Energy-Efficient Secure Transmission for Wireless Powered Internet of Things With Multiple Power Beacons

In this paper, we investigate the energy-efficient secure uplink transmission for the wireless powered Internet of Things (IoT), where one energy-constrained source and multiple energy-constrained relays harvest energy from multiple power beacons (PBs) in the presence of a passive eavesdropper. To perform energy-efficient secure communications, we consider three relay selection schemes with the best PB selected by the source, i.e., the best relay is selected randomly, the best relay is selected by the source, and the best relay is selected by the best PB (BRBP), respectively. For each scheme, the exact closed-form expressions of power outage probability (POP), secrecy outage probability (SOP), and secure energy efficiency (SEE) are derived over the Rayleigh fading channel. Furthermore, we formulate the SEE maximization problem under the transmit power constraint to optimize the transmit power in PBs and the time-switching factor. Considering the resource limitation for IoT devices, we adopt a low-complexity Dinkelbach algorithm combined with Brent’s method to solve this multi-parameter fractional optimization problem. Simulation results demonstrate that the BRBP scheme achieves the best SOP performance and either increasing the number of PBs or decreasing the threshold of POP can significantly improve the SEE of the considered system.

[1]  George K. Karagiannidis,et al.  Exploiting Direct Links for Physical Layer Security in Multiuser Multirelay Networks , 2016, IEEE Transactions on Wireless Communications.

[2]  Chao Zhang,et al.  Distributed relay selection protocols for simultaneous wireless information and power transfer , 2014, 2014 IEEE 25th Annual International Symposium on Personal, Indoor, and Mobile Radio Communication (PIMRC).

[3]  Yong Liang Guan,et al.  Throughput Optimization for Massive MIMO Systems Powered by Wireless Energy Transfer , 2014, IEEE Journal on Selected Areas in Communications.

[4]  Eduard A. Jorswieck,et al.  Energy Efficiency in Wireless Networks via Fractional Programming Theory , 2015, Found. Trends Commun. Inf. Theory.

[5]  Gerhard P. Hancke,et al.  A Survey on 5G Networks for the Internet of Things: Communication Technologies and Challenges , 2018, IEEE Access.

[6]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[7]  Victor C. M. Leung,et al.  Improving physical-layer security in wireless communications using diversity techniques , 2014, IEEE Network.

[8]  Lifeng Wang,et al.  Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.

[9]  Minghua Xia,et al.  Ieee Transactions on Signal Processing, Accepted for Publication on the Efficiency of Far-field Wireless Power Transfer , 2022 .

[10]  MinChul Ju,et al.  Maximum Transmission Rate of PSR/TSR Protocols in Wireless Energy Harvesting DF-Based Relay Networks , 2015, IEEE Journal on Selected Areas in Communications.

[11]  He Chen,et al.  Cooperative Strategies for Wireless-Powered Communications: An Overview , 2018, IEEE Wireless Communications.

[12]  Ali A. Nasir,et al.  Relaying Protocols for Wireless Energy Harvesting and Information Processing , 2012, IEEE Transactions on Wireless Communications.

[13]  Aylin Yener,et al.  Throughput Maximization for Two-Way Relay Channels With Energy Harvesting Nodes: The Impact of Relaying Strategies , 2015, IEEE Transactions on Communications.

[14]  Bayan S. Sharif,et al.  Wireless Information and Power Transfer in Cooperative Networks With Spatially Random Relays , 2014, IEEE Transactions on Wireless Communications.

[15]  Zhu Han,et al.  Wireless Networks With RF Energy Harvesting: A Contemporary Survey , 2014, IEEE Communications Surveys & Tutorials.

[16]  Salman Durrani,et al.  Secure Communication With a Wireless-Powered Friendly Jammer , 2014, IEEE Transactions on Wireless Communications.

[17]  H. Vincent Poor,et al.  Security Enhancement of Cooperative Single Carrier Systems , 2015, IEEE Transactions on Information Forensics and Security.

[18]  Kuang-Hao Liu,et al.  Performance Improvement for RF Energy-Harvesting Relays via Relay Selection , 2017, IEEE Transactions on Vehicular Technology.

[19]  Chakchai So-In,et al.  Secrecy Outage Performance Analysis for Energy Harvesting Sensor Networks With a Jammer Using Relay Selection Strategy , 2018, IEEE Access.

[20]  He Chen,et al.  Towards secure communication via a wireless-powered full-duplex jammer , 2016, 2016 IEEE International Conference on Ubiquitous Wireless Broadband (ICUWB).

[21]  Gongpu Wang,et al.  Intercept Behavior Analysis of Industrial Wireless Sensor Networks in the Presence of Eavesdropping Attack , 2015, IEEE Transactions on Industrial Informatics.

