Secrecy Outage of SWIPT in the Presence of Cooperating Eavesdroppers

Abstract This work investigates the secrecy performance of a simultaneous wireless information and power transfer system that operates in the presence of cooperating eavesdroppers. The multi-antenna access point’s transmission is used for information-decoding by a multi-antenna node and for energy-harvesting (EH) by multiple single-antenna nodes. However, some of the nodes authorized for EH only attempt to eavesdrop on the ongoing information transmission by utilizing a generalized on–off power splitting architecture. We derive a closed-form expression for the secrecy outage probability of the considered Multiple-Input-Multiple-Output Multiple-Eavesdroppers system. Theoretical and simulation results are provided to validate the derived results.

[1]  Mirza Hamza,et al.  Outage Performance of L-Branch Maximal-Ratio Combiner for Generalized k-μ Fading , 2008, VTC Spring 2008 - IEEE Vehicular Technology Conference.

[2]  Gaofeng Pan,et al.  Secrecy outage analysis with Kth best relay selection in dual-hop inter-vehicle communication systems , 2017 .

[3]  Peng Yang,et al.  Secrecy Throughput in Inhomogeneous Wireless Networks with Nonuniform Traffic , 2014, Int. J. Distributed Sens. Networks.

[4]  Y. Wang,et al.  Feedback enhances the security of wiretap channel with states , 2015 .

[5]  Muhammad R. A. Khandaker,et al.  Masked Beamforming in the Presence of Energy-Harvesting Eavesdroppers , 2015, IEEE Transactions on Information Forensics and Security.

[6]  Jiaru Lin,et al.  Optimal Secure Multicast With Simultaneous Wireless Information and Power Transfer in Presence of Multiparty Eavesdropper Collusion , 2016, IEEE Transactions on Vehicular Technology.

[7]  Kee Chaing Chua,et al.  Secrecy wireless information and power transfer with MISO beamforming , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).

[8]  Joseph Lipka,et al.  A Table of Integrals , 2010 .

[9]  Huiming Wang,et al.  On secrecy throughput optimization of a DF relay network subjected to slow fading , 2014, 2014 IEEE Globecom Workshops (GC Wkshps).

[10]  I. S. Gradshteyn,et al.  Table of Integrals, Series, and Products , 1976 .

[11]  Xiaodong Ji,et al.  Secure random linear network coding on a wiretap network , 2015 .

[12]  Miroslav Voznak,et al.  Two-way relaying networks in green communications for 5G: Optimal throughput and tradeoff between relay distance on power splitting-based and time switching-based relaying SWIPT , 2016 .

[13]  Gaofeng Pan,et al.  Outage performance on threshold AF and DF relaying schemes in simultaneous wireless information and power transfer systems , 2017 .

[14]  Hsiao-Hwa Chen,et al.  Secrecy wireless information and power transfer: challenges and opportunities , 2015, IEEE Wireless Communications.

[15]  Meng Zhang,et al.  Energy Harvesting for Physical-Layer Security in OFDMA Networks , 2015, IEEE Transactions on Information Forensics and Security.