Security–reliability tradeoff analysis of untrusted energy harvesting relay networks

We investigate secure communications in untrusted energy harvesting relay networks, where the amplify-and-forward relay is an energy constrained node powered by the received radio frequency signals, and try to unauthorizedly decode the confidential information from the source. The secrecy outage probability and connection outage probability are respectively derived in closed-form to evaluate the security and reliability for three energy harvesting strategies, for example, time switching relaying strategy, power splitting relaying strategy, and ideal relaying receiver strategy. Subsequently, the effective secrecy throughput is conducted to characterize the overall efficiency, and the asymptotic analysis of the secrecy throughput is given to determine the optimal energy harvesting strategies in different operating regimes. Furthermore, in order to achieve the optimal effective secrecy throughput performance, a switching threshold between time switching relaying and power splitting relaying is designed. Numerical results verify the accuracy of the analytical expressions and reveal that the effective secrecy throughput of the system can be effectively promoted by the threshold switching energy harvesting strategy.

[1]  Li Sun,et al.  Securing Two-Way Cooperative Systems With an Untrusted Relay: A Constellation-Rotation Aided Approach , 2015, IEEE Communications Letters.

[2]  Caijun Zhong,et al.  Wireless Information and Power Transfer With Full Duplex Relaying , 2014, IEEE Transactions on Communications.

[3]  Li Sun,et al.  Security-Aware Relaying Scheme for Cooperative Networks With Untrusted Relay Nodes , 2015, IEEE Communications Letters.

[4]  H. Vincent Poor,et al.  Power Allocation Strategies in Energy Harvesting Wireless Cooperative Networks , 2013, IEEE Transactions on Wireless Communications.

[5]  Lav R. Varshney,et al.  Transporting information and energy simultaneously , 2008, 2008 IEEE International Symposium on Information Theory.

[6]  Meixia Tao,et al.  Secure Beamforming for MIMO Two-Way Communications With an Untrusted Relay , 2013, IEEE Transactions on Signal Processing.

[7]  Xiangfeng Wang,et al.  Joint Power Splitting and Secure Beamforming Design in the Multiple Non-Regenerative Wireless-Powered Relay Networks , 2015, IEEE Communications Letters.

[8]  Ali A. Nasir,et al.  Relaying Protocols for Wireless Energy Harvesting and Information Processing , 2012, IEEE Transactions on Wireless Communications.

[9]  Lajos Hanzo,et al.  Joint Relay and Jammer Selection Improves the Physical Layer Security in the Face of CSI Feedback Delays , 2015, IEEE Transactions on Vehicular Technology.

[10]  Jian Zhou,et al.  Cognitive Relay Networks With Energy Harvesting and Information Transfer: Design, Analysis, and Optimization , 2016, IEEE Transactions on Wireless Communications.

[11]  K. J. Ray Liu,et al.  Advances in Energy Harvesting Communications: Past, Present, and Future Challenges , 2016, IEEE Communications Surveys & Tutorials.

[12]  Yong Li,et al.  Joint Power Splitting and Antenna Selection in Energy Harvesting Relay Channels , 2015, IEEE Signal Processing Letters.

[13]  A. Lee Swindlehurst,et al.  Secure Communication Via an Untrusted Non-Regenerative Relay in Fading Channels , 2013, IEEE Transactions on Signal Processing.

[14]  Adrish Banerjee,et al.  Secure Communication via a Wireless Energy Harvesting Untrusted Relay , 2015, IEEE Transactions on Vehicular Technology.

[15]  Il-Min Kim,et al.  Joint Secure Beamforming Design at the Source and the Relay for an Amplify-and-Forward MIMO Untrusted Relay System , 2012, IEEE Transactions on Signal Processing.

[16]  Aylin Yener,et al.  Cooperation With an Untrusted Relay: A Secrecy Perspective , 2009, IEEE Transactions on Information Theory.

[17]  Pingzhi Fan,et al.  Outage Performance of Cognitive Relay Networks With Wireless Information and Power Transfer , 2016, IEEE Transactions on Vehicular Technology.

[18]  Kaibin Huang,et al.  Energy Harvesting Wireless Communications: A Review of Recent Advances , 2015, IEEE Journal on Selected Areas in Communications.

[19]  Caijun Zhong,et al.  Application of smart antenna technologies in simultaneous wireless information and power transfer , 2014, IEEE Communications Magazine.

[20]  Anant Sahai,et al.  Shannon meets Tesla: Wireless information and power transfer , 2010, 2010 IEEE International Symposium on Information Theory.