Do you want to publish a course? Click here

Energy-Efficient Wireless Powered Secure Transmission with Cooperative Jamming for Public Transportation

67   0   0.0 ( 0 )
 Added by Feifei Bao
 Publication date 2018
and research's language is English




Ask ChatGPT about the research

In this paper, wireless power transfer and cooperative jamming (CJ) are combined to enhance physical security in public transportation networks. First, a new secure system model with both fixed and mobile jammers is proposed to guarantee secrecy in the worst-case scenario. All jammers are endowed with energy harvesting (EH) capability. Following this, two CJ based schemes, namely B-CJ-SRM and B-CJ-TPM, are proposed, where SRM and TPM are short for secrecy rate maximization and transmit power minimization, respectively. They respectively maximize the secrecy rate (SR) with transmit power constraint and minimize the transmit power of the BS with SR constraint, by optimizing beamforming vector and artificial noise covariance matrix. To further reduce the complexity of our proposed optimal schemes, their low-complexity (LC



rate research

Read More

87 - Jiangbo Si , Zihao Cheng , Zan Li 2020
Secrecy transmission is investigated for a cooperative jamming scheme, where a multi-antenna jam-mer generates artificial noise (AN) to confuse eavesdroppers. Two kinds of eavesdroppers are considered: passive eavesdroppers who only overhear the legitimate information, and active eavesdroppers who not only overhear the legitimate information but also jam the legitimate signal. Existing works only treat the passive and active eavesdroppers separately. Different from the existing works, we investigate the achievable secrecy rate in presence of both active and passive eavesdroppers. For the considered system model, we assume that the instantaneous channel state information (CSI) of the active eavesdroppers is available at the jammer, while only partial CSI of the passive eavesdroppers is available at the jammer. A new zero-forcing beamforming scheme is proposed in the presence of both active and passive eavesdroppers. For both the perfect and imperfect CSI cases, the total transmission power allocation between the information and AN signals is optimized to maximize the achievable secrecy rate. Numerical results show that imperfect CSI between the jammer and the legitimate receiver will do more harm to the achievable secrecy rate than imperfect CSI between the jammer and the active eavesdropper.
In wireless sensor networks (WSNs), the Eschenauer-Gligor (EG) key pre-distribution scheme is a widely recognized way to secure communications. Although connectivity properties of secure WSNs with the EG scheme have been extensively investigated, few results address physical transmission constraints. These constraints reflect real-world implementations of WSNs in which two sensors have to be within a certain distance from each other to communicate. In this paper, we present zero-one laws for connectivity in WSNs employing the EG scheme under transmission constraints. These laws help specify the critical transmission ranges for connectivity. Our analytical findings are confirmed via numerical experiments. In addition to secure WSNs, our theoretical results are also applied to frequency hopping in wireless networks.
The rapid growth of the so-called Internet of Things is expected to significantly expand and support the deployment of resource-limited devices. Therefore, intelligent scheduling protocols and technologies such as wireless power transfer, are important for the efficient implementation of these massive low-powered networks. This paper studies the performance of a wireless powered communication network, where multiple batteryless devices harvest radio-frequency from a dedicated transmitter in order to communicate with a common information receiver (IR). We investigate several novel selection schemes, corresponding to different channel state information requirements and implementation complexities. In particular, each scheme schedules the $k$-th best device based on: a) the end-to-end (e2e) signal-to-noise ratio (SNR), b) the energy harvested at the devices, c) the uplink transmission to the IR, and d) the conventional/legacy max-min selection policy. We consider a non-linear energy harvesting (EH) model and derive analytical expressions for the outage probability of each selection scheme by using tools from high order statistics. %Our results show that, the performance of all the proposed schemes converges to an error floor due to the saturation effects of the considered EH model. Moreover, an asymptotic scenario in terms of the number of devices is considered and, by applying extreme value theory, the systems performance is evaluated. We derive a complete analytical framework that provides useful insights for the design and realization of such networks.
In federated learning (FL), reducing the communication overhead is one of the most critical challenges since the parameter server and the mobile devices share the training parameters over wireless links. With such consideration, we adopt the idea of SignSGD in which only the signs of the gradients are exchanged. Moreover, most of the existing works assume Channel State Information (CSI) available at both the mobile devices and the parameter server, and thus the mobile devices can adopt fixed transmission rates dictated by the channel capacity. In this work, only the parameter server side CSI is assumed, and channel capacity with outage is considered. In this case, an essential problem for the mobile devices is to select appropriate local processing and communication parameters (including the transmission rates) to achieve a desired balance between the overall learning performance and their energy consumption. Two optimization problems are formulated and solved, which optimize the learning performance given the energy consumption requirement, and vice versa. Furthermore, considering that the data may be distributed across the mobile devices in a highly uneven fashion in FL, a stochastic sign-based algorithm is proposed. Extensive simulations are performed to demonstrate the effectiveness of the proposed methods.
Energy-efficient design and secure communications are of crucial importance in wireless communication networks. However, the energy efficiency achieved by using physical layer security can be limited by the channel conditions. In order to tackle this problem, an intelligent reflecting surface (IRS) assisted multiple input single output (MISO) network with independent cooperative jamming is studied. The energy efficiency is maximized by jointly designing the transmit and jamming beamforming and IRS phase-shift matrix under both the perfect channel state information (CSI) and the imperfect CSI. In order to tackle the challenging non-convex fractional problems, an algorithm based on semidefinite programming (SDP) relaxation is proposed for solving energy efficiency maximization problem under the perfect CSI case while an alternate optimization algorithm based on $mathcal{S}$-procedure is used for solving the problem under the imperfect CSI case. Simulation results demonstrate that the proposed design outperforms the benchmark schemes in term of energy efficiency. Moreover, the tradeoff between energy efficiency and the secrecy rate is found in the IRS-assisted MISO network. Furthermore, it is shown that IRS can help improve energy efficiency even with the uncertainty of the CSI.
comments
Fetching comments Fetching comments
Sign in to be able to follow your search criteria
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا