On the placement of RF energy harvesting node in wireless networks with secrecy considerations

B He, X Zhou - 2014 IEEE Globecom Workshops (GC Wkshps), 2014 - ieeexplore.ieee.org
… In this work, we investigate how the value of de affects both secrecy and EH … are analyzed
in this section. The first problem maximizes the average EH power subject to a secrecy outage …

Secrecy performance analysis of wireless powered sensor networks under saturation nonlinear energy harvesting and activation threshold

X Shang, H Yin, Y Wang, M Li, Y Wang - Sensors, 2020 - mdpi.com
… the impact of saturation nonlinear energy harvesting (EH) and … In particular, for improving
the secrecy performance, the … closed-form expressions for secrecy outage probability (SOP) …

Secrecy and throughput performance of an energy harvesting hybrid cognitive radio network with spectrum sensing

P Maji, K Yadav, SD Roy, S Kundu - Wireless Networks, 2020 - Springer
… the presence of direct link to improve the secrecy of the SU network without considering
imperfect CSI and hybrid CRN. However, in this work, secrecy analysis has been carried out in a …

Secrecy outage analysis in a hybrid cognitive relay network with energy harvesting

P Maji, S Dhar Roy, S Kundu - International Journal of …, 2017 - Wiley Online Library
… that the energy harvesting relay harvests energy from the signal … source of energy and uses
the harvested energy to transfer … of energy consumption for running the harvester at relay to …

Secrecy capacity in two-way energy harvesting relay networks with a friendly jammer

M Hayajneh, TA Gulliver - Wireless Networks, 2021 - Springer
energy harvesting two-way relay. A friendly jammer is employed to reduce information leakage
to the eavesdropper. The relay relies on the signals received to harvest energysecrecy

Performance analysis of an energy-harvesting IoT system using a UAV friendly jammer and NOMA under cooperative attack

C So-In, H Tran, DD Tran, TP Huu - IEEE Access, 2020 - ieeexplore.ieee.org
… In this section, a brief review of recent works on secrecy performance in wireless networks
in the presence of MJs, UAV friendly jammers, and cooperative attacks is presented. MJs have …

Secrecy performance maximization for underlay CR networks with an energy harvesting jammer

J Sun, S Zhang, K Chi - Sensors, 2021 - mdpi.com
… This paper investigates the secrecy communication in an … the radio frequency (RF)
energy-harvesting secondary user (SU) … We introduce a RF energy-harvesting secondary jammer …

Secure energy harvesting relay networks with unreliable backhaul connections

C Yin, HT Nguyen, C Kundu, Z Kaleem… - IEEE …, 2018 - ieeexplore.ieee.org
… of unreliable backhaul on the secrecy of an energy harvesting relay network with transmitter …
, ie, secrecy outage probability, non-zero achievable secrecy rate and ergodic secrecy rate, …

Outage performance analysis of energy harvesting wireless sensor networks for NOMA transmissions

VN Vo, TG Nguyen, C So-In, H Tran - Mobile networks and Applications, 2020 - Springer
… of harvested energy, a fact that has yet to be fully clarified. Unlike the recent literature, this
research investigates the secrecy … SNs in clusters that harvest energy from multiple PTSs in the …

Energy harvesting for physical layer security in cooperative networks based on compressed sensing

S Chang, J Li, X Fu, L Zhang - Entropy, 2017 - mdpi.com
… In this paper, we study the secrecy capacity of a cooperative … of eavesdroppers based on an
energy harvesting protocol. In this … The energy harvested by the relays will be used to amplify …