Secrecy capacity analysis of untrusted relaying energy-harvesting systems with hardware impairments

In this paper, we study the impact of hardware impairments, which can act as one of the factors that cause degradation in the performance of communication systems, on the secrecy capacity of an untrusted relaying wireless energy-harvesting (WEH) system. In the system, the energy-constrained relay is an untrusted node which can overhear the source’s confidential signal while assisting the source-destination communication. The relay operates in the amplify-and-forward (AF) mode and uses the power-splitting (PS) protocol for harvesting energy. The destination sends an artificial noise (AN) signal during the source-relay communication. The AN signal acts as an additional energy source and an interference source at the relay. In our study, we derive an approximation of the average secrecy capacity (ASC) for the high-power-regime approximation in order to evaluate the secrecy performance of the proposed system, which is also the upper bound for the ASC. The analytical results are confirmed via Monte Carlo simulations. The numerical results provide valuable insights into the effect of the various system parameters, such as the power-splitting ratio, the relay’s location, the trade-off between the source’s power and the destination’s power, and the level of hardware impairments, on the secrecy performance.

[1]  Caijun Zhong,et al.  Wireless Information and Power Transfer in Relay Systems With Multiple Antennas and Interference , 2015, IEEE Transactions on Communications.

[2]  Liang Liu,et al.  Secrecy wireless information and power transfer in fading wiretap channel , 2014, 2014 IEEE International Conference on Communications (ICC).

[3]  Ali A. Nasir,et al.  Relaying Protocols for Wireless Energy Harvesting and Information Processing , 2012, IEEE Transactions on Wireless Communications.

[4]  Daniel Benevides da Costa,et al.  Proactive Relay Selection With Joint Impact of Hardware Impairment and Co-Channel Interference , 2015, IEEE Transactions on Communications.

[5]  George K. Karagiannidis,et al.  OFDM Opportunistic Relaying Under Joint Transmit/Receive I/Q Imbalance , 2014, IEEE Transactions on Communications.

[6]  Wan Choi,et al.  Multiuser Diversity for Secrecy Communications Using Opportunistic Jammer Selection: Secure DoF and Jammer Scaling Law , 2014, IEEE Transactions on Signal Processing.

[7]  Hsiao-Hwa Chen,et al.  Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges , 2017, IEEE Communications Surveys & Tutorials.

[8]  Adrish Banerjee,et al.  Secure Communication via a Wireless Energy Harvesting Untrusted Relay , 2015, IEEE Transactions on Vehicular Technology.

[9]  Trung Q. Duong,et al.  Physical Layer Security in Cooperative Energy Harvesting Networks With a Friendly Jammer , 2017, IEEE Wireless Communications Letters.

[10]  Emil Björnson,et al.  Impact of residual transmit RF impairments on training-based MIMO systems , 2014, 2014 IEEE International Conference on Communications (ICC).

[11]  Ali A. Nasir,et al.  Wireless-Powered Relays in Cooperative Communications: Time-Switching Relaying Protocols and Throughput Analysis , 2013, IEEE Transactions on Communications.

[12]  Antti Toskala,et al.  LTE for UMTS: Evolution to LTE-Advanced , 2011 .

[13]  Hong Wen,et al.  Cooperative Jamming for Physical Layer Security Enhancement in Internet of Things , 2018, IEEE Internet of Things Journal.

[14]  Mohamed-Slim Alouini,et al.  Efficient Cooperative Protocols for Full-Duplex Relaying Over Nakagami- $m$ Fading Channels , 2015, IEEE Transactions on Wireless Communications.

[15]  I. S. Gradshteyn,et al.  Table of Integrals, Series, and Products , 1976 .

[16]  H. Vincent Poor,et al.  Power Allocation Strategies in Energy Harvesting Wireless Cooperative Networks , 2013, IEEE Transactions on Wireless Communications.

[17]  Yongming Huang,et al.  Secure Beamforming for SWIPT in Multiuser MISO Broadcast Channel With Confidential Messages , 2015, IEEE Communications Letters.

[18]  Kee Chaing Chua,et al.  Secrecy Wireless Information and Power Transfer With MISO Beamforming , 2013, IEEE Transactions on Signal Processing.

[19]  Caijun Zhong,et al.  Ergodic Capacity Comparison of Different Relay Precoding Schemes in Dual-Hop AF Systems With Co-Channel Interference , 2014, IEEE Transactions on Communications.

[20]  Kerstin Vogler,et al.  Table Of Integrals Series And Products , 2016 .

[21]  Emil Björnson,et al.  A New Look at Dual-Hop Relaying: Performance Limits with Hardware Impairments , 2013, IEEE Transactions on Communications.