Skip to main content
Sensors (Basel, Switzerland) logoLink to Sensors (Basel, Switzerland)
. 2018 Jan 24;18(2):331. doi: 10.3390/s18020331

Secure Transmission of Cooperative Zero-Forcing Jamming for Two-User SWIPT Sensor Networks

Xuanxuan Tang 1, Yueming Cai 1,*, Wendong Yang 1, Weiwei Yang 1, Dechuan Chen 1, Junquan Hu 1
PMCID: PMC5856085  PMID: 29364185

Abstract

In this paper, the secrecy performance of the two-user simultaneous wireless information and power transfer (SWIPT) sensor networks is studied and a novel secure transmission scheme of cooperative zero-forcing (ZF) jamming is proposed. The two sensors opportunistically conduct the SWIPT and cooperative ZF jamming, respectively, where the energy required for jamming the eavesdropper is provided by the SWIPT operation so as to keep the energy balance at the sensors in the long run. By deriving the exact closed-form expressions of the secrecy outage probability and the secrecy throughout, we provide an effective approach to precisely assess the impacts of key parameters on the secrecy performance of the system. It has been shown that the secrecy outage probability is a monotonically increasing function of the growth of secrecy rate (Rs), and a monotonically decreasing function of the increase of the transmit signal-to-noise ratio (γS), and energy conversion efficiency (η). Furthermore, the secrecy throughput could be enhanced when η increases, which becomes especially obvious when a large γS is provided. Moreover, the existence of an optimum Rs maximizing the secrecy throughput is depicted, which also grows with the increase of γS. Simulations are provided for the validation of the analysis.

Keywords: physical layer security, zero-forcing jamming, secrecy outage probability, secrecy throughput, wireless sensor networks

1. Introduction

Because of the broadcast nature of wireless medium, it is a critical issue to secure the transmission in the design of wireless sensor networks [1]. The security is conventionally tackled through higher layer techniques, e.g., cryptographic protocols, which, however, could not guarantee the required security level alone for the large-scale wireless sensor networks due to the significant increase in the complexity of key distribution and management [2]. In contrast to conventional cryptographic approaches conducted at higher layers, the physical layer security (PLS) tries to secure the wireless networks against eavesdropping by exploiting the inherent channel randomness at the physical layer. Hence, PLS has been widely regarded as an effective supplementary protocol for wireless communications and, thus, has gained much attention in research communities [3,4,5].

The main idea of PLS is that, by making and enlarging the capacity differences between the legitimate channels and the wiretapping channels, the information could be transmitted at a predefined secrecy rate so that only the authorized receiver can decode the data while the eavesdropper could not [6]. Various advanced techniques have been proposed to further enhance the potential benefits of PLS, such as antenna selection [7], cooperative relaying [8], cooperative jamming [9], etc. Generally speaking, the security of wireless transmission could be significantly increased if jamming signals could be carefully exploited in the legitimate network. As a consequence, the cooperative jamming has been widely applied in the PLS research in numerous systems, such as single-input-multiple-output (SIMO) networks [10], two-way relay scenarios [11], multiple-input-multiple-output (MIMO) wiretap-channel settings [12], etc.

More recently, the simultaneous wireless information and power transfer (SWIPT) has become an appealing technique in wireless communications due to its great potential in tackling the energy bottleneck issue, especially in some energy-constrained cases [13,14,15]. Authors in [16] investigated the safeguarding approach for SWIPT systems with both the eavesdropper and the friendly jammer harvesting energy from the wireless signals, and the optimal power allocation strategy based on the Lagrange method was then proposed. In [17], a cooperative jamming aided robust secure transmission for SWIPT multiple-input-single-output (MISO) networks was presented, where the objective of the source and the jammer was to maximize the secrecy rate and also supply wireless power to the energy receiver and the destination. However, an additional jammer must be deployed in literature [16,17], which is practically costly in the construction and upgrading of current wireless systems, especially in the wireless sensor networks.

