Harvest-and-Opportunistically-Relay: Analyses on Transmission Outage and Covertness

To enhance transmission performance, privacy level, and energy manipulating efficiency of wireless networks, this article initiates a novel simultaneous wireless information and power transfer (SWIPT) full-duplex (FD) relaying protocol, named harvest-and-opportunistically-relay (HOR). Due to the FD characteristics, the dynamic fluctuation of relay’s residual energy is difficult to quantify and track. To solve this problem, the Markov Chain (MC) theory is invoked. Furthermore, to improve the privacy level of the proposed HOR relaying system, covert transmission performance analysis is performed, where closed-form expressions of the optimal detection threshold and minimum detection error probability are derived. Last but not least, with the aid of stationary distribution of the MC, closed-form expression of transmission outage probability is calculated, based on which transmission outage performance is analyzed. Numerical results have validated the correctness of analyses on transmission outage and covertness. The impacts of key system parameters on the performance of transmission outage and covertness are given and discussed. Based on mathematical analysis and numerical results, we showcase that the proposed HOR model can not only reliably enhance the transmission performance via smartly managing residual energy but also efficiently improve the privacy level of the legitimate transmission party via dynamically adjusting the optimal detection threshold.

[1]  Xing Tan,et al.  Secrecy Performance Analysis of Artificial Noise Aided Precoding in Full-Duplex Relay Systems , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[2]  Jun Li,et al.  Joint Optimization of a UAV's Trajectory and Transmit Power for Covert Communications , 2018, IEEE Transactions on Signal Processing.

[3]  Rahim Tafazolli,et al.  Resource Allocation for Secure Wireless Powered Integrated Multicast and Unicast Services With Full Duplex Self-Energy Recycling , 2019, IEEE Transactions on Wireless Communications.

[4]  He Chen,et al.  Towards secure communication via a wireless-powered full-duplex jammer , 2016, 2016 IEEE International Conference on Ubiquitous Wireless Broadband (ICUWB).

[5]  Lisheng Fan,et al.  Antenna Mode Switching for Full-Duplex Destination-Based Jamming Secure Transmission , 2018, IEEE Access.

[6]  Chao Zhai,et al.  Towards secure communication via a wireless-powered full-duplex jammer , 2016 .

[7]  Qiang Wang,et al.  Outage Probability of Full-Duplex AF Relaying With Processing Delay and Residual Self-Interference , 2015, IEEE Communications Letters.

[8]  Momin Uppal,et al.  Full-Duplex Compress-and-Forward Relaying Under Residual Self-Interference , 2018, IEEE Transactions on Vehicular Technology.

[9]  Derrick Wing Kwan Ng,et al.  Multi-Antenna Covert Communications in Random Wireless Networks , 2019, IEEE Transactions on Wireless Communications.

[10]  Jun Li,et al.  Covert Communication Achieved by a Greedy Relay in Wireless Networks , 2017, IEEE Transactions on Wireless Communications.

[11]  Nikola Zlatanov,et al.  Buffer-Aided Relaying For The Two-Hop Full-Duplex Relay Channel With Self-Interference , 2016, IEEE Transactions on Wireless Communications.

[12]  Lav R. Varshney,et al.  Transporting information and energy simultaneously , 2008, 2008 IEEE International Symposium on Information Theory.

[13]  Moshe Shaked,et al.  Stochastic orders and their applications , 1994 .

[14]  Xiangyun Zhou,et al.  Gaussian Signalling for Covert Communications , 2018, IEEE Transactions on Wireless Communications.

[15]  Yuan Liu,et al.  A Dynamic SWIPT Approach for Cooperative Cognitive Radio Networks , 2017, IEEE Transactions on Vehicular Technology.

[16]  Feng Shu,et al.  Covert Transmission With a Self-Sustained Relay , 2018, IEEE Transactions on Wireless Communications.

[17]  Xiang Cheng,et al.  Relay Selection in Full-Duplex Energy-Harvesting Two-Way Relay Networks , 2017, IEEE Transactions on Green Communications and Networking.

[18]  Cheng Li,et al.  Outage Analysis of the Full-Duplex Decode-and-Forward Two-Way Relay System , 2017, IEEE Transactions on Vehicular Technology.

[19]  He Chen,et al.  Incremental Accumulate-then-Forward Relaying in Wireless Energy Harvesting Cooperative Networks , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[20]  Stéphane Y. Le Goff,et al.  Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Cooperative Jammer , 2015, IEEE Transactions on Vehicular Technology.

