Next Article in Journal
Passive Infrared (PIR)-Based Indoor Position Tracking for Smart Homes Using Accessibility Maps and A-Star Algorithm
Next Article in Special Issue
A Proposal for IoT Dynamic Routes Selection Based on Contextual Information
Previous Article in Journal
Tactile-Sensing Based on Flexible PVDF Nanofibers via Electrospinning: A Review
Previous Article in Special Issue
Social Incentive Mechanism Based Multi-User Sensing Time Optimization in Co-Operative Spectrum Sensing with Mobile Crowd Sensing
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Secure Transmission of Cooperative Zero-Forcing Jamming for Two-User SWIPT Sensor Networks

College of Communications Engineering, Army Engineering University of PLA, No. 88 Houbiaoying, Qinhuai District, Nanjing 210007, China
*
Author to whom correspondence should be addressed.
Sensors 2018, 18(2), 331; https://doi.org/10.3390/s18020331
Submission received: 3 January 2018 / Revised: 21 January 2018 / Accepted: 22 January 2018 / Published: 24 January 2018
(This article belongs to the Special Issue Sensor Networks for Collaborative and Secure Internet of Things)

Abstract

:
In this paper, the secrecy performance of the two-user simultaneous wireless information and power transfer (SWIPT) sensor networks is studied and a novel secure transmission scheme of cooperative zero-forcing (ZF) jamming is proposed. The two sensors opportunistically conduct the SWIPT and cooperative ZF jamming, respectively, where the energy required for jamming the eavesdropper is provided by the SWIPT operation so as to keep the energy balance at the sensors in the long run. By deriving the exact closed-form expressions of the secrecy outage probability and the secrecy throughout, we provide an effective approach to precisely assess the impacts of key parameters on the secrecy performance of the system. It has been shown that the secrecy outage probability is a monotonically increasing function of the growth of secrecy rate ( R s ), and a monotonically decreasing function of the increase of the transmit signal-to-noise ratio ( γ S ), and energy conversion efficiency ( η ). Furthermore, the secrecy throughput could be enhanced when η increases, which becomes especially obvious when a large γ S is provided. Moreover, the existence of an optimum R s maximizing the secrecy throughput is depicted, which also grows with the increase of γ S . Simulations are provided for the validation of the analysis.

1. Introduction

Because of the broadcast nature of wireless medium, it is a critical issue to secure the transmission in the design of wireless sensor networks [1]. The security is conventionally tackled through higher layer techniques, e.g., cryptographic protocols, which, however, could not guarantee the required security level alone for the large-scale wireless sensor networks due to the significant increase in the complexity of key distribution and management [2]. In contrast to conventional cryptographic approaches conducted at higher layers, the physical layer security (PLS) tries to secure the wireless networks against eavesdropping by exploiting the inherent channel randomness at the physical layer. Hence, PLS has been widely regarded as an effective supplementary protocol for wireless communications and, thus, has gained much attention in research communities [3,4,5].
The main idea of PLS is that, by making and enlarging the capacity differences between the legitimate channels and the wiretapping channels, the information could be transmitted at a predefined secrecy rate so that only the authorized receiver can decode the data while the eavesdropper could not [6]. Various advanced techniques have been proposed to further enhance the potential benefits of PLS, such as antenna selection [7], cooperative relaying [8], cooperative jamming [9], etc. Generally speaking, the security of wireless transmission could be significantly increased if jamming signals could be carefully exploited in the legitimate network. As a consequence, the cooperative jamming has been widely applied in the PLS research in numerous systems, such as single-input-multiple-output (SIMO) networks [10], two-way relay scenarios [11], multiple-input-multiple-output (MIMO) wiretap-channel settings [12], etc.
More recently, the simultaneous wireless information and power transfer (SWIPT) has become an appealing technique in wireless communications due to its great potential in tackling the energy bottleneck issue, especially in some energy-constrained cases [13,14,15]. Authors in [16] investigated the safeguarding approach for SWIPT systems with both the eavesdropper and the friendly jammer harvesting energy from the wireless signals, and the optimal power allocation strategy based on the Lagrange method was then proposed. In [17], a cooperative jamming aided robust secure transmission for SWIPT multiple-input-single-output (MISO) networks was presented, where the objective of the source and the jammer was to maximize the secrecy rate and also supply wireless power to the energy receiver and the destination. However, an additional jammer must be deployed in literature [16,17], which is practically costly in the construction and upgrading of current wireless systems, especially in the wireless sensor networks.
There has been some research investigating the security issue of scenarios where no additional jammer is available and the user harvests the energy and also acts as the jammer itself [18,19,20]. Work [18] studied the secrecy performance of full-duplex SWIPT networks, where the two-antenna user received information and energy with one of its antennae by applying the power-splitting SWIPT protocol, and sent the jamming signal to confuse the eavesdropper with the other antenna. Under a similar system of deployment, the security of the time-switching SWIPT protocol was examined in [19], where the secrecy outage performance and the secrecy energy efficiency were formulated. The author in [20] extended the research in the cognitive networks, where the energy collected by the receiving antenna via the power-splitting SWIPT protocol was used for producing jamming signals by the transmitting antenna. However, the shortage of [18,19,20] is obvious. On the one hand, an effective self-interference cancellation (SIC) method at the users is required to guarantee the validity of the secure schemes, as the users in this literature all work in the full-duplex mode. On the other hand, both the power-splitting and the time-switching approaches applied in these literature will definitely increase the complexity of realization significantly. As a result, the practical value of these schemes in wireless sensor networks is greatly limited.
Motivated by the above observations, we present a novel secure transmission scheme for the proposed two-user SWIPT sensor networks where the two sensors conduct the cooperative zero-forcing (ZF) jamming opportunistically and mutually with the harvested energy. We note that the proposed two-user cooperative pair model is rather practical because each sensor in actual sensor networks can choose another sensor nearby to form this pair and then conduct cooperative jamming in turn. It is also highlighted that the sensors are generally energy-constrained, which again reveals the advantage of the proposed cooperative jamming scheme because it does not consume any energy of the sensors in the long run due to the SWIPT operation. Furthermore, neither the full-duplex and SIC techniques nor the power-splitting and time-switching methods are needed in the proposed scheme, which is of great benefit in practical realization. The remainder of the work is organized as follows: Section 2 characterizes the system model and presents the secure transmission scheme. In Section 3, the exact secrecy analysis of the proposed scheme is carried out. Section 4 conducts the simulations and gives the discussions. Finally, Section 5 summarizes the whole paper.
Notation: Throughout this paper, the boldface uppercase letters are used to denote matrices or vectors. · T and · H are denoted as the transpose operation and the conjugate transpose operation, respectively. F γ · and f γ · represent the cumulative distribution function (CDF) and the probability density function (PDF) of random variable γ , respectively. E [ · ] denotes the expectation operation.