There has been some research investigating the security issue of scenarios where no additional jammer is available and the user harvests the energy and also acts as the jammer itself [18,19,20]. Work [18] studied the secrecy performance of full-duplex SWIPT networks, where the two-antenna user received information and energy with one of its antennae by applying the power-splitting SWIPT protocol, and sent the jamming signal to confuse the eavesdropper with the other antenna. Under a similar system of deployment, the security of the time-switching SWIPT protocol was examined in [19], where the secrecy outage performance and the secrecy energy efficiency were formulated. The author in [20] extended the research in the cognitive networks, where the energy collected by the receiving antenna via the power-splitting SWIPT protocol was used for producing jamming signals by the transmitting antenna. However, the shortage of [18,19,20] is obvious. On the one hand, an effective self-interference cancellation (SIC) method at the users is required to guarantee the validity of the secure schemes, as the users in this literature all work in the full-duplex mode. On the other hand, both the power-splitting and the time-switching approaches applied in these literature will definitely increase the complexity of realization significantly. As a result, the practical value of these schemes in wireless sensor networks is greatly limited.

Motivated by the above observations, we present a novel secure transmission scheme for the proposed two-user SWIPT sensor networks where the two sensors conduct the cooperative zero-forcing (ZF) jamming opportunistically and mutually with the harvested energy. We note that the proposed two-user cooperative pair model is rather practical because each sensor in actual sensor networks can choose another sensor nearby to form this pair and then conduct cooperative jamming in turn. It is also highlighted that the sensors are generally energy-constrained, which again reveals the advantage of the proposed cooperative jamming scheme because it does not consume any energy of the sensors in the long run due to the SWIPT operation. Furthermore, neither the full-duplex and SIC techniques nor the power-splitting and time-switching methods are needed in the proposed scheme, which is of great benefit in practical realization. The remainder of the work is organized as follows: Section 2 characterizes the system model and presents the secure transmission scheme. In Section 3, the exact secrecy analysis of the proposed scheme is carried out. Section 4 conducts the simulations and gives the discussions. Finally, Section 5 summarizes the whole paper.

Notation: Throughout this paper, the boldface uppercase letters are used to denote matrices or vectors. ·T and ·H are denoted as the transpose operation and the conjugate transpose operation, respectively. Fγ· and fγ· represent the cumulative distribution function (CDF) and the probability density function (PDF) of random variable γ, respectively. E[·] denotes the expectation operation.

2. System Model

2.1. System Description

We consider a downlink SWIPT sensor network as illustrated in Figure 1, which consists of a source node S, a pair of two sensor nodes D1 and D2, and an eavesdropper E. All nodes are equipped with a single antenna, except for the two sensors, which both have only two antennae without having to increase too much complexity of realization [19,20]. In addition, we assume that the channel state information (CSI) of the legitimate links is available, while the CSI of the eavesdropping link is not known by the legitimate nodes. This is a typical passive eavesdropping scenario which is more practical than active eavesdropping [21] and has been widely used in existing literature (see [22,23,24] and the references therein). It is also assumed that all the channels between two nodes experience quasi-static Rayleigh fading, such that the channel coefficients keep constant during a packet time T0 but vary independently from one packet time to another. Furthermore, all the channels of SDi,j and Di,jE are assumed to be independent and identically distributed (i.i.d), respectively.

Figure 1.

Figure 1

System model.

2.2. Secure Transmission

At each slot, the specific antenna of a certain sensor that maximizes the instantaneous transmission channel capacity is chosen for information receiving (IR). At the same time, the remaining antenna of the selected sensor will be assigned for energy harvesting (EH). In addition, the jamming operation is introduced in order to enhance the security of the transmission. More specifically, the cooperative ZF jamming is applied in this paper by the other sensor, so that the IR process is not interfered.

Without loss of generality, we assume that the Di,j is selected in a certain slot, namely

i,j=argmaxi,j1,2gSDi,j, (1)

where g.=h.2 , and hSDi,j represents the channel coefficient between S and the j-th antenna of i-th sensor. At the same time, the antenna Di,3j is allocated for collecting energy, and the other sensor D3i is assigned to produce ZF jamming signals in order to increase the security of the transmission. As described above, we can summarize the working mode of all the antennae when Di,j is determined, which is shown in Table 1 for the better readability.

Table 1.

Working mode of the sensors and antennas (i,j{1,2}).

