Secure Transmission of Cooperative Zero-Forcing Jamming for Two-User SWIPT Sensor Networks.

Sensors (Basel)

College of Communications Engineering, Army Engineering University of PLA, No. 88 Houbiaoying, Qinhuai District, Nanjing 210007, China.

Published: January 2018

AI Article Synopsis

  • The study analyzes secrecy performance in two-user simultaneous wireless information and power transfer (SWIPT) sensor networks and introduces a new method combining cooperative zero-forcing (ZF) jamming.
  • The sensors use SWIPT for energy and conduct ZF jamming to protect against eavesdroppers, maintaining energy balance over time.
  • The paper derives key metrics for assessing secrecy performance and finds that secrecy outage increases with the secrecy rate and decreases with better signal-to-noise ratio and energy efficiency, while identifying an optimal secrecy rate that maximizes throughput.

Article Abstract

In this paper, the secrecy performance of the two-user simultaneous wireless information and power transfer (SWIPT) sensor networks is studied and a novel secure transmission scheme of cooperative zero-forcing (ZF) jamming is proposed. The two sensors opportunistically conduct the SWIPT and cooperative ZF jamming, respectively, where the energy required for jamming the eavesdropper is provided by the SWIPT operation so as to keep the energy balance at the sensors in the long run. By deriving the exact closed-form expressions of the secrecy outage probability and the secrecy throughout, we provide an effective approach to precisely assess the impacts of key parameters on the secrecy performance of the system. It has been shown that the secrecy outage probability is a monotonically increasing function of the growth of secrecy rate ( R s ), and a monotonically decreasing function of the increase of the transmit signal-to-noise ratio ( γ S ), and energy conversion efficiency ( η ). Furthermore, the secrecy throughput could be enhanced when η increases, which becomes especially obvious when a large γ S is provided. Moreover, the existence of an optimum R s maximizing the secrecy throughput is depicted, which also grows with the increase of γ S . Simulations are provided for the validation of the analysis.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC5856085PMC
http://dx.doi.org/10.3390/s18020331DOI Listing

Publication Analysis

Top Keywords

secure transmission
8
cooperative zero-forcing
8
zero-forcing jamming
8
swipt sensor
8
sensor networks
8
secrecy
8
secrecy performance
8
secrecy outage
8
outage probability
8
secrecy throughput
8

Similar Publications

Background: The emergence of telesurgery has received global interest, with secure network transmission identified as a crucial determinant of its success. This study aimed to evaluate the safety and viability of employing quantum cryptography communication in remote partial nephrectomy.

Methods: The surgeon operated on the patient from a distance of over 260 km using remote control of a surgical robot.

View Article and Find Full Text PDF

Pakistan has experienced a total of six COVID-19 waves throughout the pandemic, each driven by distinct SARS-CoV-2 lineages. This study explores the introduction of Omicron lineage BA.4 into Pakistan, which contributed to the sixth wave between June and September 2022.

View Article and Find Full Text PDF

Background: England aims to reach the World Health Organization (WHO) elimination target of decreasing HCV incidence among people who inject drugs (PWID) to <2 per 100 person-years (/100pyrs) by 2030. We assessed what testing and treatment strategies will achieve this target and whether they are cost-effective.

Methods: A dynamic deterministic HCV transmission model among PWID was developed for four England regions, utilising data on the scale-up of HCV treatment among PWID in prisons, drug treatment centres (DTC, where opioid agonist therapy is provided), and any other setting (e.

View Article and Find Full Text PDF

The caribou ( sspp.) is a keystone wildlife species in northern ecosystems that plays a central role in the culture, spirituality and food security of Indigenous People. The Arctic is currently experiencing an unprecedented rate of climate change, including warming temperatures and altered patterns of precipitation.

View Article and Find Full Text PDF

This study investigates the feasibility and effectiveness of integrating Attribute-Based Encryption (ABE) into smart healthcare networks, with a particular focus on its role in enhancing anti-corruption mechanisms. The study provides a comprehensive analysis of current vulnerabilities in these networks, identifying potential data security risks. An anti-corruption mechanism is designed to ensure data integrity and reliability.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!