2. System Model

2.1. System Description

We consider a downlink SWIPT sensor network as illustrated in Figure 1, which consists of a source node S, a pair of two sensor nodes D 1 and D 2 , and an eavesdropper E. All nodes are equipped with a single antenna, except for the two sensors, which both have only two antennae without having to increase too much complexity of realization [19,20]. In addition, we assume that the channel state information (CSI) of the legitimate links is available, while the CSI of the eavesdropping link is not known by the legitimate nodes. This is a typical passive eavesdropping scenario which is more practical than active eavesdropping [21] and has been widely used in existing literature (see [22,23,24] and the references therein). It is also assumed that all the channels between two nodes experience quasi-static Rayleigh fading, such that the channel coefficients keep constant during a packet time T 0 but vary independently from one packet time to another. Furthermore, all the channels of S D i , j and D i , j E are assumed to be independent and identically distributed (i.i.d), respectively.

2.2. Secure Transmission

At each slot, the specific antenna of a certain sensor that maximizes the instantaneous transmission channel capacity is chosen for information receiving (IR). At the same time, the remaining antenna of the selected sensor will be assigned for energy harvesting (EH). In addition, the jamming operation is introduced in order to enhance the security of the transmission. More specifically, the cooperative ZF jamming is applied in this paper by the other sensor, so that the IR process is not interfered.
Without loss of generality, we assume that the D i , j is selected in a certain slot, namely
i , j = arg max i , j 1 , 2 g S D i , j ,
where g . = h . 2 , and h S D i , j represents the channel coefficient between S and the j-th antenna of i-th sensor. At the same time, the antenna D i , 3 j is allocated for collecting energy, and the other sensor D 3 i is assigned to produce ZF jamming signals in order to increase the security of the transmission. As described above, we can summarize the working mode of all the antennae when D i , j is determined, which is shown in Table 1 for the better readability.
As a result, the signals for IR and EH can be given by Labels (2) and (3), respectively,
y D i , j = P J h D 3 i D i , j H w Z F x J + P S h S D i , j x S + n D i , j ,
y D i , 3 j = P J h D 3 i D i , 3 j H w Z F x J + P S h S D i , 3 j x S + n D i , 3 j ,
where P S and P J represent the transmit power of S and the jamming power of sensors, h D 3 i D i , j , h D 3 i D i , 3 j C 2 × 1 represent the channel coefficient vectors from D 3 i to D i , j and D i , 3 j , respectively. x S and x J denote the information-bearing signal and the jamming signal, n a is the additive white Gaussian noise (AWGN) at node a with a D i , j , i , j 1 , 2 . Without loss of generality, the noise power spectral density is assumed the same everywhere within the network and is denoted as N 0 , and w Z F is the normalized vector of the jamming operation.
Now, we will focus on the derivation of w Z F . As pointed out previously, the jamming operation is introduced to increase the security of the transmission. Therefore, three purposes are expected to be achieved by this jamming operation. Firstly, the jamming operation will not affect the receiving performance of the legitimate information receiver. Secondly, the interference received at the eavesdropper should be maximized, so that the eavesdropper is confused as much as possible. Thirdly, the interference received at the legitimate energy receiver should be maximized, so that the legitimate energy receiver could collect as much energy as possible from the jamming signal. Mathematically, the above three ideas can be achieved by Equations (4)–(6), respectively,
h D 3 i D i , j H w Z F = 0 ,
max w Z F h D 3 i E H w Z F ,
max w Z F h D 3 i D i , 3 j H w Z F ,