Sensor Antenna Working Mode
Di Di,j Information receiving
Di,3j Energy harvesting
D3i D3i,j Zero-forcing jamming
D3i,3j

As a result, the signals for IR and EH can be given by Labels (2) and (3), respectively,

yDi,j=PJhD3iDi,jHwZFxJ+PShSDi,jxS+nDi,j, (2)
yDi,3j=PJhD3iDi,3jHwZFxJ+PShSDi,3jxS+nDi,3j, (3)

where PS and PJ represent the transmit power of S and the jamming power of sensors, hD3iDi,j, hD3iDi,3jC2×1 represent the channel coefficient vectors from D3i to Di,j and Di,3j, respectively. xS and xJ denote the information-bearing signal and the jamming signal, na is the additive white Gaussian noise (AWGN) at node a with aDi,j, i,j1,2. Without loss of generality, the noise power spectral density is assumed the same everywhere within the network and is denoted as N0, and wZF is the normalized vector of the jamming operation.

Now, we will focus on the derivation of wZF. As pointed out previously, the jamming operation is introduced to increase the security of the transmission. Therefore, three purposes are expected to be achieved by this jamming operation. Firstly, the jamming operation will not affect the receiving performance of the legitimate information receiver. Secondly, the interference received at the eavesdropper should be maximized, so that the eavesdropper is confused as much as possible. Thirdly, the interference received at the legitimate energy receiver should be maximized, so that the legitimate energy receiver could collect as much energy as possible from the jamming signal. Mathematically, the above three ideas can be achieved by Equations (4)–(6), respectively,

hD3iDi,jHwZF=0, (4)
maxwZFhD3iEHwZF, (5)
maxwZFhD3iDi,3jHwZF, (6)

where hD3iEC2×1 represents the channel coefficient vector from D3i to E. In addition, recall that the jamming vector is normalized, hence we have

wZF=1. (7)

Unfortunately, due to the passive eavesdropping assumption, the eavesdropper’s CSI, hD3iEH, is unavailable at the legitimate network, thus it is not possible to maximize the confusing effect to the eavesdropper. As a result, we will try to find an appropriate wZF so that Labels (4), (6), and (7) are all satisfied, namely

maxwZFhD3iDi,3jHwZFs.t.hD3iDi,jHwZF=0,wZF=1. (8)

According to [25,26], the solution of Label (8) can be given by

wZF=ThD3iDi,3jThD3iDi,3j, (9)

where T is the projection idempotent matrix with rank 1, which is given by

T=IhD3iDi,jhD3iDi,jHhD3iDi,j1hD3iDi,jH. (10)

It is easy to see from Labels (9) and (10) that wZF is chosen from the null space of the channel direction of hD3iDi,j so that the information receiving process is not interfered [27,28].

As can be observed, the CSI knowledge is required for both the selection process and ZF jamming operation. Now, we will elaborate on how this knowledge is obtained. As shown in Figure 2, each time slot could be divided into two parts, namely the pilot duration and the transmission duration. In order to select the best antenna for IR, the antenna Di,j (i,j{1,2}) will send pilot signals during its pilot duration Pi,j, which can be exploited for channel estimation by S and the other sensor, which acts as a jammer. Hence, S is able to obtain the knowledge of hSDi,j for user/antenna selection, and the sensor that acts as jammer can derive the knowledge of hD3iDi,3j and hD3iDi,j to construct the ZF jamming vector.

Figure 2.

Figure 2

Time slot structure for user/antenna selection.

According to Labels (2) and (8), the receiving signal-to-noise ratio (SNR) for information receiving is given by

γD=PSN0maxi,j1,2gSDi,j. (11)

At the same time, the amount of collected energy is expressed as

εD=ηT0yDi,3j2, (12)

and denoting U=hD3iDi,3jHwZF. According to (Lemma 2 [25]), (Lemma 2 [26]), (Equation (30) [27]), (Equation (52) [28]), the CDF of U=hD3iDi,3jHwZF is a chi-square random variable with 2(Ls1) degrees of freedom, namely U ~ χ22Ls1, where Ls represents the number of ZF antennae. In this paper, we have Ls=2. Hence, U ~ χ22, which degenerates into exponentially distributed random variables, namely we have

fUu=1γ¯DDeuγ¯DD, (13)

where γ¯ab=Egab represents the average channel gain of link ab, a,bϵS,D,E. Specifically, γ¯DD represents the average channel gain between the two sensors. By using the above result, Equation (12) can be readily calculated as (We note that little energy can be harvested from the AWGN in practice, hence is neglected in this paper [14,29].)

