This letter studies secure communication in a wireless powered communication network with a full-duplex destination node, who applies either power splitting (PS) or time switching (TS) to coordinate energy harvesting and information decoding of received signals and transmits jamming signals to the eavesdropper using the harvested energy. The secrecy rate is maximized by optimizing PS or TS ratio and power allocation. We propose iterative algorithms with power allocation optimized by the successive convex approximation method. Simulation results demonstrate that the proposed algorithms are superior to other benchmark algorithms.
Qun LI
Nanjing University of Posts and Telecommunications
Ding XU
Nanjing University of Posts and Telecommunications
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Qun LI, Ding XU, "Secure Transmission in Wireless Powered Communication Networks with Full-Duplex Receivers" in IEICE TRANSACTIONS on Fundamentals,
vol. E102-A, no. 5, pp. 750-754, May 2019, doi: 10.1587/transfun.E102.A.750.
Abstract: This letter studies secure communication in a wireless powered communication network with a full-duplex destination node, who applies either power splitting (PS) or time switching (TS) to coordinate energy harvesting and information decoding of received signals and transmits jamming signals to the eavesdropper using the harvested energy. The secrecy rate is maximized by optimizing PS or TS ratio and power allocation. We propose iterative algorithms with power allocation optimized by the successive convex approximation method. Simulation results demonstrate that the proposed algorithms are superior to other benchmark algorithms.
URL: https://global.ieice.org/en_transactions/fundamentals/10.1587/transfun.E102.A.750/_p
Copy
@ARTICLE{e102-a_5_750,
author={Qun LI, Ding XU, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={Secure Transmission in Wireless Powered Communication Networks with Full-Duplex Receivers},
year={2019},
volume={E102-A},
number={5},
pages={750-754},
abstract={This letter studies secure communication in a wireless powered communication network with a full-duplex destination node, who applies either power splitting (PS) or time switching (TS) to coordinate energy harvesting and information decoding of received signals and transmits jamming signals to the eavesdropper using the harvested energy. The secrecy rate is maximized by optimizing PS or TS ratio and power allocation. We propose iterative algorithms with power allocation optimized by the successive convex approximation method. Simulation results demonstrate that the proposed algorithms are superior to other benchmark algorithms.},
keywords={},
doi={10.1587/transfun.E102.A.750},
ISSN={1745-1337},
month={May},}
Copy
TY - JOUR
TI - Secure Transmission in Wireless Powered Communication Networks with Full-Duplex Receivers
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 750
EP - 754
AU - Qun LI
AU - Ding XU
PY - 2019
DO - 10.1587/transfun.E102.A.750
JO - IEICE TRANSACTIONS on Fundamentals
SN - 1745-1337
VL - E102-A
IS - 5
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - May 2019
AB - This letter studies secure communication in a wireless powered communication network with a full-duplex destination node, who applies either power splitting (PS) or time switching (TS) to coordinate energy harvesting and information decoding of received signals and transmits jamming signals to the eavesdropper using the harvested energy. The secrecy rate is maximized by optimizing PS or TS ratio and power allocation. We propose iterative algorithms with power allocation optimized by the successive convex approximation method. Simulation results demonstrate that the proposed algorithms are superior to other benchmark algorithms.
ER -