Secrecy outage performance analysis for energy harvesting sensor networks with a jammer using relay selection strategy

TG Nguyen, C So-In, ZA Baig, S Sanguanpong - IEEE Access, 2018 - ieeexplore.ieee.org
… Abstract—In this paper, we study radio frequency (RF) energy harvesting (… harvest energy
from multiple power transfer stations (PTSs), and then, the source uses this harvested energy

Secrecy outage analysis of energy harvesting two‐way relaying networks with friendly jammer

P Nguyen‐Huu, K Ho‐Van, VNQ Bao - IET Communications, 2019 - Wiley Online Library
… two-way relaying where an energy harvesting capable relay … Secrecy outage analysis of
the energy harvesting two-way … in terms of individual secrecy outage probabilities and then …

IRS-based secrecy rate analysis in presence of an energy harvesting eavesdropper

MA Saeidi, MJ Emadi - 2020 Iran Workshop on Communication …, 2020 - ieeexplore.ieee.org
… , considering the physical layer secrecy in presence of energy harvesting nodes are of interests
[9]. … to meet the energy harvesting requirement at Eve while maximizing the secrecy rate. …

Secure wireless powered relaying networks: Energy harvesting policies and performance analysis

QN Le, DT Do, B An - International Journal of Communication …, 2017 - Wiley Online Library
energy transfer protocols, namely, source-based energy harvesting protocol and maximum
energy harvesting … To evaluate the secrecy performance of these proposed schemes, we …

Achievable secrecy rates of an energy harvesting device

A Biason, N Laurenti, M Zorzi - IEEE Journal on Selected Areas …, 2016 - ieeexplore.ieee.org
secrecy rates in an energy harvesting communication system composed of a transmitter, a
receiver and a malicious eavesdropper. In particular, because of the energy … that high secrecy

Coverage, Secrecy, and Stability Analysis of Energy Harvesting Wireless Networks

M Kishk - 2018 - vtechworks.lib.vt.edu
harvesting. In addition, the statistics of the interference level are also required for studying
the secrecy of … for the secrecy performance as well as the energy harvesting probability. This …

Secrecy Analysis of Overlay Mechanism in Radio Frequency Energy Harvesting Networks with Jamming under Nakagami-m fading

H Dang-Ngoc, K Ho-Van, T Do-Dac - Wireless Personal Communications, 2021 - Springer
… to improve spectral efficiency and secrecy performance for the overlay mechanism in …
energy harvesting networks. Furthermore, important secrecy performance indicators are analyzed

Secrecy analysis for IoT relaying networks deploying NOMA with energy harvesting

J Zhang, M Han - Journal of the Franklin Institute, 2021 - Elsevier
… assumed to work under non-linear energy harvesting modes, and are capable of harvesting
Secrecy performance analysis In this section, we present the secrecy analysis in terms of …

Residual energy analysis in cognitive radios with energy harvesting UAV under reliability and secrecy constraints

W Khalid, H Yu, S Noh - Sensors, 2020 - mdpi.com
… We consider an energy harvesting UAV (eg, surveillance drone) flying periodically in a
circular … energy management aspect of the energy harvesting CR-based UAV with limited-energy

Secrecy limits of energy harvesting IoT networks under channel imperfections

F Jameel, Z Chang, R Jäntti - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
… industry as a key enabler of energy harvesting Internet-of-things (… provide a novel analysis
of the ergodic secrecy capacity of a … -form expressions of the ergodic secrecy capacities for the …