Secrecy rate maximization for multicarrier-based cognitive radio networks with an energy harvesting jammer

K Chi, J Sun, S Zhang, L Huang - IEEE Sensors Journal, 2022 - ieeexplore.ieee.org
… The data transmission and energy harvesting scheme we applied is shown in Fig. 2. The
time block consists of the PU transmission phase with length α1 and the SU transmission phase …

Harvest-and-jam: Improving security for wireless energy harvesting cooperative networks

H Xing, Z Chu, Z Ding… - 2014 IEEE Global …, 2014 - ieeexplore.ieee.org
… The main idea is to assist the Tx in the secrecysecrecy in cooperative networks, in this
paper, we propose a newly designed two-phase relay protocol for idle users, ie, harvestand-jam (…

Secure communications in CIoT networks with a wireless energy harvesting untrusted relay

H Hu, Z Gao, X Liao, VCM Leung - Sensors, 2017 - mdpi.com
energy source and relieve devices from the constraints induced by battery usage, a prospective
study on the secure transmission via an energy harvesting … the secrecy performance of …

Energy harvesting for physical-layer security in OFDMA networks

M Zhang, Y Liu - IEEE Transactions on Information Forensics …, 2015 - ieeexplore.ieee.org
… splitting to coordinate the energy harvesting and secrecy information decoding processes. …
the aggregate harvested power of all users while satisfying secrecy rate requirements of …

Secrecy outage probability analysis of energy‐aware relay selection for energyharvesting cooperative systems

Y Zhang, P Li, W Fan, R Wang - IET Communications, 2022 - Wiley Online Library
energy harvesting underlay cognitive radio system and propose optimal relay selection (ORS)
and suboptimal relay selection (SAS) to enhance the secrecy … the analysis of the secrecy

Cooperative communication with energyharvesting relays under physical layer security

PN Son, HY Kong - IET Communications, 2015 - Wiley Online Library
… Hence, we analyse the secrecy performance of the EH-AF protocol by the secrecy outage
probability based on the ASR [12]. Since the destination D knows all CSI as described in the …

Secrecy analysis and learning-based optimization of cooperative NOMA SWIPT systems

F Jameel, WU Khan, Z Chang… - 2019 IEEE …, 2019 - ieeexplore.ieee.org
energy harvesting cooperative NOMA users communicate in the presence of an energy
harvesting … We derive the analytical expression of intercept probability of DF energy harvesting

Secrecy rate and residual energy trade-off in energy harvesting cognitive radio networks

J Wu, J Wu, L Chen, Y Wu - Physical Communication, 2019 - Elsevier
… which studied secrecy rate did not usually consider energy harvesting and residual energy.
… transmission factor β , by changing the energy harvesting factor ρ , we obtain the range of …

Secrecy profits analysis of wireless-powered networks against randomly distributed eavesdroppers

S Wang, L Zhao, K Liang… - ICC 2019-2019 IEEE …, 2019 - ieeexplore.ieee.org
… will consume more energy on jamming. This paper studies the secrecy performance of a …
(PBs) will first transmit energy to the energy-harvesting transmitters wirelessly, and then act as …

Secrecy wireless information and power transfer in fading wiretap channel

H Xing, L Liu, R Zhang - IEEE Transactions on Vehicular …, 2015 - ieeexplore.ieee.org
energy harvesting requirement. Note that, in the conventional secrecy communication setup
without the energy harvesting … widely applied to improve the secrecy transmission rates [7]–[…