εD=ηT0PShSDi,3j2+PJhD3iDi,3jHwZF2, (14)

where η is the energy conversion efficiency. Hence, in order to keep the energy balance at the sensors in the long run, the jamming power can be chosen as (We note that an energy outage would occur by adopting the approach in this paper. Although the probability to occur this can be proven to be very low by the simulations when an appropriate initial energy can be provided, it still should be considered for accurate analysis. In fact, by modeling battery as an energy queue would be a good method to give out the accurate analysis, which however is beyond the scope of this paper and is left for the research in the future.)

PJ=EεDT0=ηPSγ¯SD+PJγ¯DD. (15)

It is readily to know that Label (15) yields to

PJ=ηγ¯SDPS1ηγ¯DD. (16)

Similarly, the receiving signal at E is expressed as

yE=PShSExS+PJhD3iEHwZFxJ+nE. (17)

Thus, the receiving signal-to-interference-plus-noise ratio (SINR) at E is given by

γE=PSgSEPJhD3iEHwZF2+N0. (18)

3. Secrecy Performance Analysis

In this section, we focus our attention on the secrecy performance of the proposed scheme. Before delving into the details, we present the preliminary of the following two lemmas.

Lemma 1.

The CDF and the PDF of γD are given by

FγDx=1eN0xPSγ¯SD4, (19)
fγDx=4N0PSγ¯SDk=033k1kek+1N0xPSγ¯SD. (20)

Proof. 

According to Label (11) and referring to [5], Equation (19) is readily obtained. By taking the derivation operation, the PDF of γD is derived as

fγDx=4N0PSγ¯SD1eN0xPSγ¯SD3eN0xPSγ¯SD. (21)

By using the binomial theorem (Equation (1.111) [30]) in Label (21), the result in Label (20) is readily obtained. ☐

Lemma 2.

The CDF and PDF of γE are given by

FγEx=1PSγ¯SEPJγ¯DEx+PSγ¯SEeN0xPSγ¯SE, (22)
fγEx=PSγ¯SEPJγ¯DEPJγ¯DEx+PSγ¯SE2eN0xPSγ¯SE+N0PJγ¯DEx+PSγ¯SEPJγ¯DEx+PSγ¯SE2eN0xPSγ¯SE. (23)

Proof. 

Mathematically, the CDF of γE can be manipulated as FγEx=PrγE<x, which can be rewritten as Label (24) according to Label (18)

FγEx=0FgSEPJv+N0xPSfVvdv, (24)

where V=hD3iEHwZF2. As shown in Label (8), wZF=[w1,w2]T is a normalized vector, i.e., w12+w22=1. Thus, hD3iEHwZF is a unitary transformation of hD3iEH. In addition, it is obvious that wZF is independent of hD3iEH, and the two elements of hD3iEH, namely hD3i,1E and hD3i,2E are both Gaussian variables. In other words, we have hD3i,1E,hD3i,2EN0,γ¯DE. Therefore, w1hD3i,1EN0,w12γ¯DE and w2hD3i,2EN0,w22γ¯DE can be concluded. Hence, (w1hD3i,1E+w2hD3i,2E)N0,w12+w22γ¯DE=N0,γ¯DE, which means that V=w1hD3i,1E+w2hD3i,2E2 is also an exponentially distributed random variables with the mean of γ¯DE. We note that V has the same distribution with hD3i,1E and hD3i,2E, and this has verified the conclusion that the unitary transformation does not change the distribution of the transformed variables. As a result, we have

fVv=1γ¯DEevγ¯DE. (25)

In addition, the CDF of gSE is given by

FgSEx=1exγ¯SE. (26)

Substituting Labels (25) and (26) into Label (24) and after some calculations, the CDF of γE is easily obtained as in Label (22). By taking the derivation operation in Label (22), we finally derive the result in Label (23). ☐

3.1. Secrecy Outage Probability

The secrecy outage probability is defined as the probability that the instantaneous secrecy capacity falls below a predefined secrecy rate Rs (The design of Rs falls into the construction of the wiretap coding, which has been elaborated abundantly in the literature [31,32], and thus is omitted in this paper.), which can be equivalently expressed as [5,28]

Pout=0FγDγths+γthsy1fγEydy, (27)

where γths=2Rs.

Theorem 1.