[22]  Tho Le-Ngoc,et al.  Physical layer security in wireless cooperative relay networks: state of the art and beyond , 2015, IEEE Communications Magazine.

[23]  Zhiguo Ding,et al.  Improving Secrecy Performance of a Wirelessly Powered Network , 2017, IEEE Transactions on Communications.

[24]  Branka Vucetic,et al.  Distributed and Optimal Resource Allocation for Power Beacon-Assisted Wireless-Powered Communications , 2015, IEEE Transactions on Communications.

[25]  Hongbo Zhu,et al.  Optimal Harvest-Use-Store Strategy for Energy Harvesting Wireless Systems , 2015, IEEE Transactions on Wireless Communications.

[26]  Chao Zhai,et al.  Cooperative wireless energy harvesting and information transfer in stochastic networks , 2015, EURASIP Journal on Wireless Communications and Networking.

[27]  Dac-Binh Ha,et al.  Secrecy Performance Analysis of Energy Harvesting Wireless Sensor Networks With a Friendly Jammer , 2017, IEEE Access.

[28]  Adrish Banerjee,et al.  Secure Communication via a Wireless Energy Harvesting Untrusted Relay , 2015, IEEE Transactions on Vehicular Technology.

[29]  Richard Demo Souza,et al.  Energy Efficiency of Repetition Coding and Parallel Coding Relaying Under Partial Secrecy Regime , 2016, IEEE Access.

[30]  Jia Zhu,et al.  Physical-Layer Security for Cooperative Relay Networks , 2016, Wireless Networks.

[31]  Jammer Physical Layer Security in Cooperative Energy Harvesting Networks with a Friendly Jammer , 2017 .

[32]  Can Emre Koksal,et al.  On Secrecy Capacity Scaling in Wireless Networks , 2012, IEEE Trans. Inf. Theory.

[33]  Zhen Yang,et al.  Joint Source-Relay Selection for Improving Wireless Physical-Layer Security , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[34]  Maurizio Rebaudengo,et al.  Key Management for Static Wireless Sensor Networks With Node Adding , 2014, IEEE Transactions on Industrial Informatics.

[35]  Ahmed Wasif Reza,et al.  Energizing wireless sensor networks by energy harvesting systems: Scopes, challenges and approaches , 2014 .

[36]  Werner Dinkelbach On Nonlinear Fractional Programming , 1967 .

[37]  Caijun Zhong,et al.  Secrecy Performance of Wirelessly Powered Wiretap Channels , 2016, IEEE Transactions on Communications.

[38]  Hien Quoc Ngo,et al.  Secure 5G Wireless Communications: A Joint Relay Selection and Wireless Power Transfer Approach , 2016, IEEE Access.

[39]  Salman Durrani,et al.  Outage Probability of Ad Hoc Networks With Wireless Information and Power Transfer , 2015, IEEE Wireless Communications Letters.

[40]  Yueming Cai,et al.  Energy-Efficient Secure Transmission Design for the Internet of Things With an Untrusted Relay , 2018, IEEE Access.

[41]  Dac-Binh Ha,et al.  Secrecy performance analysis of energy harvesting wireless networks with multiple power transfer stations and destinations in the presence of multiple eavesdroppers , 2016, 2016 3rd National Foundation for Science and Technology Development Conference on Information and Computer Science (NICS).

[42]  R. Zane,et al.  Resistor Emulation Approach to Low-Power RF Energy Harvesting , 2008, IEEE Transactions on Power Electronics.

[43]  He Chen,et al.  Harvest-Then-Cooperate: Wireless-Powered Cooperative Communications , 2014, IEEE Transactions on Signal Processing.

[44]  Robert W. Brennan,et al.  A Comparison of Alternative Distributed Dynamic Cluster Formation Techniques for Industrial Wireless Sensor Networks , 2016, Sensors.

[45]  Trung Q. Duong,et al.  Secure D2D Communication in Large-Scale Cognitive Cellular Networks: A Wireless Power Transfer Model , 2016, IEEE Transactions on Communications.

[46]  Chao Zhai,et al.  Wireless Power Transfer-Based Multi-Pair Two-Way Relaying With Massive Antennas , 2017, IEEE Transactions on Wireless Communications.

[47]  He Chen,et al.  Distributed Power Splitting for SWIPT in Relay Interference Channels Using Game Theory , 2014, IEEE Transactions on Wireless Communications.

[48]  Ioannis Krikidis,et al.  Relay Selection in Wireless Powered Cooperative Networks With Energy Storage , 2015, IEEE Journal on Selected Areas in Communications.

[49]  Furqan Jameel,et al.  Secrecy Outage for Wireless Sensor Networks , 2017, IEEE Communications Letters.

[50]  Caijun Zhong,et al.  Optimum Wirelessly Powered Relaying , 2015, IEEE Signal Processing Letters.