where h D 3 i E C 2 × 1 represents the channel coefficient vector from D 3 i to E. In addition, recall that the jamming vector is normalized, hence we have
w Z F = 1 .
Unfortunately, due to the passive eavesdropping assumption, the eavesdropper’s CSI, h D 3 i E H , is unavailable at the legitimate network, thus it is not possible to maximize the confusing effect to the eavesdropper. As a result, we will try to find an appropriate w Z F so that Labels (4), (6), and (7) are all satisfied, namely
max w Z F h D 3 i D i , 3 j H w Z F s . t . h D 3 i D i , j H w Z F = 0 , w Z F = 1 .
According to [25,26], the solution of Label (8) can be given by
w Z F = T h D 3 i D i , 3 j T h D 3 i D i , 3 j ,
where T is the projection idempotent matrix with rank 1, which is given by
T = I h D 3 i D i , j h D 3 i D i , j H h D 3 i D i , j 1 h D 3 i D i , j H .
It is easy to see from Labels (9) and (10) that w Z F is chosen from the null space of the channel direction of h D 3 i D i , j so that the information receiving process is not interfered [27,28].
As can be observed, the CSI knowledge is required for both the selection process and ZF jamming operation. Now, we will elaborate on how this knowledge is obtained. As shown in Figure 2, each time slot could be divided into two parts, namely the pilot duration and the transmission duration. In order to select the best antenna for IR, the antenna D i , j ( i , j { 1 , 2 } ) will send pilot signals during its pilot duration P i , j , which can be exploited for channel estimation by S and the other sensor, which acts as a jammer. Hence, S is able to obtain the knowledge of h S D i , j for user/antenna selection, and the sensor that acts as jammer can derive the knowledge of h D 3 i D i , 3 j and h D 3 i D i , j to construct the ZF jamming vector.
According to Labels (2) and (8), the receiving signal-to-noise ratio (SNR) for information receiving is given by
γ D = P S N 0 max i , j 1 , 2 g S D i , j .
At the same time, the amount of collected energy is expressed as
ε D = η T 0 y D i , 3 j 2 ,
and denoting U = h D 3 i D i , 3 j H w Z F . According to (Lemma 2 [25]), (Lemma 2 [26]), (Equation (30) [27]), (Equation (52) [28]), the CDF of U = h D 3 i D i , 3 j H w Z F is a chi-square random variable with 2 ( L s 1 ) degrees of freedom, namely U ~ χ 2 2 L s 1 , where L s represents the number of ZF antennae. In this paper, we have L s = 2 . Hence, U ~ χ 2 2 , which degenerates into exponentially distributed random variables, namely we have
f U u = 1 γ ¯ D D e u γ ¯ D D ,
where γ ¯ a b = E g a b represents the average channel gain of link a b , a , b ϵ S , D , E . Specifically, γ ¯ D D represents the average channel gain between the two sensors. By using the above result, Equation (12) can be readily calculated as (We note that little energy can be harvested from the AWGN in practice, hence is neglected in this paper [14,29].)
ε D = η T 0 P S h S D i , 3 j 2 + P J h D 3 i D i , 3 j H w Z F 2 ,
where η is the energy conversion efficiency. Hence, in order to keep the energy balance at the sensors in the long run, the jamming power can be chosen as (We note that an energy outage would occur by adopting the approach in this paper. Although the probability to occur this can be proven to be very low by the simulations when an appropriate initial energy can be provided, it still should be considered for accurate analysis. In fact, by modeling battery as an energy queue would be a good method to give out the accurate analysis, which however is beyond the scope of this paper and is left for the research in the future.)
P J = E ε D T 0 = η P S γ ¯ S D + P J γ ¯ D D .
It is readily to know that Label (15) yields to
P J = η γ ¯ S D P S 1 η γ ¯ D D .
Similarly, the receiving signal at E is expressed as
y E = P S h S E x S + P J h D 3 i E H w Z F x J + n E .
Thus, the receiving signal-to-interference-plus-noise ratio (SINR) at E is given by
γ E = P S g S E P J h D 3 i E H w Z F 2 + N 0 .