The secrecy outage probability for the proposed system is given by

Poutγths=k=044k1kekN0γths1PSγ¯SDI1,k+I2,k, (28)

where

I1,k=1+N0PJγ¯DEγ¯SDγ¯SD+kγthsγ¯SEexp(N0γ¯SD+kN0γthsγ¯SEPJγ¯DEγ¯SD)EiN0γ¯SD+kN0γthsγ¯SEPJγ¯DEγ¯SD, (29)
I2,k=N0PJγ¯DEexpN0γ¯SD+kN0γthsγ¯SEPJγ¯DEγ¯SDEiN0γ¯SD+kN0γthsγ¯SEPJγ¯DEγ¯SD. (30)

Proof. 

Replacing x with (γths+γthsy1) in Label (19), we derive

FγDγths+γthsy1=1expN0γths+γthsy1PSγ¯SD4. (31)

With the help of binomial theorem, Label (31) can be rewritten as

FγDγths+γthsy1=k=044k1kexpkN0γths+γthsy1PSγ¯SD. (32)

By substituting Labels (23) and (32) into Label (27), and letting t=y1γthsγths, we obtain

Pout=k=044k1kexpkN0γths1PSγ¯SDI1,k+I2,k, (33)

where

I1,k=0PSγ¯SEPJγ¯DEPJγ¯DEy+PSγ¯SE2expN0γ¯SD+kN0γthsγ¯SEPSγ¯SEγ¯SDydy, (34)
I2,k=0N0PJγ¯DEy+PSγ¯SEexpN0γ¯SD+kN0γthsγ¯SEPSγ¯SEγ¯SDydy. (35)

By using 0epxepxa+x2a+x2dx=peapEiap+11aa (Equation (3.353.3) [30]), Label (34) leads to Label (29). Similarly, by using 0eμxeμxx+βx+βdx=eβμEiβμ (Equation (3.352.4) [30]), Label (35) results in Label (30). ☐

3.2. Secrecy Throughput

The secrecy throughput can be defined as the secrecy rate multiplied by the probability of a reliable and secure transmission, which is mathematically written as [33]

ς=Rs1Pout. (36)

By substituting the result in Theorem 1 into Label (36), the secrecy throughput can be easily deduced.

4. Simulation Results and Discussion

In this section, some representative simulations are provided to examine the impacts of the system parameters on the cooperative zero-forcing jamming scheme for the two-user SWIPT networks. The transmit SNR is defined as γS=PS/N0. As can be readily observed, the theoretical results are in exact agreement with the simulations, validating the correctness of the analysis. Without loss of generality, we set N0=1.

Figure 3 illustrates the secrecy outage probability Pout versus the secrecy rate Rs with different γ¯SD and η. As it is shown, the secrecy outage probability monotonically increases with the growth of Rs. In addition, we see from Figure 3 that larger γ¯SD and η both lead to a better secrecy outage performance. It is not difficult for comprehension because a larger secrecy rate is much harder to support for a given channel condition, thus leading to a greater secrecy outage. In addition, a larger γ¯SD indicates a greater amount of harvested energy and a better receiving SNR performance at the receiver. In other words, by increasing γ¯SD, the receiving SNR performance at the receiver is promoted while the receiving SNR performance at the eavesdropper becomes poor because a larger jamming power could be provided. Furthermore, although it is not a benefit to the receiver by increasing η, it still improves the amount of harvested energy, and thus can confuse the eavesdropper better. Therefore, increasing γ¯SD and η both contribute to a better secrecy outage performance.

Figure 3.

Figure 3

Pout vs. Rs with different γ¯SD and η. γS=30 dB, γ¯SE=10 dB, γ¯DE=10 dB, γ¯DD=5 dB.

Figure 4 plots the secrecy outage probability Pout versus the transmit SNR γS for various Rs. As can be seen, the secrecy outage probability is a monotonically increasing function with Rs, which coincides with the finding in Figure 3. In addition, a lower secrecy outage probability is observed when a larger γS is provided, regardless of the value of Rs. As a matter of fact, the changing of γS will have two effects on the performance. On the one hand, increasing γS will benefit the receiving performance of both the receiver’s and the eavesdropper’s. One the other hand, the performance of the eavesdropper will be degraded by the jamming operation while the performance of the information receiver will not. We note that, when a larger γS is provided, the confusing effect to the eavesdropper will become better because more energy will be harvested, so that the user can jam the eavesdropper at a greater power. Overall, the receiving performance of the information receiver is much more improved than that of the eavesdropper. Therefore, the secrecy outage probability becomes a decreasing function with γS.

