| dc.subject.keywordAuthor | secrecy outage probability | - |
| dc.subject.keywordAuthor | secure relaying protocol | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
30, Pildong-ro 1-gil, Jung-gu, Seoul, 04620, Republic of Korea+82-2-2260-3114
Copyright(c) 2023 DONGGUK UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.
