Security-Reliability Tradeoff for Friendly Jammer Aided Multiuser Scheduling in Energy Harvesting Communications

In this paper, we investigate the physical-layer security in an energy-harvesting (EH) multiuser network with the help of a friendly jammer (J), where multiple eavesdroppers are considered to tap the information transmission from users (Us) to base station (BS). In this system, a power beacon (PB) transmits radio frequency (RF) signals to Us for charging. In order to enhance the security of wireless transmission, we propose non-energy-aware multiuser scheduling (NEAMUS) scheme and energy-aware multiuser scheduling (EAMUS) scheme. For the purpose of comparison, we introduce conventional round robin multiuser scheduling (CRRMUS) scheme. The closed-form outage probability (OP) and intercept probability (IP) expressions of NEAMUS, EAMUS, and CRRMUS schemes are derived over Rayleigh fading channels. Additionally, we analyze the security-reliability tradeoff (SRT) of NEAMUS, EAMUS, and CRRMUS schemes in terms of OP and IP. Numerical results show that the proposed EAMUS scheme is superior to the CRRMUS scheme and NEAMUS scheme in terms of SRT, demonstrating the advantage of the proposed EAMUS scheme in improving the physical-layer security and reliability. Moreover, SRT performance of NEAMUS and EAMUS schemes can also be improved by increasing the number of users.

[1]  Lav R. Varshney,et al.  Transporting information and energy simultaneously , 2008, 2008 IEEE International Symposium on Information Theory.

[2]  Derrick Wing Kwan Ng,et al.  Secure Massive MIMO Transmission With an Active Eavesdropper , 2015, IEEE Transactions on Information Theory.

[3]  Dac-Binh Ha,et al.  Secrecy Performance Analysis of Energy Harvesting Wireless Sensor Networks With a Friendly Jammer , 2017, IEEE Access.

[4]  Trung Q. Duong,et al.  Physical Layer Security in Cooperative Energy Harvesting Networks With a Friendly Jammer , 2017, IEEE Wireless Communications Letters.

[5]  Salman Durrani,et al.  Secure Communication With a Wireless-Powered Friendly Jammer , 2014, IEEE Transactions on Wireless Communications.

[6]  Xiaojun Wang,et al.  The Security–Reliability Tradeoff of Multiuser Scheduling-Aided Energy Harvesting Cognitive Radio Networks , 2019, IEEE Transactions on Communications.

[7]  Pritam Mukherjee,et al.  Secrecy in MIMO Networks With No Eavesdropper CSIT , 2017, IEEE Transactions on Communications.

[8]  Xiaoming Chen,et al.  Mode Selection in MU-MIMO Downlink Networks: A Physical-Layer Security Perspective , 2015, IEEE Systems Journal.

[9]  Jie Yang,et al.  Secrecy Outage Analysis of Transmit Antenna Selection Assisted With Wireless Power Beacon , 2020, IEEE Transactions on Vehicular Technology.

[10]  Rui Zhang,et al.  MIMO Broadcasting for Simultaneous Wireless Information and Power Transfer , 2013 .

[11]  Phee Lep Yeoh,et al.  Secure Two-Way Communication via a Wireless Powered Untrusted Relay and Friendly Jammer , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[12]  Yulong Zou,et al.  Joint Power Splitting and Relay Selection in Energy-Harvesting Communications for IoT Networks , 2019, IEEE Internet of Things Journal.

[13]  Robert Abbas,et al.  Security and reliability performance analysis for two-way wireless energy harvesting based untrusted relaying with cooperative jamming , 2019, IET Commun..

[14]  D. F. Hays,et al.  Table of Integrals, Series, and Products , 1966 .

[15]  Yik-Chung Wu,et al.  Wirelessly Powered Two-Way Communication With Nonlinear Energy Harvesting Model: Rate Regions Under Fixed and Mobile Relay , 2017, IEEE Transactions on Wireless Communications.

