Achievable Secrecy Rates of an Energy Harvesting Device with a Finite Battery

In this paper, we investigate the achievable secrecy rates in an Energy Harvesting communication system composed of one transmitter and multiple receivers. In particular, because of the energy constraints and the channel conditions, it is important to understand when a device should transmit or not and how much power should be used. We introduce the Optimal Secrecy Policy in several scenarios. We show that, if the receivers demand high secrecy rates, then it is not always possible to satisfy all their requests. Thus, we introduce a scheme that chooses which receivers should be discarded. Also, we study how the system is influenced by the Channel State Information and, in particular, how the knowledge of the eavesdropper's channel changes the achievable rates.

[1]  Kaibin Huang,et al.  Energy Harvesting Wireless Communications: A Review of Recent Advances , 2015, IEEE Journal on Selected Areas in Communications.

[2]  Derrick Wing Kwan Ng,et al.  Robust Beamforming for Secure Communication in Systems With Wireless Information and Power Transfer , 2013, IEEE Transactions on Wireless Communications.

[3]  Gil Zussman,et al.  Networking Low-Power Energy Harvesting Devices: Measurements and Algorithms , 2011, IEEE Transactions on Mobile Computing.

[4]  Sennur Ulukus,et al.  Information-theoretic analysis of an energy harvesting communication system , 2010, 2010 IEEE 21st International Symposium on Personal, Indoor and Mobile Radio Communications Workshops.

[5]  Michele Zorzi,et al.  Transmission policies for an energy harvesting device with a data queue , 2015, 2015 International Conference on Computing, Networking and Communications (ICNC).

[6]  Mohit Sharma,et al.  Wireless sensor networks: Routing protocols and security issues , 2014, Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT).

[7]  Sennur Ulukus,et al.  Gaussian wiretap channel with a batteryless energy harvesting transmitter , 2012, 2012 IEEE Information Theory Workshop.

[8]  Meng Zhang,et al.  Energy harvesting for secure OFDMA systems , 2014, 2014 Sixth International Conference on Wireless Communications and Signal Processing (WCSP).

[9]  Dimitri P. Bertsekas,et al.  Dynamic Programming and Optimal Control, Two Volume Set , 1995 .

[10]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[11]  Matthieu R. Bloch,et al.  Physical-Layer Security: From Information Theory to Security Engineering , 2011 .

[12]  Rosli Salleh,et al.  Overview of Security Issues in Wireless Sensor Networks , 2011, 2011 Third International Conference on Computational Intelligence, Modelling & Simulation.

[13]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[14]  Sennur Ulukus,et al.  Gaussian wiretap channel with an amplitude constraint , 2012, 2012 IEEE Information Theory Workshop.

[15]  Vinod Sharma,et al.  Optimal energy management policies for energy harvesting sensor nodes , 2008, IEEE Transactions on Wireless Communications.

[16]  Guanding Yu,et al.  On the Secrecy Capacity of Fading Wireless Channel with Multiple Eavesdroppers , 2007, 2007 IEEE International Symposium on Information Theory.

[17]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.

[18]  Derrick Wing Kwan Ng,et al.  Resource allocation for secure communication in systems with wireless information and power transfer , 2013, 2013 IEEE Globecom Workshops (GC Wkshps).

[19]  Michele Zorzi,et al.  Achievable Secrecy Rates of an Energy Harvesting Device , 2016, IEEE Journal on Selected Areas in Communications.