3. Secrecy Performance Analysis

In this section, we focus our attention on the secrecy performance of the proposed scheme. Before delving into the details, we present the preliminary of the following two lemmas.
Lemma 1.
The CDF and the PDF of γ D are given by
F γ D x = 1 e N 0 x P S γ ¯ S D 4 ,
f γ D x = 4 N 0 P S γ ¯ S D k = 0 3 3 k 1 k e k + 1 N 0 x P S γ ¯ S D .
Proof. 
According to Label (11) and referring to [5], Equation (19) is readily obtained. By taking the derivation operation, the PDF of γ D is derived as
f γ D x = 4 N 0 P S γ ¯ S D 1 e N 0 x P S γ ¯ S D 3 e N 0 x P S γ ¯ S D .
By using the binomial theorem (Equation (1.111) [30]) in Label (21), the result in Label (20) is readily obtained. ☐
Lemma 2.
The CDF and PDF of γ E are given by
F γ E x = 1 P S γ ¯ S E P J γ ¯ D E x + P S γ ¯ S E e N 0 x P S γ ¯ S E ,
f γ E x = P S γ ¯ S E P J γ ¯ D E P J γ ¯ D E x + P S γ ¯ S E 2 e N 0 x P S γ ¯ S E + N 0 P J γ ¯ D E x + P S γ ¯ S E P J γ ¯ D E x + P S γ ¯ S E 2 e N 0 x P S γ ¯ S E .
Proof. 
Mathematically, the CDF of γ E can be manipulated as F γ E x = Pr γ E < x , which can be rewritten as Label (24) according to Label (18)
F γ E x = 0 F g S E P J v + N 0 x P S f V v d v ,
where V = h D 3 i E H w Z F 2 . As shown in Label (8), w Z F = [ w 1 , w 2 ] T is a normalized vector, i.e., w 1 2 + w 2 2 = 1 . Thus, h D 3 i E H w Z F is a unitary transformation of h D 3 i E H . In addition, it is obvious that w Z F is independent of h D 3 i E H , and the two elements of h D 3 i E H , namely h D 3 i , 1 E and h D 3 i , 2 E are both Gaussian variables. In other words, we have h D 3 i , 1 E , h D 3 i , 2 E N 0 , γ ¯ D E . Therefore, w 1 h D 3 i , 1 E N 0 , w 1 2 γ ¯ D E and w 2 h D 3 i , 2 E N 0 , w 2 2 γ ¯ D E can be concluded. Hence, ( w 1 h D 3 i , 1 E + w 2 h D 3 i , 2 E ) N 0 , w 1 2 + w 2 2 γ ¯ D E = N 0 , γ ¯ D E , which means that V = w 1 h D 3 i , 1 E + w 2 h D 3 i , 2 E 2 is also an exponentially distributed random variables with the mean of γ ¯ D E . We note that V has the same distribution with h D 3 i , 1 E and h D 3 i , 2 E , and this has verified the conclusion that the unitary transformation does not change the distribution of the transformed variables. As a result, we have
f V v = 1 γ ¯ D E e v γ ¯ D E .
In addition, the CDF of g S E is given by
F g S E x = 1 e x γ ¯ S E .
Substituting Labels (25) and (26) into Label (24) and after some calculations, the CDF of γ E is easily obtained as in Label (22). By taking the derivation operation in Label (22), we finally derive the result in Label (23). ☐

