Wiretap TDMA Networks with Energy-Harvesting Rechargeable-Battery Buffered Sources
Author | El Shafie, Ahmed |
Author | Al-dhahir, Naofal |
Author | Ding, Zhiguo |
Author | Duong, Trung Q. |
Author | Hamila, Ridha |
Available date | 2023-04-04T09:09:11Z |
Publication Date | 2019 |
Publication Name | IEEE Access |
Resource | Scopus |
Abstract | We investigate the physical-layer security of an uplink wireless time-division multiple-access channel with energy-harvesting source nodes. We consider a set of source nodes equipped with rechargeable batteries and information buffers communicating confidentially with a base station, Bob, in the presence of a passive eavesdropper, Eve. An energy-harvesting rechargeable-battery cooperative jammer is assumed to assist the source nodes to confidentially send their information messages. We propose a two-level optimization formulation to improve the system's security performance. At the first optimization level, we propose a jamming scheme under energy constraints at different nodes to reduce the secrecy outage probabilities without relying on the eavesdropper's instantaneous channel state information. At the second optimization level, we optimize the number of energy packets used at the source nodes and the cooperative jammer as well as the time-slot allocation probabilities to maximize the secure throughput under the network's queues stability constraints and an application-specific secure throughput for each legitimate source node. The numerical results show the significant performance gains of our proposed optimization relative to two important benchmarks. We verify our theoretical findings through simulations and quantify the impact of key system design parameters on the security performance. 2019 IEEE. |
Sponsor | This publication was made possible by NPRP grant # NPRP 8-627-2-260 from the Qatar National Research Fund (a member of Qatar Foundation). The statements made herein are solely the responsibility of the authors. |
Language | en |
Publisher | IEEE |
Subject | Energy harvesting information and energy queues physical-layer security secrecy rates secure throughput |
Type | Article |
Pagination | 17215-17229 |
Volume Number | 7 |
Files in this item
This item appears in the following Collection(s)
-
Electrical Engineering [2649 items ]