期刊文献+
共找到1篇文章
< 1 >
每页显示 20 50 100
Adaptive Secure Transmission for Wireless Powered Communication Networks 被引量:1
1
作者 Yong Wang Weiwei Yang +3 位作者 Tao Zhang Yong Chen Xiaohui Shang Quan Wang 《China Communications》 SCIE CSCD 2021年第3期155-173,共19页
This paper investigates secure transmission in a wireless powered communication network(WPCN)with an energy harvesting(EH)source configured with multiple antennas.In the WPCN,the EH source harvests energy from the rad... This paper investigates secure transmission in a wireless powered communication network(WPCN)with an energy harvesting(EH)source configured with multiple antennas.In the WPCN,the EH source harvests energy from the radio frequency(RF)signals broadcasted by a power beacon(PB),and purely relies on the harvested energy to communicate with the destination in the presence of passive eavesdroppers.It is noteworthy that the RF-EH source is equipped with a finite energy storage to accumulate the harvested energy for the future usage.Moreover,due to energy-constraint and complexitylimitation,the multi-antenna source is only configured with a single RF-chain.To enhance the security for the WPCN,we propose two adaptive transmission schemes,i.e.,energy-aware transmit antenna selection(EATAS)and energy-aware differential spatial modulation(EADSM).According to the energy status and the channel quality,the source adaptively decides whether to transmit confidential information or harvest RF energy.To evaluate the secrecy performance of the proposed schemes,we first study the evolution of the energy storage,and then derive the analytical expressions of connection outage probability(COP),secrecy outage probability(SOP)and efficient secrecy throughput(EST).Numerical results demonstrate that our proposed schemes outperform the existing schemes,i.e.,time-switching based TAS(TS-TAS)Received:May 19,2020 Revised:Sep.13,2020 Editor:Deli Qiao and accumulate-then-transmit(ATT).And,increasing the transmit power of the PB or the capacity of the source’s energy storage is helpful to improve the secrecy performance.Moreover,there exists an optimal transmission rate for each proposed scheme to achieve best secrecy performance. 展开更多
关键词 physical layer security energy harvesting markov chain transmit antenna selection differential spatial modulation
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部