Communications and Networking

To meet the requirements of energy saving, high security and high speed for the next generation wireless networks, this paper investigates simultaneous wireless information and power transfer (SWIPT) in full duplex systems taking the physical layer security into account. Specifically, we consider a full duplex wireless system where a full duplex base station (FD-BS) communicates with one downlink user and one uplink user simultaneously, and one idle user also scavenges the radiofrequency (RF) energy broadcasted during the communication for future use. Since the idle user has great potential to intercept the downlink information, we assume that FD-BS exploits the artificial noise (AN), which is another energy source to idle user, to prevent it. The imperfect selfinterference cancellation at the FD-BS is considered and the zero forcing (ZF) receiver is adopted to cancel the residual self-interference. Then, the optimal transmitter design at FD-BS are derived to maximize the weighted sum rate of downlink secure and uplink transmission, subject to constraints that the transmission power at FD-BS is restricted and the minimal amount of harvested energy at idle user is guaranteed. The perfect full duplex and half duplex schemes are also introduced for comparison. Extensive simulation results are given to verify the superiority of our proposed full duplex scheme.

[1]  S. Sitharama Iyengar,et al.  Pseudonym-based anonymity zone generation for mobile service with strong adversary model , 2015, 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC).

[2]  Reza Shokri,et al.  Privacy Games: Optimal User-Centric Data Obfuscation , 2014, Proc. Priv. Enhancing Technol..

[3]  Chunguang Ma,et al.  A Voronoi-Based Location Privacy-Preserving Method for Continuous Query in LBS , 2015, Int. J. Distributed Sens. Networks.

[4]  Juan Qu,et al.  An Improved Dynamic ID-Based Remote User Authentication with Key Agreement Scheme , 2013, J. Electr. Comput. Eng..

[5]  Panos Kalnis,et al.  PRIVE: anonymous location-based queries in distributed mobile systems , 2007, WWW '07.

[6]  Marat V. Burnashev,et al.  Generalized Superposition Modulation and Iterative Demodulation: A Capacity Investigation , 2010, J. Electr. Comput. Eng..

[7]  Jianliang Xu,et al.  Privacy-Conscious Location-Based Queries in Mobile Environments , 2010, IEEE Transactions on Parallel and Distributed Systems.

[8]  Tanzima Hashem,et al.  Countering overlapping rectangle privacy attack for moving kNN queries , 2013, Inf. Syst..

[9]  Yong Wang,et al.  Achieving Absolute Privacy Preservation in Continuous Query Road Network Services , 2014, ADMA.

[10]  Reza Hoshyar,et al.  Novel Low-Density Signature for Synchronous CDMA Systems Over AWGN Channel , 2008, IEEE Transactions on Signal Processing.

[11]  Sang-Kook Han,et al.  Indoor Location Estimation Based on LED Visible Light Communication Using Multiple Optical Receivers , 2013, IEEE Communications Letters.

[12]  Sabrina De Capitani di Vimercati,et al.  An Obfuscation-Based Approach for Protecting Location Privacy , 2011, IEEE Transactions on Dependable and Secure Computing.

[13]  Swaroop Ghosh,et al.  Data privacy in non-volatile cache: Challenges, attack models and solutions , 2016, 2016 21st Asia and South Pacific Design Automation Conference (ASP-DAC).