Exploiting Impact of Eavesdropping Attacks on Secrecy Performance in WPT-based Secure Multi-hop Transmission

In this paper, we study the impact of various eaves-dropping attacks on the secrecy performance in wireless power transfer (WPT)-based secure multi-hop transmission. Since each node has a limited power supply, each node harvests energy from the power beacon before data transmission. After then, each node fully consumes the harvested energy for data transmission. Meanwhile, according to the nature of the wireless medium, eavesdroppers can overhear the confidential message at each hop. In order to exploit the relationship between network parameters and secrecy performance, we derive the closed-form expression for secrecy outage probability (SOP) with different eavesdropping attacks, respectively. From the numerical results, we show that the Monte-Carlo simulation and analysis results are tightly matched. Additionally, we evaluate and discuss the impact of the power beacon’s transmit power, the number of eavesdroppers, and time switching ratio on the secrecy performance.

[1]  Tran Manh Hoang,et al.  Secrecy Outage Performance of FD-NOMA Relay System With Multiple Non-Colluding Eavesdroppers , 2021, IEEE Transactions on Vehicular Technology.

[2]  Daniel Benevides da Costa,et al.  Enhancing PHY-Security of FD-Enabled NOMA Systems Using Jamming and User Selection: Performance Analysis and DNN Evaluation , 2021, IEEE Internet of Things Journal.

[3]  M. O. Khyam,et al.  6G for Vehicle-to-Everything (V2X) Communications: Enabling Technologies, Challenges, and Opportunities , 2020, Proceedings of the IEEE.

[4]  B. Ai,et al.  Wireless powered IoE for 6G: Massive access meets scalable cell-free massive MIMO , 2020, China Communications.

[5]  Kyusung Shim,et al.  Exploiting Opportunistic Scheduling Schemes and WPT-Based Multi-Hop Transmissions to Improve Physical Layer Security in Wireless Sensor Networks , 2019, Sensors.

[6]  Tran Dinh Hieu,et al.  Performance Enhancement for Multihop Harvest-to-Transmit WSNs With Path-Selection Methods in Presence of Eavesdroppers and Hardware Noises , 2018, IEEE Sensors Journal.

[7]  Xiangyun Zhou,et al.  Secure Transmission in Linear Multihop Relaying Networks , 2017, IEEE Transactions on Wireless Communications.

[8]  Zhiguo Ding,et al.  Performance Analysis and Optimization for SWIPT Wireless Sensor Networks , 2017, IEEE Transactions on Communications.

[9]  Ali A. Nasir,et al.  Relaying Protocols for Wireless Energy Harvesting and Information Processing , 2012, IEEE Transactions on Wireless Communications.

[10]  Rui Zhang,et al.  Wireless Information and Power Transfer: Architecture Design and Rate-Energy Tradeoff , 2012, IEEE Transactions on Communications.

[11]  Shlomo Shamai,et al.  Wireless Physical Layer Security , 2009, Proceedings of the National Academy of Sciences.

[12]  Kyusung Shim,et al.  Exploiting Opportunistic Scheduling Schemes to Improve Physical-Layer Security in MU-MISO NOMA Systems , 2019, IEEE Access.

[13]  Beongku An,et al.  Performance Analysis of Wireless Energy Harvesting Multihop Cluster-Based Networks Over Nakagami- ${m}$ Fading Channels , 2018, IEEE Access.

[14]  Kerstin Vogler,et al.  Table Of Integrals Series And Products , 2016 .