Masked beamforming in the presence of energy-harvesting eavesdroppers

MRA Khandaker, KK Wong - IEEE Transactions on Information …, 2014 - ieeexplore.ieee.org
… algorithm subject to secrecy rate and energy harvesting constraints. In particular, we
considered the case where the energy harvesting eavesdroppers collude together in order to …

Robust secrecy beamforming with energy-harvesting eavesdroppers

MRA Khandaker, KK Wong - IEEE Wireless Communications …, 2014 - ieeexplore.ieee.org
… single-antenna energy receivers (ERs). We aim to maximize the harvested energy by the …
keeping the message secure from possible eavesdropping by the ERs by suppressing their …

Eavesdropping Mobile App Activity via {Radio-Frequency} Energy Harvesting

T Ni, G Lan, J Wang, Q Zhao, W Xu - 32nd USENIX Security Symposium …, 2023 - usenix.org
… Figure 4 illustrates a typical scenario of our proposed RF energy harvesting-based eavesdropping
attack. Specifically, when a victim plays an app on his/her smartphone connecting to a …

[PDF][PDF] Optimal energy harvesting time and transmit power in cognitive radio network under joint constraints of primary users and eavesdroppers

H Tran, TX Quach, H Tran… - Proc. IEEE Int. Symp. Pers …, 2017 - researchgate.net
… study energy harvesting cognitive radio networks (CRNs) in the presence of multiple
eavesdroppers (… In particular, the secondary user (SU) harvests energy from multiple primary user …

IRS-based secrecy rate analysis in presence of an energy harvesting eavesdropper

MA Saeidi, MJ Emadi - 2020 Iran Workshop on Communication …, 2020 - ieeexplore.ieee.org
… only harvest energyenergy harvesting nodes are of interests [9]. In [9], a SWIPTenable
non-orthogonal multiple access (NOMA) system in presence of energy harvesting eavesdroppers

Secrecy rate beamforming for multicell networks with information and energy harvesting

AA Nasir, HD Tuan, TQ Duong… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
… a single multi-antenna eavesdropper, who tries to decode … ) at the eavesdropper and
increase the harvested energy for … in the absence of eavesdroppers. Our simulation results show …

Secrecy performance optimization for wireless powered communication networks with an energy harvesting jammer

J Moon, H Lee, C Song, I Lee - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
… of channel state information (CSI) of the eavesdroppers. First, with a single user, …
eavesdroppers is available at all nodes. In contrast, when the instantaneous CSI of the …

Secure information transmission in the presence of energy-harvesting eavesdroppers in multi-cell networks

TA Le, HX Nguyen, QT Vien… - 2015 IEEE Global …, 2015 - ieeexplore.ieee.org
… To protect the information of all IRs from the detection of potentially eavesdropping ERs,
we introduce another set of constraints to limit the leakage SINR of any ith IR of the qth cell at …

Security in energy harvesting networks: A survey of current solutions and research challenges

P Tedeschi, S Sciancalepore… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
… The contribution by the authors in [172] is particularly interesting from the security perspective,
given that they considered not only information eavesdropping but also unauthorized EH …

Optimal beamforming for IRS-assisted SWIPT system with an energy-harvesting eavesdropper

Z Deng, Y Pan - Electronics, 2021 - mdpi.com
… an external energy-harvesting eavesdropper, which simultaneously harvests energy from the
… the minimum required harvested energy at the energy-harvesting eavesdropper. The SDR-…