Figure 4.

Figure 4

Pout vs. γS with various Rs. γ¯SD=10 dB, γ¯SE=10 dB, γ¯DE=10 dB, γ¯DD=5 dB, η=0.8.

Figure 5 compares the secrecy throughput ς versus the secrecy rate Rs with different γS and η. It is shown that the secrecy throughput improves significantly when a larger γS is provided. Moreover, it is also beneficial to boost the secrecy throughput if η could be increased. In addition, this is especially useful in the high SNR region, as the enhancement of secrecy throughput is much more notable when γS is large. Furthermore, it is noted that the variation tendency of the secrecy throughput in each line indicates the existence of an optimum Rs which can maximize the secrecy throughput. This phenomenon is comprehensible. On the one hand, increasing Rs will directly contribute to the enhancement of secrecy throughput, as more secrecy message is transmitted. On the other hand, a larger secrecy rate will also lead to a greater secrecy outage probability, which will result in the decline of the secrecy throughput. As a result, an optimum Rs that maximizes the secrecy throughput is observed.

Figure 5.

Figure 5

Pout vs. Rs with different γS and η. γS=30 dB, γ¯SD=10 dB, γ¯SE=10 dB, γ¯DE=10 dB, γ¯DD=5 dB.

5. Conclusions

This paper presented a novel secure transmission scheme for the two-user SWIPT sensor networks where the cooperative zero-forcing jamming was conducted to confuse the eavesdropper. It is highlighted that the cooperative jamming does not require any energy of the sensors due to the SWIPT operation, and thus can be well applied to the energy-constrained wireless sensor networks. The exact closed-form expressions of the secrecy outage probability and the secrecy throughout were derived, which depicted the impacts of the system parameters on the system secrecy performance intuitively. The results illustrated that the secrecy outage probability monotonically increases with the growth of Rs, and monotonically decreases with the increase of γS and η. Moreover, the secrecy throughput could be further boosted if η increases, which is especially notable when γS is large enough. In addition, it was indicated that an optimum value of Rs maximizing the secrecy throughput exists, which also grows with the increase of γS. All of the findings are of great importance in guiding the secure design of practical wireless sensor networks.

Acknowledgments

This work was supported by the National Natural Science Foundation of China under Grant Nos. 61771487, 61471393, and 61371122. The authors would like to extend their gratitude to the anonymous reviewers for their valuable and constructive comments, which have largely improved and clarified this paper.

Author Contributions

Xuanxuan Tang, Yueming Cai, Wendong Yang and Weiwei Yang conceived of the main proposal of the secure transmission schemes, conducted system modeling, and derived analysis and numerical simulation of the proposed schemes. Xuanxuan Tang and Yueming Cai wrote the manuscript. Dechuan Chen and Junquan Hu provided considerable comments and technique review of the proposed scheme and contributed to the revision of the paper. Yueming Cai read and approved the final manuscript.

Conflicts of Interest

The authors declare no conflict of interest.