3.1. Secrecy Outage Probability

The secrecy outage probability is defined as the probability that the instantaneous secrecy capacity falls below a predefined secrecy rate R s (The design of R s falls into the construction of the wiretap coding, which has been elaborated abundantly in the literature [31,32], and thus is omitted in this paper.), which can be equivalently expressed as [5,28]
P o u t = 0 F γ D γ t h s + γ t h s y 1 f γ E y d y ,
where γ t h s = 2 R s .
Theorem 1.
The secrecy outage probability for the proposed system is given by
P o u t γ t h s = k = 0 4 4 k 1 k e k N 0 γ t h s 1 P S γ ¯ S D I 1 , k + I 2 , k ,
where
I 1 , k = 1 + N 0 P J γ ¯ D E γ ¯ S D γ ¯ S D + k γ t h s γ ¯ S E exp ( N 0 γ ¯ S D + k N 0 γ t h s γ ¯ S E P J γ ¯ D E γ ¯ S D ) E i N 0 γ ¯ S D + k N 0 γ t h s γ ¯ S E P J γ ¯ D E γ ¯ S D ,
I 2 , k = N 0 P J γ ¯ D E exp N 0 γ ¯ S D + k N 0 γ t h s γ ¯ S E P J γ ¯ D E γ ¯ S D E i N 0 γ ¯ S D + k N 0 γ t h s γ ¯ S E P J γ ¯ D E γ ¯ S D .
Proof. 
Replacing x with ( γ t h s + γ t h s y 1 ) in Label (19), we derive
F γ D γ t h s + γ t h s y 1 = 1 exp N 0 γ t h s + γ t h s y 1 P S γ ¯ S D 4 .
With the help of binomial theorem, Label (31) can be rewritten as
F γ D γ t h s + γ t h s y 1 = k = 0 4 4 k 1 k exp k N 0 γ t h s + γ t h s y 1 P S γ ¯ S D .
By substituting Labels (23) and (32) into Label (27), and letting t = y 1 γ t h s γ t h s , we obtain
P o u t = k = 0 4 4 k 1 k exp k N 0 γ t h s 1 P S γ ¯ S D I 1 , k + I 2 , k ,
where
I 1 , k = 0 P S γ ¯ S E P J γ ¯ D E P J γ ¯ D E y + P S γ ¯ S E 2 exp N 0 γ ¯ S D + k N 0 γ t h s γ ¯ S E P S γ ¯ S E γ ¯ S D y d y ,
I 2 , k = 0 N 0 P J γ ¯ D E y + P S γ ¯ S E exp N 0 γ ¯ S D + k N 0 γ t h s γ ¯ S E P S γ ¯ S E γ ¯ S D y d y .
By using 0 e p x e p x a + x 2 a + x 2 d x = p e a p E i a p + 1 1 a a (Equation (3.353.3) [30]), Label (34) leads to Label (29). Similarly, by using 0 e μ x e μ x x + β x + β d x = e β μ E i β μ (Equation (3.352.4) [30]), Label (35) results in Label (30). ☐

3.2. Secrecy Throughput

The secrecy throughput can be defined as the secrecy rate multiplied by the probability of a reliable and secure transmission, which is mathematically written as [33]
ς = R s 1 P o u t .
By substituting the result in Theorem 1 into Label (36), the secrecy throughput can be easily deduced.

4. Simulation Results and Discussion

In this section, some representative simulations are provided to examine the impacts of the system parameters on the cooperative zero-forcing jamming scheme for the two-user SWIPT networks. The transmit SNR is defined as γ S = P S / N 0 . As can be readily observed, the theoretical results are in exact agreement with the simulations, validating the correctness of the analysis. Without loss of generality, we set N 0 = 1 .
Figure 3 illustrates the secrecy outage probability P o u t versus the secrecy rate R s with different γ ¯ S D and η . As it is shown, the secrecy outage probability monotonically increases with the growth of R s . In addition, we see from Figure 3 that larger γ ¯ S D and η both lead to a better secrecy outage performance. It is not difficult for comprehension because a larger secrecy rate is much harder to support for a given channel condition, thus leading to a greater secrecy outage. In addition, a larger γ ¯ S D indicates a greater amount of harvested energy and a better receiving SNR performance at the receiver. In other words, by increasing γ ¯ S D , the receiving SNR performance at the receiver is promoted while the receiving SNR performance at the eavesdropper becomes poor because a larger jamming power could be provided. Furthermore, although it is not a benefit to the receiver by increasing η , it still improves the amount of harvested energy, and thus can confuse the eavesdropper better. Therefore, increasing γ ¯ S D and η both contribute to a better secrecy outage performance.
Figure 4 plots the secrecy outage probability P o u t versus the transmit SNR γ S for various R s . As can be seen, the secrecy outage probability is a monotonically increasing function with R s , which coincides with the finding in Figure 3. In addition, a lower secrecy outage probability is observed when a larger γ S is provided, regardless of the value of R s . As a matter of fact, the changing of γ S will have two effects on the performance. On the one hand, increasing γ S will benefit the receiving performance of both the receiver’s and the eavesdropper’s. One the other hand, the performance of the eavesdropper will be degraded by the jamming operation while the performance of the information receiver will not. We note that, when a larger γ S is provided, the confusing effect to the eavesdropper will become better because more energy will be harvested, so that the user can jam the eavesdropper at a greater power. Overall, the receiving performance of the information receiver is much more improved than that of the eavesdropper. Therefore, the secrecy outage probability becomes a decreasing function with γ S .
Figure 5 compares the secrecy throughput ς versus the secrecy rate R s with different γ S and η . It is shown that the secrecy throughput improves significantly when a larger γ S is provided. Moreover, it is also beneficial to boost the secrecy throughput if η could be increased. In addition, this is especially useful in the high SNR region, as the enhancement of secrecy throughput is much more notable when γ S is large. Furthermore, it is noted that the variation tendency of the secrecy throughput in each line indicates the existence of an optimum R s which can maximize the secrecy throughput. This phenomenon is comprehensible. On the one hand, increasing R s will directly contribute to the enhancement of secrecy throughput, as more secrecy message is transmitted. On the other hand, a larger secrecy rate will also lead to a greater secrecy outage probability, which will result in the decline of the secrecy throughput. As a result, an optimum R s that maximizes the secrecy throughput is observed.