[16]  Hai Jiang,et al.  Optimal Relay Selection for Secure Cooperative Communications With an Adaptive Eavesdropper , 2017, IEEE Transactions on Wireless Communications.

[17]  Yuan Liu,et al.  Physical Layer Security in Heterogeneous Networks With Jammer Selection and Full-Duplex Users , 2017, IEEE Transactions on Wireless Communications.

[18]  Hong Wen,et al.  Cooperative Jamming for Physical Layer Security Enhancement in Internet of Things , 2018, IEEE Internet of Things Journal.

[19]  Caijun Zhong,et al.  Secrecy Performance of Wirelessly Powered Wiretap Channels , 2016, IEEE Transactions on Communications.

[20]  Swades De,et al.  Dilemma at RF Energy Harvesting Relay: Downlink Energy Relaying or Uplink Information Transfer? , 2017, IEEE Transactions on Wireless Communications.

[21]  Xiqi Gao,et al.  A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead , 2018, IEEE Journal on Selected Areas in Communications.

[22]  Aria Nosratinia,et al.  Cooperative communication in wireless networks , 2004, IEEE Communications Magazine.

[23]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[24]  Yulong Zou,et al.  Intelligent Interference Exploitation for Heterogeneous Cellular Networks Against Eavesdropping , 2017, IEEE Journal on Selected Areas in Communications.

[25]  Bin Li,et al.  Secrecy Outage Probability Analysis of Friendly Jammer Selection Aided Multiuser Scheduling for Wireless Networks , 2019, IEEE Transactions on Communications.

[26]  Fuhui Zhou,et al.  Secure Cooperative Communications With an Untrusted Relay: A NOMA-Inspired Jamming and Relaying Approach , 2019, IEEE Transactions on Information Forensics and Security.

[27]  Xuemin Shen,et al.  RF Energy Harvesting and Transfer in Cognitive Radio Sensor Networks: Opportunities and Challenges , 2018, IEEE Communications Magazine.

[28]  Xianbin Wang,et al.  Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.

[29]  Roberto Di Pietro,et al.  Security in Energy Harvesting Networks: A Survey of Current Solutions and Research Challenges , 2020, IEEE Communications Surveys & Tutorials.

[30]  Huiming Wang,et al.  Secure Communication in Uplink Transmissions: User Selection and Multiuser Secrecy Gain , 2016, IEEE Transactions on Communications.

[31]  Yi Hong,et al.  On the Performance of Low-Altitude UAV-Enabled Secure AF Relaying With Cooperative Jamming and SWIPT , 2019, IEEE Access.

[32]  Lu Lv,et al.  Improving Physical Layer Security of Uplink NOMA via Energy Harvesting Jammers , 2021, IEEE Transactions on Information Forensics and Security.

[33]  Khaled Ben Letaief,et al.  Outage Probability of Energy Harvesting Relay-Aided Cooperative Networks Over Rayleigh Fading Channel , 2014, IEEE Transactions on Vehicular Technology.

[34]  Trung Quang Duong,et al.  Physical Layer Security With Threshold-Based Multiuser Scheduling in Multi-Antenna Wireless Networks , 2016, IEEE Transactions on Communications.

[35]  Yulong Zou,et al.  Physical-Layer Security for Spectrum Sharing Systems , 2016, IEEE Transactions on Wireless Communications.

[36]  Jiajia Liu,et al.  2-to- $M$ Coordinated Multipoint-Based Uplink Transmission in Ultra-Dense Cellular Networks , 2018, IEEE Transactions on Wireless Communications.

[37]  Mohamed-Slim Alouini,et al.  On Secure Underlay MIMO Cognitive Radio Networks With Energy Harvesting and Transmit Antenna Selection , 2017, IEEE Transactions on Green Communications and Networking.

[38]  Wei-Ping Zhu,et al.  Security–Reliability Tradeoff Analysis of Multirelay-Aided Decode-and-Forward Cooperation Systems , 2015, IEEE Transactions on Vehicular Technology.