References

  • 1.Zheng J., Cai Y., Shen X., Zheng Z., Yang W. Green energy optimization in energy harvesting wireless sensor networks. IEEE Commun. Mag. 2015;53:150–157. doi: 10.1109/MCOM.2015.7321985. [DOI] [Google Scholar]
  • 2.Hu J., Yang W., Yang N., Zhou X., Cai Y. On-off-based secure transmission design with outdated channel state information. IEEE Trans. Veh. Technol. 2016;65:6075–6088. doi: 10.1109/TVT.2015.2477427. [DOI] [Google Scholar]
  • 3.Mukherjee A., Fakoorian S.A.A., Huang J., Swindlehurst A.L. Principles of physical layer security in multiuser wireless networks: A survey. IEEE Commun. Surv. Tutor. 2014;16:1550–1573. doi: 10.1109/SURV.2014.012314.00178. [DOI] [Google Scholar]
  • 4.Yang N., Wang L., Geraci G., Elkashlan M., Yuan J., Renzo M.D. Safeguarding 5G wireless communication networks using physical layer security. IEEE Commun. Mag. 2015;53:20–27. doi: 10.1109/MCOM.2015.7081071. [DOI] [Google Scholar]
  • 5.Tang X., Cai Y., Huang Y., Duong T.Q., Yang W., Yang W. Secrecy outage analysis of buffer-aided cooperative MIMO relaying systems. IEEE Trans. Veh. Technol. 2017 doi: 10.1109/TVT.2017.2695500. [DOI] [Google Scholar]
  • 6.Chen G., Gong Y., Xiao P., Chambers J.A. Physical layer network security in the full-duplex relay system. IEEE Trans. Inf. Forensics Secur. 2015;10:574–583. doi: 10.1109/TIFS.2015.2390136. [DOI] [Google Scholar]
  • 7.Hu J., Cai Y., Yang N., Yang W. A new secure transmission scheme with outdated antenna selection. IEEE Trans. Inf. Forensics Secur. 2015;10:2435–2446. doi: 10.1109/TIFS.2015.2464703. [DOI] [Google Scholar]
  • 8.Zou Y., Wang X., Shen W. Optimal relay selection for physical-layer security in cooperative wireless networks. IEEE J. Sel. Areas Commun. 2013;31:2099–2111. doi: 10.1109/JSAC.2013.131011. [DOI] [Google Scholar]
  • 9.Yang M.Q., Zhang B.N., Huang Y.Z., Yang N., Guo D.X., Gao B. Secure multiuser communications in wireless sensor networks with TAS and cooperative jamming. Sensors. 2016;16:1908. doi: 10.3390/s16111908. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 10.Wang C., Wang H.M., Xia X.G., Liu C. Uncoordinated jammer selection for securing SIMOME wiretap channels: A stochastic geometry approach. IEEE Trans. Wirel. Commun. 2015;14:2596–2612. doi: 10.1109/TWC.2015.2389821. [DOI] [Google Scholar]
  • 11.Zhang R., Song L., Han Z., Jiao B. Physical layer security for two-way untrusted relaying with friendly jammers. IEEE Trans. Veh. Technol. 2012;61:3693–3704. doi: 10.1109/TVT.2012.2209692. [DOI] [Google Scholar]
  • 12.Yun S., Park J., Im S., Ha J. On the secrecy rate of artificial noise assisted MIMOME channels with full-duplex receiver; Proceedings of the IEEE Wireless Communications and Networking Conference; San Francisco, CA, USA. 19–22 March 2017; pp. 1–6. [Google Scholar]
  • 13.Liu H., Kim K.J., Kwak K.S., Poor H.V. Power splitting-based SWIPT with decode-and-forward full-duplex relaying. IEEE Trans. Wirel. Commun. 2016;15:7561–7577. doi: 10.1109/TWC.2016.2604801. [DOI] [Google Scholar]
  • 14.Zhou X. Training-based SWIPT: Optimal power splitting at the receiver. IEEE Trans. Veh. Technol. 2015;64:4377–4382. doi: 10.1109/TVT.2014.2364196. [DOI] [Google Scholar]
  • 15.Krikidis I., Timotheou S., Nikolaou S., Zheng G., Ng D.W.K., Schober R. Simultaneous wireless information and power transfer in modern communication systems. IEEE Commun. Mag. 2014;52:104–110. doi: 10.1109/MCOM.2014.6957150. [DOI] [Google Scholar]
  • 16.Liu M., Liu Y. Power allocation for secure SWIPT systems with wireless-powered cooperative jamming. IEEE Commun. Lett. 2017;21:1353–1356. doi: 10.1109/LCOMM.2017.2672660. [DOI] [Google Scholar]
  • 17.Zhang Q., Huang X., Li Q., Qin J. Cooperative jamming aided robust secure transmission for wireless information and power transfer in MISO channels. IEEE Trans. Commun. 2015;63:906–915. doi: 10.1109/TCOMM.2015.2405063. [DOI] [Google Scholar]
