Secrecy performance analysis of energy harvesting wireless sensor networks with a friendly jammer

TG Nguyen, C So-In, DB Ha - IEEE Access, 2017 - ieeexplore.ieee.org
… • We propose a new WSN model with RF energyharvesting … physical layer secrecy with an
awareness of energy harvesting. … • We evaluate the system secrecy performance by deriving a …

Secrecy performance optimization for wireless powered communication networks with an energy harvesting jammer

J Moon, H Lee, C Song, I Lee - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
… First, with a single user, we maximize the secrecy rate by optimizing the time allocation … we
analyze and minimize the secrecy outage probability. We also extend the single user analysis

Secrecy performance analysis for fixed-gain energy harvesting in an Internet of Things with untrusted relays

DD Tran, C So-In, H Tran - IEEE Access, 2018 - ieeexplore.ieee.org
… the radio frequency (RF) energy harvesting (EH) and security … (SNs) and relays harvest energy
from multiple power transfer … SN uses the harvested energy to broadcast information to the …

Secrecy analysis of wireless-powered multi-antenna relaying system with nonlinear energy harvesters and imperfect CSI

J Zhang, G Pan, Y Xie - IEEE Transactions on Green …, 2017 - ieeexplore.ieee.org
… Moreover, a linear energy harvester mode may cause severe resource allocation … energy
harvester goes into infinity, ie, unlimited battery capability. Hence, a nonlinear energy harvester

Secrecy analysis for energy harvesting-enabled cognitive radio networks in cascaded fading channels

DH Tashman, W Hamouda - ICC 2021-IEEE International …, 2021 - ieeexplore.ieee.org
… (FD) SU destination, which employs energy harvesting (EH) to extract the power … harvesting
and non-harvesting eavesdropper. Moreover, a trade-off between the system’s secrecy

Secure communication via a wireless energy harvesting untrusted relay

SS Kalamkar, A Banerjee - IEEE Transactions on Vehicular …, 2016 - ieeexplore.ieee.org
secrecy performance. Given that the scope of this paper is to analyze the untrusted nature
of an energy harvesting … to study the secrecy performance without channel estimation errors. …

Secrecy performance analysis of UAV assisted relay transmission for cognitive network with energy harvesting

B Ji, Y Li, D Cao, C Li, S Mumtaz… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
… outage probability (SOP) and the probability of non-zero secrecy capacity were calculated
… cases were analyzed in detail, where the expressions of secrecy diversity order and secrecy

Security in energy harvesting networks: A survey of current solutions and research challenges

P Tedeschi, S Sciancalepore… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
… Assuming a MISO scenario, the authors in [187] considered the maximization of the sum
logarithmic secrecy rates, by considering energy harvesting constraints. To achieve the objective…

Secrecy energy efficiency optimization in AN-aided distributed antenna systems with energy harvesting

G Wang, C Meng, W Heng, X Chen - IEEE Access, 2018 - ieeexplore.ieee.org
energy harvesting (EH) for each user. It was assumed that the channel state information (CSI)
was imperfect at the transmitter, and a robust beamforming and power-splitting design was …

Robust secrecy beamforming with energy-harvesting eavesdroppers

MRA Khandaker, KK Wong - IEEE Wireless Communications …, 2014 - ieeexplore.ieee.org
… We aim to maximize the harvested energy by the ERs while maintaining the signal-to-… secret
MISO SWIPT system. Unlike [9], our objective is to jointly design the information and energy