Energy-efficient secure transmission for wireless powered internet of things with multiple power beacons

Y Wang, W Yang, X Shang, J Hu, Y Huang… - IEEE Access, 2018 - ieeexplore.ieee.org
… investigate the energy-efficient secure uplink transmission for the wireless powered … power
beacons (PBs) in the presence of a passive eavesdropper. To perform energy-efficient secure

Power beacon assisted wiretap channels with jamming

X Jiang, C Zhong, Z Zhang… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
… for secure communication. Depending on the available channel state information (CSI) at the
power beacon, … the transmit power is constant, the introduction of power beacon effectively …

Secure 5G wireless communications: A joint relay selection and wireless power transfer approach

NP Nguyen, TQ Duong, HQ Ngo, Z Hadzi-Velkov… - IEEE …, 2016 - ieeexplore.ieee.org
… We consider a network consisting of a power beacon B, an … The power beacon B is equipped
with N antennas while S, Rk… in a transmission block time affects the security performance, …

Secure Communication with Two-Stage Beamforming for Wireless Energy and Jamming Signal Based on Power Beacon

D Guo, J Song, X Wang, X Wang, Y Wang - Proceedings of the 9th …, 2020 - Springer
… a power beacon-assisted wireless powered communication network for securing a legitimate
transmission … the energy from the multiple-antenna power beacon. In the second stage, the …

Power beacon-assisted millimeter wave ad hoc networks

X Zhou, J Guo, S Durrani… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
power transfer (PT) and information transmission (IT). In [9], the authors studied the PB-assisted
network in the context of physical layer security, … to discretize the transmit power of each …

Secrecy outage performance of multi-hop leach networks using power beacon aided cooperative jamming with jammer selection methods

HD Hung, TT Duy, M Voznak - AEU-International Journal of Electronics and …, 2020 - Elsevier
… For performance comparison, we also consider the conventional secure transmission method
in which the CJ technique is not used at each hop. Because the EH phase does not need …

Secure D2D communication in large-scale cognitive cellular networks: A wireless power transfer model

Y Liu, L Wang, SAR Zaidi, M Elkashlan… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
… a power transfer model and an information signal model to enable wireless energy harvesting
and secure information transmission… : 1) cooperative power beacons (CPB) power transfer, …

A dynamic light-weight symmetric encryption algorithm for secure data transmission via BLE beacons

S Banani, S Thiemjarus, K Wongthavarawat… - Journal of Sensor and …, 2021 - mdpi.com
… -power feature of BLE beacon advertisement is a promising enabling technology for secured
transmission … , months or even a year with a button cell depending on the transmission rate. …

Secure D2D communication in large-scale cognitive cellular networks with wireless power transfer

Y Liu, L Wang, SAR Zaidi, M Elkashlan… - 2015 IEEE …, 2015 - ieeexplore.ieee.org
… and secure information transmission. In the power transfer model, we propose a new power
… We propose a new best power beacon (BPB) power transfer policy in the power transfer …

On the Performance of Power Beacon-Assisted D2D Communications in the Presence of Multi-Jammers and Eavesdropper

NT Nguyen, P Fazio, M Voznak - Journal of Advanced Engineering and …, 2021 - jaec.vn
… expressions of the probability of successful and secure communication (SS), outage probability
(… If want to hold this value, we will choose to increase the transmit power of the jammer as …