[21]  Ying-Chang Liang,et al.  Spectral Efficiency and Relay Energy Efficiency of Full-Duplex Relay Channel , 2017, IEEE Transactions on Wireless Communications.

[22]  Khurram Shahzad Relaying via Cooperative Jamming in Covert Wireless Communications , 2018, 2018 12th International Conference on Signal Processing and Communication Systems (ICSPCS).

[23]  Hai Jiang,et al.  Performance Analysis of Wireless Powered Incremental Relaying Networks With an Adaptive Harvest-Store-Use Strategy , 2018, IEEE Access.

[24]  Saikat Guha,et al.  Covert Communication in the Presence of an Uninformed Jammer , 2016, IEEE Transactions on Wireless Communications.

[25]  Yunfei Chen,et al.  On Secrecy Performance of MISO SWIPT Systems With TAS and Imperfect CSI , 2016, IEEE Transactions on Communications.

[26]  Alister G. Burr,et al.  Robust Beamforming for AN Aided MISO SWIPT System with Unknown Eavesdroppers and Non-Linear EH Model , 2018, 2018 IEEE Globecom Workshops (GC Wkshps).

[27]  Ahmed M. Eltawil,et al.  All-Digital Self-Interference Cancellation Technique for Full-Duplex Systems , 2014, IEEE Transactions on Wireless Communications.

[28]  Xing Tan,et al.  A full-duplex SWIPT relaying protocol based on discrete energy state , 2017, 2017 20th International Symposium on Wireless Personal Multimedia Communications (WPMC).

[29]  Chao Zhai,et al.  Multipair Two-Way Full-Duplex Relaying With Massive Array and Power Allocation , 2017, IEEE Transactions on Vehicular Technology.

[30]  Rui Zhang,et al.  Full-Duplex Wireless-Powered Relay With Self-Energy Recycling , 2014, IEEE Wireless Communications Letters.

[31]  Ali Kashif Bashir,et al.  Performance Analysis of Decentralized V2X System with FD-NOMA , 2019, 2019 IEEE 90th Vehicular Technology Conference (VTC2019-Fall).

[32]  Victor C. M. Leung,et al.  Incomplete CSI Based Resource Optimization in SWIPT Enabled Heterogeneous Networks: A Non-Cooperative Game Theoretic Approach , 2018, IEEE Transactions on Wireless Communications.

[33]  Rui Wang,et al.  Joint Source and Relay Beamforming Design for Full-Duplex MIMO AF Relay SWIPT Systems , 2016, IEEE Communications Letters.

[34]  John S. Thompson,et al.  Buffer-Aided Relay Selection for Cooperative Diversity Systems without Delay Constraints , 2012, IEEE Transactions on Wireless Communications.

[35]  Boulat A. Bash,et al.  Limits of Reliable Communication with Low Probability of Detection on AWGN Channels , 2012, IEEE Journal on Selected Areas in Communications.

[36]  Yu-Cheng He,et al.  Secrecy Performance Analysis of Cognitive Decode-and-Forward Relay Networks in Nakagami- $m$ Fading Channels , 2017, IEEE Transactions on Communications.

[37]  H. Vincent Poor,et al.  Power Splitting-Based SWIPT With Decode-and-Forward Full-Duplex Relaying , 2016, IEEE Transactions on Wireless Communications.

[38]  Donald F. Towsley,et al.  Covert Communications When the Warden Does Not Know the Background Noise Power , 2016, IEEE Communications Letters.

[39]  Ioannis Krikidis,et al.  Simultaneous Information and Energy Transfer in Large-Scale Networks with/without Relaying , 2013, IEEE Transactions on Communications.

[40]  Inkyu Lee,et al.  Energy Efficient Precoding Design for SWIPT in MIMO Two-Way Relay Networks , 2017, IEEE Transactions on Vehicular Technology.

[41]  Rui Zhang,et al.  MIMO Broadcasting for Simultaneous Wireless Information and Power Transfer , 2011, IEEE Transactions on Wireless Communications.

[42]  Jun Li,et al.  Achieving Covert Wireless Communications Using a Full-Duplex Receiver , 2018, IEEE Transactions on Wireless Communications.

[43]  Hsiao-Hwa Chen,et al.  A Survey on Multiple-Antenna Techniques for Physical Layer Security , 2017, IEEE Communications Surveys & Tutorials.