Energy harvesting towards self-powered IoT devices

H Elahi, K Munir, M Eugeni, S Atek, P Gaudenzi - Energies, 2020 - mdpi.com
The internet of things (IoT) manages a large infrastructure of web-enabled smart devices,
small devices that use embedded systems, such as processors, sensors, and …

Security in energy harvesting networks: A survey of current solutions and research challenges

P Tedeschi, S Sciancalepore… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
The recent advancements in hardware miniaturization capabilities have boosted the
diffusion of systems based on Energy Harvesting (EH) technologies, as a means to power …

Future generation communications with game strategies: A comprehensive survey

R Gupta, J Gupta - Computer Communications, 2022 - Elsevier
For an effective, low latency, and ultra reliable pervasive connectivity among next-
generation wireless networks such as Internet of Things (IoT) devices, machine-to-machine …

Secrecy outage performance analysis for energy harvesting sensor networks with a jammer using relay selection strategy

TG Nguyen, C So-In, ZA Baig, S Sanguanpong - IEEE Access, 2018 - ieeexplore.ieee.org
In this paper, we study radio frequency energy harvesting (EH) in a wireless sensor network
in the presence of multiple eavesdroppers (EAVs). Specifically, the sensor source and …

Security-reliability trade-off analysis for rateless codes-based relaying protocols using NOMA, cooperative jamming and partial relay selection

DH Ha, TT Duy, PN Son, T Le-Tien, M Voznak - IEEE Access, 2021 - ieeexplore.ieee.org
In this paper, we propose secure relaying transmission protocols using rateless codes,
where a source sends encoded packets to two intended destinations via help of …

Physical layer security in AF-based cooperative SWIPT sensor networks

TN Nguyen, DH Tran, T Van Chien… - IEEE Sensors …, 2022 - ieeexplore.ieee.org
Physical layer security (PLS) with radio frequency (RF) energy harvesting (EH) in wireless
sensor networks has received significant interest as a technology for secure information …

Performance Analysis of DF/AF Cooperative MISO Wireless Sensor Networks With NOMA and SWIPT Over Nakagami- Fading

DD Tran, DB Ha, C So-In, H Tran, TG Nguyen… - IEEE …, 2018 - ieeexplore.ieee.org
In this paper, we investigate downlink cooperative multiple-input single-output wireless
sensor networks with the nonorthogonal multiple access technique and simultaneous …

Secure Transmit Antenna Selection Protocol for MIMO NOMA Networks Over Nakagami-m Channels

DD Tran, HV Tran, DB Ha, G Kaddoum - IEEE Systems Journal, 2019 - ieeexplore.ieee.org
In this paper, we consider a multi-input multioutput (MIMO) nonorthogonal multiple access
(NOMA) network consisting of one source and two legitimate users (LUs), so-called near …

Performance analysis of an energy-harvesting IoT system using a UAV friendly jammer and NOMA under cooperative attack

C So-In, H Tran, DD Tran, TP Huu - IEEE Access, 2020 - ieeexplore.ieee.org
In this article, we consider the information leakage and outage probabilities of a multiple-
input single-output (MISO) energy-harvesting (EH) Internet of Things (IoT) system in which a …

Energy-efficient and secure power allocation and trajectory optimization for UAV-enabled data collection in wireless sensor networks

D Wang, Y Yang, X Li, C Wang, F Liu… - … of Communications and …, 2022 - ieeexplore.ieee.org
Using unmanned aerial vehicles (UAVs) to collect data in wireless sensor networks (WSNs)
has advantages of controllable mobility and flexible deployment. However, there are …