  • 18.Tang X., Yang W., Cai Y., Yang W., Cao K., Yuan P. Secrecy analysis of full-duplex power-splitting SWIPT networks with artificial noise; Proceedings of the International Workshop on Computer Science and Engineering; Beijing, China. 25–27 June 2017; pp. 950–955. [Google Scholar]
  • 19.Yang W., Mou W., Xu X., Yang W., Cai Y. Energy efficiency analysis and enhancement for secure transmission in SWIPT systems exploiting full duplex techniques. IET Commun. 2016;10:1712–1720. doi: 10.1049/iet-com.2015.1147. [DOI] [Google Scholar]
  • 20.Zhang J., Pan G., Wang H.M. On physical-layer security in underlay cognitive radio networks with full-duplex wireless-powered secondary system. IEEE Access. 2016;4:3887–3893. doi: 10.1109/ACCESS.2016.2591782. [DOI] [Google Scholar]
  • 21.Zhou X., Maham B., Hjorungnes A. Pilot contamination for active eavesdropping. IEEE Trans. Wirel. Commun. 2012;11:903–907. doi: 10.1109/TWC.2012.020712.111298. [DOI] [Google Scholar]
  • 22.Wang H.M., Zheng T., Mu P. Secure MISO wiretap channels with multi-antenna passive eavesdropper via artificial fast fading; Proceedings of the IEEE International Conference on Communications; Sydney, NSW, Australia. 10–14 June 2014; pp. 5396–5401. [Google Scholar]
  • 23.Hu J., Yang N., Zhou X., Yang W., Cai Y. A versatile secure transmission strategy in the presence of outdated CSI. IEEE Trans. Veh. Technol. 2016;65:10084–10090. doi: 10.1109/TVT.2016.2550032. [DOI] [Google Scholar]
  • 24.Bi Y., Chen H. Accumulate and jam: Towards secure communication via a wireless-powered full-duplex jammer. IEEE J. Sel. Top. Signal Process. 2016;10:1538–1550. doi: 10.1109/JSTSP.2016.2600523. [DOI] [Google Scholar]
  • 25.Afana A., Asghari V., Ghrayeb A., Affes S. On the performance of cooperative relaying spectrum-sharing systems with collaborative distributed beamforming. IEEE Trans. Commun. 2014;62:857–871. doi: 10.1109/TCOMM.2014.032014.130399. [DOI] [Google Scholar]
  • 26.Afana A., Asghari V., Ghrayeb A., Affes S. Cooperative relaying in spectrum-sharing systems with beamforming and interference constraints; Proceedings of the 2012 IEEE 13th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC); Cesme, Turkey. 17–20 June 2012; pp. 429–433. [Google Scholar]
  • 27.Zhang T., Cai Y., Huang Y., Duong T.Q., Yang W. Secure full-duplex spectrum-sharing wiretap networks with different antenna reception schemes. IEEE Trans. Commun. 2017;65:335–346. doi: 10.1109/TCOMM.2016.2625257. [DOI] [Google Scholar]
  • 28.Zhang T., Huang Y., Cai Y., Zhong C., Yang W., Karagiannidis G. Secure multi-antenna cognitive wiretap networks. IEEE Trans. Veh. Technol. 2017;66:4059–4072. doi: 10.1109/TVT.2016.2609396. [DOI] [Google Scholar]
  • 29.Zeng Y., Zhang R. Full-duplex wireless-powered relay with self-energy recycling. IEEE Wirel. Commun. Lett. 2015;4:201–204. doi: 10.1109/LWC.2015.2396516. [DOI] [Google Scholar]
  • 30.Gradshteyn I.S., Ryzhik I.M. Table of Integrals, Series, and Products. 7th ed. Elsevier/Academic Press; Amsterdam, The Netherlands: 2007. [Google Scholar]
  • 31.Xu X., Yang W., Cai Y., Jin S. On the secure spectral-energy efficiency tradeoff in random cognitive radio networks. IEEE J. Sel. Areas Commun. 2016;34:2706–2722. doi: 10.1109/JSAC.2016.2605901. [DOI] [Google Scholar]
  • 32.Yan S., Yang N., Geraci G., Malaney R., Yuan J. Optimization of code rates in SISOME wiretap channels. IEEE Trans. Wirel. Commun. 2015;14:6377–6388. doi: 10.1109/TWC.2015.2453260. [DOI] [Google Scholar]
  • 33.Wang L., Cai Y., Zou Y., Yang W., Hanzo L. Joint relay and jammer selection improves the physical layer security in the face of CSI feedback delays. IEEE Trans. Veh. Technol. 2016;65:6259–6274. doi: 10.1109/TVT.2015.2478029. [DOI] [Google Scholar]

Articles from Sensors (Basel, Switzerland) are provided here courtesy of Multidisciplinary Digital Publishing Institute (MDPI)

RESOURCES