Impact of Outdated CSI on the Secrecy Performance of Wireless-Powered Untrusted Relay Networks
Autor: | Kisong Lee, Jin-Taek Lim, Hyun-Ho Choi |
---|---|
Rok vydání: | 2020 |
Předmět: |
021110 strategic
defence & security studies Computer Networks and Communications business.industry Computer science ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS 0211 other engineering and technologies Jamming Data_CODINGANDINFORMATIONTHEORY 02 engineering and technology law.invention Signal-to-noise ratio Channel state information Relay law Secrecy Computer Science::Networking and Internet Architecture Wireless Safety Risk Reliability and Quality business Energy (signal processing) Computer Science::Cryptography and Security Computer Science::Information Theory Power control Computer network |
Zdroj: | IEEE Transactions on Information Forensics and Security. 15:1423-1433 |
ISSN: | 1556-6021 1556-6013 |
DOI: | 10.1109/tifs.2019.2940906 |
Popis: | We investigate the effect of outdated channel state information (CSI) on the secrecy performance of wireless-powered untrusted relay networks, in which the relay is a potential eavesdropper. To keep the information secret from this untrusted relay, the destination sends a jamming signal to the relay when the source transmits an information signal. At the same time, the relay harvests energy from the radio-frequency power, and forwards the received signals to the destination using this harvested energy. To determine the proportions of energy harvesting and information processing, the relay makes use of relaying based on power splitting or time switching policy. Although the destination tries to remove the jamming signal from the relaying signal, it cannot cancel out the jamming signal perfectly due to imperfect channel reciprocity caused by the outdated CSI; this residual jamming signal therefore has a negative impact on secrecy performance. In this scenario, we derive the closed-form expressions for the outage probability and average secrecy rate, and find the jamming power ratio, power splitting ratio, and time switching ratio to optimize these secrecy performance metrics. The numerical results demonstrate the accuracy of our analysis, and show that the proposed secure relaying protocols achieve a near-optimal secrecy performance, as well as outperforming the conventional scheme without the jamming power control. |
Databáze: | OpenAIRE |
Externí odkaz: |