5. Conclusions

This paper presented a novel secure transmission scheme for the two-user SWIPT sensor networks where the cooperative zero-forcing jamming was conducted to confuse the eavesdropper. It is highlighted that the cooperative jamming does not require any energy of the sensors due to the SWIPT operation, and thus can be well applied to the energy-constrained wireless sensor networks. The exact closed-form expressions of the secrecy outage probability and the secrecy throughout were derived, which depicted the impacts of the system parameters on the system secrecy performance intuitively. The results illustrated that the secrecy outage probability monotonically increases with the growth of R s , and monotonically decreases with the increase of γ S and η . Moreover, the secrecy throughput could be further boosted if η increases, which is especially notable when γ S is large enough. In addition, it was indicated that an optimum value of R s maximizing the secrecy throughput exists, which also grows with the increase of γ S . All of the findings are of great importance in guiding the secure design of practical wireless sensor networks.

Acknowledgments

This work was supported by the National Natural Science Foundation of China under Grant Nos. 61771487, 61471393, and 61371122. The authors would like to extend their gratitude to the anonymous reviewers for their valuable and constructive comments, which have largely improved and clarified this paper.

Author Contributions

Xuanxuan Tang, Yueming Cai, Wendong Yang and Weiwei Yang conceived of the main proposal of the secure transmission schemes, conducted system modeling, and derived analysis and numerical simulation of the proposed schemes. Xuanxuan Tang and Yueming Cai wrote the manuscript. Dechuan Chen and Junquan Hu provided considerable comments and technique review of the proposed scheme and contributed to the revision of the paper. Yueming Cai read and approved the final manuscript.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Zheng, J.; Cai, Y.; Shen, X.; Zheng, Z.; Yang, W. Green energy optimization in energy harvesting wireless sensor networks. IEEE Commun. Mag. 2015, 53, 150–157. [Google Scholar] [CrossRef]
  2. Hu, J.; Yang, W.; Yang, N.; Zhou, X.; Cai, Y. On-off-based secure transmission design with outdated channel state information. IEEE Trans. Veh. Technol. 2016, 65, 6075–6088. [Google Scholar] [CrossRef]
  3. Mukherjee, A.; Fakoorian, S.A.A.; Huang, J.; Swindlehurst, A.L. Principles of physical layer security in multiuser wireless networks: A survey. IEEE Commun. Surv. Tutor. 2014, 16, 1550–1573. [Google Scholar] [CrossRef]
  4. Yang, N.; Wang, L.; Geraci, G.; Elkashlan, M.; Yuan, J.; Renzo, M.D. Safeguarding 5G wireless communication networks using physical layer security. IEEE Commun. Mag. 2015, 53, 20–27. [Google Scholar] [CrossRef]
  5. Tang, X.; Cai, Y.; Huang, Y.; Duong, T.Q.; Yang, W.; Yang, W. Secrecy outage analysis of buffer-aided cooperative MIMO relaying systems. IEEE Trans. Veh. Technol. 2017. [Google Scholar] [CrossRef]
  6. Chen, G.; Gong, Y.; Xiao, P.; Chambers, J.A. Physical layer network security in the full-duplex relay system. IEEE Trans. Inf. Forensics Secur. 2015, 10, 574–583. [Google Scholar] [CrossRef]
  7. Hu, J.; Cai, Y.; Yang, N.; Yang, W. A new secure transmission scheme with outdated antenna selection. IEEE Trans. Inf. Forensics Secur. 2015, 10, 2435–2446. [Google Scholar] [CrossRef]
  8. Zou, Y.; Wang, X.; Shen, W. Optimal relay selection for physical-layer security in cooperative wireless networks. IEEE J. Sel. Areas Commun. 2013, 31, 2099–2111. [Google Scholar] [CrossRef]
