Security in energy harvesting networks: A survey of current solutions and research challenges

P Tedeschi, S Sciancalepore… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
The recent advancements in hardware miniaturization capabilities have boosted the
diffusion of systems based on Energy Harvesting (EH) technologies, as a means to power …

Improving physical layer security of uplink NOMA via energy harvesting jammers

K Cao, B Wang, H Ding, L Lv, R Dong… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
We investigate the secrecy transmission of uplink non-orthogonal multiple access (NOMA)
with the aid of energy harvesting (EH) jammers. During each time frame, communication is …

Improving physical layer security in IRS-aided WPCN multicast systems via Stackelberg game

L Zhai, Y Zou, J Zhu, B Li - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
This paper investigates an intelligent reflecting surface (IRS) aided secure wireless powered
communication network (WPCN), where a transmitter first harvests energy from a power …

IRS-aided uplink security enhancement via energy-harvesting jammer

T Qiao, Y Cao, J Tang, N Zhao… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
In this paper, we investigate the security enhancement by combining intelligent reflecting
surface (IRS) and energy harvesting (EH) jammer for the uplink transmission. Specifically …

Optimal resource allocation for multiuser Internet of Things network with single wireless-powered relay

P Ramezani, Y Zeng… - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
Wireless powered communication (WPC), where the required energy for communication is
obtained via radio frequency (RF) energy harvesting, is a promising technology for the …

Secrecy outage analysis of transmit antenna selection assisted with wireless power beacon

P Yan, J Yang, M Liu, J Sun… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
This paper considers a multiple-input-multiple-output (MIMO) energy-harvesting (EH)
system, which is made up of a source (S) and a destination (D) as well as an eavesdropper …

Charge-then-cooperate: Secure resource allocation for wireless-powered relay networks with wireless energy transfer

M Wu, Q Song, L Guo… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
This correspondence studies resource allocation for a wireless-powered relay network,
where a hybrid relay with constant energy supply assists an energy-constrained source to …

Secrecy throughput maximization for full-duplex wireless powered IoT networks under fairness constraints

R Rezaei, S Sun, X Kang, YL Guan… - IEEE Internet of …, 2019 - ieeexplore.ieee.org
In this paper, we study the secrecy throughput of a full-duplex wireless powered
communication network (WPCN) for Internet of Things (IoT). The WPCN consists of a full …

Secrecy throughput optimization for the WPCNs with non-linear EH model

X Liu, Y Gao, M Guo, N Sha - IEEE Access, 2019 - ieeexplore.ieee.org
This paper investigates secure communication from a wireless-powered transmitter to a
desired receiver with multiple eavesdroppers in the wireless powered communication …

Secure wireless powered cooperative communication networks with finite energy storage

Y Wang, H Yin, W Yang, T Zhang… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
This paper investigates secure transmission in a wireless powered cooperative
communication network (WPCCN) over Nakagami-fading channels, where multiple …