File Download

There are no files associated with this item.

  • Find it @ UNIST can give you direct access to the published full text of this article. (UNISTARs only)
Related Researcher

이훈

Lee, Hoon
Read More

Views & Downloads

Detailed Information

Cited time in webofscience Cited time in scopus
Metadata Downloads

Full metadata record

DC Field Value Language
dc.citation.endPage 774 -
dc.citation.number 2 -
dc.citation.startPage 764 -
dc.citation.title IEEE TRANSACTIONS ON COMMUNICATIONS -
dc.citation.volume 65 -
dc.contributor.author Moon, Jihwan -
dc.contributor.author Lee, Hoon -
dc.contributor.author Song, Changick -
dc.contributor.author Lee, Inkyu -
dc.date.accessioned 2023-12-21T22:38:59Z -
dc.date.available 2023-12-21T22:38:59Z -
dc.date.created 2023-09-08 -
dc.date.issued 2017-02 -
dc.description.abstract In this paper, we consider a wireless powered communication network with an energy harvesting (EH) jammer where eavesdroppers try to wiretap the communication between users and a hybrid access-point (H-AP). In our system, the H-AP first transmits an energy signal to recharge the batteries of the EH users and the EH jammer in the energy transfer (ET) phase. Then, in the subsequent information transfer (IT) phase, each user sends information to the H-AP in a time division multiple access manner, while the jammer generates jamming signals to interfere the eavesdroppers. We adopt two different secrecy performance measurements according to the level of channel state information (CSI) of the eavesdroppers. First, with a single user, we maximize the secrecy rate by optimizing the time allocation between the ET and the IT phase when perfect CSI of the eavesdroppers is available at all nodes. In contrast, when the instantaneous CSI of the eavesdroppers is not available at legitimate nodes, we analyze and minimize the secrecy outage probability. We also extend the single user analysis to a more general multi-user situation with an additional consideration of the transmit power allocation at the jammer. Finally, we evaluate the performance of our proposed solutions through simulations and demonstrate that a performance gain compared to conventional schemes becomes more pronounced with the increased number of eavesdroppers and users. -
dc.identifier.bibliographicCitation IEEE TRANSACTIONS ON COMMUNICATIONS, v.65, no.2, pp.764 - 774 -
dc.identifier.doi 10.1109/TCOMM.2016.2623627 -
dc.identifier.issn 0090-6778 -
dc.identifier.scopusid 2-s2.0-85013459746 -
dc.identifier.uri https://scholarworks.unist.ac.kr/handle/201301/65732 -
dc.identifier.url https://ieeexplore.ieee.org/document/7727933 -
dc.identifier.wosid 000395825300023 -
dc.language 영어 -
dc.publisher IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC -
dc.title Secrecy Performance Optimization for Wireless Powered Communication Networks With an Energy Harvesting Jammer -
dc.type Article -
dc.description.isOpenAccess FALSE -
dc.relation.journalWebOfScienceCategory Engineering, Electrical & Electronic; Telecommunications -
dc.relation.journalResearchArea Engineering; Telecommunications -
dc.type.docType Article -
dc.description.journalRegisteredClass scie -
dc.description.journalRegisteredClass scopus -
dc.subject.keywordAuthor Physical-layer security -
dc.subject.keywordAuthor coopeartive jammer -
dc.subject.keywordAuthor artificial noise (AN) -
dc.subject.keywordAuthor energy harvesting (EH) -
dc.subject.keywordAuthor wireless powered communication networks (WPCN) -
dc.subject.keywordPlus PHYSICAL LAYER SECURITY -
dc.subject.keywordPlus INFORMATION -
dc.subject.keywordPlus NOISE -

qrcode

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.