  9. Yang, M.Q.; Zhang, B.N.; Huang, Y.Z.; Yang, N.; Guo, D.X.; Gao, B. Secure multiuser communications in wireless sensor networks with TAS and cooperative jamming. Sensors 2016, 16, 1908. [Google Scholar] [CrossRef] [PubMed]
  10. Wang, C.; Wang, H.M.; Xia, X.G.; Liu, C. Uncoordinated jammer selection for securing SIMOME wiretap channels: A stochastic geometry approach. IEEE Trans. Wirel. Commun. 2015, 14, 2596–2612. [Google Scholar] [CrossRef]
  11. Zhang, R.; Song, L.; Han, Z.; Jiao, B. Physical layer security for two-way untrusted relaying with friendly jammers. IEEE Trans. Veh. Technol. 2012, 61, 3693–3704. [Google Scholar] [CrossRef]
  12. Yun, S.; Park, J.; Im, S.; Ha, J. On the secrecy rate of artificial noise assisted MIMOME channels with full-duplex receiver. In Proceedings of the IEEE Wireless Communications and Networking Conference, San Francisco, CA, USA, 19–22 March 2017; pp. 1–6. [Google Scholar]
  13. Liu, H.; Kim, K.J.; Kwak, K.S.; Poor, H.V. Power splitting-based SWIPT with decode-and-forward full-duplex relaying. IEEE Trans. Wirel. Commun. 2016, 15, 7561–7577. [Google Scholar] [CrossRef]
  14. Zhou, X. Training-based SWIPT: Optimal power splitting at the receiver. IEEE Trans. Veh. Technol. 2015, 64, 4377–4382. [Google Scholar] [CrossRef]
  15. Krikidis, I.; Timotheou, S.; Nikolaou, S.; Zheng, G.; Ng, D.W.K.; Schober, R. Simultaneous wireless information and power transfer in modern communication systems. IEEE Commun. Mag. 2014, 52, 104–110. [Google Scholar] [CrossRef] [Green Version]
  16. Liu, M.; Liu, Y. Power allocation for secure SWIPT systems with wireless-powered cooperative jamming. IEEE Commun. Lett. 2017, 21, 1353–1356. [Google Scholar] [CrossRef]
  17. Zhang, Q.; Huang, X.; Li, Q.; Qin, J. Cooperative jamming aided robust secure transmission for wireless information and power transfer in MISO channels. IEEE Trans. Commun. 2015, 63, 906–915. [Google Scholar] [CrossRef]
  18. Tang, X.; Yang, W.; Cai, Y.; Yang, W.; Cao, K.; Yuan, P. Secrecy analysis of full-duplex power-splitting SWIPT networks with artificial noise. In Proceedings of the International Workshop on Computer Science and Engineering, Beijing, China, 25–27 June 2017; pp. 950–955. [Google Scholar]
  19. Yang, W.; Mou, W.; Xu, X.; Yang, W.; Cai, Y. Energy efficiency analysis and enhancement for secure transmission in SWIPT systems exploiting full duplex techniques. IET Commun. 2016, 10, 1712–1720. [Google Scholar] [CrossRef]
  20. Zhang, J.; Pan, G.; Wang, H.M. On physical-layer security in underlay cognitive radio networks with full-duplex wireless-powered secondary system. IEEE Access 2016, 4, 3887–3893. [Google Scholar] [CrossRef]
  21. Zhou, X.; Maham, B.; Hjorungnes, A. Pilot contamination for active eavesdropping. IEEE Trans. Wirel. Commun. 2012, 11, 903–907. [Google Scholar] [CrossRef]
  22. Wang, H.M.; Zheng, T.; Mu, P. Secure MISO wiretap channels with multi-antenna passive eavesdropper via artificial fast fading. In Proceedings of the IEEE International Conference on Communications, Sydney, NSW, Australia, 10–14 June 2014; pp. 5396–5401. [Google Scholar]
  23. Hu, J.; Yang, N.; Zhou, X.; Yang, W.; Cai, Y. A versatile secure transmission strategy in the presence of outdated CSI. IEEE Trans. Veh. Technol. 2016, 65, 10084–10090. [Google Scholar] [CrossRef]
  24. Bi, Y.; Chen, H. Accumulate and jam: Towards secure communication via a wireless-powered full-duplex jammer. IEEE J. Sel. Top. Signal Process. 2016, 10, 1538–1550. [Google Scholar] [CrossRef]
  25. Afana, A.; Asghari, V.; Ghrayeb, A.; Affes, S. On the performance of cooperative relaying spectrum-sharing systems with collaborative distributed beamforming. IEEE Trans. Commun. 2014, 62, 857–871. [Google Scholar] [CrossRef]
  26. Afana, A.; Asghari, V.; Ghrayeb, A.; Affes, S. Cooperative relaying in spectrum-sharing systems with beamforming and interference constraints. In Proceedings of the 2012 IEEE 13th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Cesme, Turkey, 17–20 June 2012; pp. 429–433. [Google Scholar]
  27. Zhang, T.; Cai, Y.; Huang, Y.; Duong, T.Q.; Yang, W. Secure full-duplex spectrum-sharing wiretap networks with different antenna reception schemes. IEEE Trans. Commun. 2017, 65, 335–346. [Google Scholar] [CrossRef]
  28. Zhang, T.; Huang, Y.; Cai, Y.; Zhong, C.; Yang, W.; Karagiannidis, G. Secure multi-antenna cognitive wiretap networks. IEEE Trans. Veh. Technol. 2017, 66, 4059–4072. [Google Scholar] [CrossRef]
  29. Zeng, Y.; Zhang, R. Full-duplex wireless-powered relay with self-energy recycling. IEEE Wirel. Commun. Lett. 2015, 4, 201–204. [Google Scholar] [CrossRef]
  30. Gradshteyn, I.S.; Ryzhik, I.M. Table of Integrals, Series, and Products, 7th ed.; Elsevier/Academic Press: Amsterdam, The Netherlands, 2007. [Google Scholar]
  31. Xu, X.; Yang, W.; Cai, Y.; Jin, S. On the secure spectral-energy efficiency tradeoff in random cognitive radio networks. IEEE J. Sel. Areas Commun. 2016, 34, 2706–2722. [Google Scholar] [CrossRef]
  32. Yan, S.; Yang, N.; Geraci, G.; Malaney, R.; Yuan, J. Optimization of code rates in SISOME wiretap channels. IEEE Trans. Wirel. Commun. 2015, 14, 6377–6388. [Google Scholar] [CrossRef]
  33. Wang, L.; Cai, Y.; Zou, Y.; Yang, W.; Hanzo, L. Joint relay and jammer selection improves the physical layer security in the face of CSI feedback delays. IEEE Trans. Veh. Technol. 2016, 65, 6259–6274. [Google Scholar] [CrossRef]
Figure 1. System model.
Figure 1. System model.
Sensors 18 00331 g001
Figure 2. Time slot structure for user/antenna selection.
Figure 2. Time slot structure for user/antenna selection.
Sensors 18 00331 g002
Figure 3. P o u t vs. R s with different γ ¯ S D and η . γ S = 30 dB, γ ¯ S E = 10 dB, γ ¯ D E = 10 dB, γ ¯ D D = 5 dB.
Figure 3. P o u t vs. R s with different γ ¯ S D and η . γ S = 30 dB, γ ¯ S E = 10 dB, γ ¯ D E = 10 dB, γ ¯ D D = 5 dB.
Sensors 18 00331 g003
Figure 4. P o u t vs. γ S with various R s . γ ¯ S D = 10 dB, γ ¯ S E = 10 dB, γ ¯ D E = 10 dB, γ ¯ D D = 5 dB, η = 0.8 .
Figure 4. P o u t vs. γ S with various R s . γ ¯ S D = 10 dB, γ ¯ S E = 10 dB, γ ¯ D E = 10 dB, γ ¯ D D = 5 dB, η = 0.8 .
Sensors 18 00331 g004
Figure 5. P o u t vs. R s with different γ S and η . γ S = 30 dB, γ ¯ S D = 10 dB, γ ¯ S E = 10 dB, γ ¯ D E = 10 dB, γ ¯ D D = 5 dB.
Figure 5. P o u t vs. R s with different γ S and η . γ S = 30 dB, γ ¯ S D = 10 dB, γ ¯ S E = 10 dB, γ ¯ D E = 10 dB, γ ¯ D D = 5 dB.
Sensors 18 00331 g005
Table 1. Working mode of the sensors and antennas ( i , j { 1 , 2 } ) .
Table 1. Working mode of the sensors and antennas ( i , j { 1 , 2 } ) .
SensorAntennaWorking Mode
D i D i , j Information receiving
D i , 3 j Energy harvesting
D 3 i D 3 i , j Zero-forcing jamming
D 3 i , 3 j

Share and Cite

MDPI and ACS Style

Tang, X.; Cai, Y.; Yang, W.; Yang, W.; Chen, D.; Hu, J. Secure Transmission of Cooperative Zero-Forcing Jamming for Two-User SWIPT Sensor Networks. Sensors 2018, 18, 331. https://doi.org/10.3390/s18020331

AMA Style

Tang X, Cai Y, Yang W, Yang W, Chen D, Hu J. Secure Transmission of Cooperative Zero-Forcing Jamming for Two-User SWIPT Sensor Networks. Sensors. 2018; 18(2):331. https://doi.org/10.3390/s18020331

Chicago/Turabian Style

Tang, Xuanxuan, Yueming Cai, Wendong Yang, Weiwei Yang, Dechuan Chen, and Junquan Hu. 2018. "Secure Transmission of Cooperative Zero-Forcing Jamming for Two-User SWIPT Sensor Networks" Sensors 18, no. 2: 331. https://doi.org/10.3390/s18020331

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop