Skip to main content
Sensors (Basel, Switzerland) logoLink to Sensors (Basel, Switzerland)
. 2018 Dec 26;19(1):76. doi: 10.3390/s19010076

Secure Transmission for Simultaneous Wireless Information and Power Transfer in AF Untrusted Relay Networks

Hui Shi 1, Weiwei Yang 1,*, Dechuan Chen 2, Yunpeng Luo 1, Yueming Cai 1
PMCID: PMC6338946  PMID: 30587762

Abstract

This paper investigates secure communications of energy harvesting untrusted relay networks, where the destination assists jamming signal to prevent the untrusted relay from eavesdropping and to improve the forwarding ability of the energy constrained relay. Firstly, the source and the destination transmit the signals to the relay with maximal ratio transmission (MRT) technique or transmit antenna selection (TAS) technique. Then, the destination utilizes maximal ratio combining (MRC) technique or receive antenna selection (RAS) technique to receive the forwarded information. Therefore, four transmission and reception schemes are considered. For each scheme, the closed-form expressions of the secrecy outage probability (SOP) and the connection outage probability (COP) are derived. Besides, the effective secrecy throughput (EST) metric is analyzed to achieve a good tradeoff between security and reliability. In addition, the asymptotic performance of EST is also considered at the high signal-to-noise ratio (SNR). Finally, simulation results illustrate that: (1) the EST of the system with MRT and MRC scheme are superior to other schemes, however, in the high SNR regime, the EST of the system with MRT scheme is inferior to TAS; and (2) for the source node, there exists an optimal number of antennas to maximize the EST of the proposed schemes.

Keywords: energy harvesting, amplify-and-forward, multiple antennas, untrusted relay, outage probability, effective secrecy throughput

1. Introduction

Because of the inherent broadcasting characteristics of the wireless channel, wireless communications are vulnerable to be attacked by the eavesdroppers through the public channel. The traditional method to protect the information privacy is the assistance of upper-layer cryptographic secure schemes, which mainly depends on computation complexity. However, with the rapid advancement of the computing capability, the security of the wireless communication encounters tremendous challenges and risks. In view of this, the physical layer security (PLS) has been proposed as a complement of current cryptographic method, which takes advantage of time-varying characteristics and the randomness of the wireless channel. The research on PLS was pioneered by Wyner, who introduced the degraded wire-tap channel and gave the definition of secrecy capacity [1]. The notion of secrecy capacity measures the maximal secrecy rate at which the confidential information can be transmitted to the destination secretly and reliably [1,2,3].

Recently, cooperative communication is an effective way to extend the coverage of the transmission and to increase the secrecy capacity. The performance of the dual-hop relay network has been studied for both the single relay and multiple relays under Rayleigh fading channels in [4,5,6,7]. In [6], the authors significantly improves the security of the system with source relay selection scheme. Taking the place of full-duplex relaying, two-path successive relaying protocol is proposed to reduce the probability of being intercepted [7]. However, the relay may not be trusted, which is also a potential eavesdropper [8,9,10,11,12,13,14,15,16]. Several works about the untrusted relay has been published, where the destination node transmits the jamming signals to the untrusted relay for securing the transmissions [9,10,11,12,13,14,15]. In [16], a destination-assisted jamming scheme is put forward and the instantaneous secrecy rate is studied in multiple amplify-and-forward (AF) untrusted relay networks. In [17,18], a jamming signal is designed in a smart way. The artificial noise symbols are designed and transmitted to degrade the error probability performance [17]. The artificial noise parameter is derived for two kinds of optimal points, max-min point and single user point [18].

Ref. [19] considers an untrusted relay cognitive Internet of Things (IoT) network, where the probability of successfully secure transmission metric is investigated to evaluate the security of the network. To further improve the secrecy performance of cooperative networks, multiple antennas technique has been implemented into the system [20,21,22]. Both the source and the destination are multi-antennas, while the relay is only one antenna in the considered network [20]. Ref. [21] studies the AF multiple-input multiple-output (MIMO) system with untrusted relay; besides, both the destination and the relay are multiple antennas. In [22], a large-scale MIMO relaying system with an energy harvesting relay is investigated, and the secrecy performance of the system under imperfect channel state information (CSI) is analyzed.

Utilizing the precoding techniques could also improve the secrecy performance of the cooperative networks [23,24,25,26]. In [23], precoding at both the source and the relay scheme is proposed. To maximize the secrecy rate, the source, relay, and destination precoding matrices are jointly designed. In [24], to maximize the secrecy sum rate, the source’s signal, artificial noise precoders and the relay’s precoder, under the sources and relay transmit power constraints, are jointly designed. In [25], the authors investigates the source and relay precoders that characterizes the relationship between the achievable stored energy at the relay and the achievable source-to-destination rate. In [26], the authors examines the maximal energy efficiency by design of the optimum precoding matrices at the transceivers and the relay node as well as the optimum power splitting factor for SWIPT.

In some special application scenarios, many energy-constrained cooperative relays are configured to cover larger districts where recharging and exchanging relay batteries are not convenient and economical [27]. Energy harvesting (EH) has been developed as a promising energy source for dealing with this problem [28,29,30]. Moreover, EH and information processing simultaneously has been applied in cooperative relaying [31,32,33,34,35], where they relay harvests energy from the receipt signals and then forwards the information to the destination via the received power. To harvest energy and decode information from the received signals, the power splitting relaying (PSR) and the time switching relaying (TSR) are proposed [36,37,38]. Besides, EH is considered in energy-free Internet of Things (IoT) device within the bistatic scatter (BS) mode [39].

The effects of EH relay on the secrecy performance has been studied in [38,40,41]. In [38], the authors focuses on an AF two-way relay network employing the multiple access broadcast protocol and TSR protocol, where the legitimate communication parties are multi-antennas while the assisted relay is only one antenna. However, the communication parties adopt MRT/MRC techniques. Moreover, the relay is considered to be trusted, thus only the connection outage probability (COP) is considered for MRT/MRC techniques, and the secrecy outage probability (SOP) performance is not analyzed. The SOP and COP metrics of the system is analyzed in [40]. The SOP performance is analyzed over Nakagami-m Fading Channels [41,42]. The authors improves the harvested energy with multiple antennas, and studies the maximal harvested power by jointly different parameters [43,44,45]. The cooperative jamming is considered in [45], and the maximal secrecy rate is investigated. The author studies the secrecy transmission with the unreliable wireless backhaul link, and derives the closed-expressions for SOP ergodic secrecy rate and non-zero achievable secrecy rate to examine the effect of the backhaul reliability on the system performance [46]. However, each node is equipped with a single antenna and all relays are considered to be trusted.

Some efforts on the multi-user scenarios have been considered in [47,48,49,50]. In [47], the authors investigates the relay network consisting of a source, a set of relays and users in the presence of an eavesdropper. Each terminal is equipped with a single antenna. The cooperative beamforming and user selection techniques are applied to protect the confidential message. The secrecy rate (SR) and SOP of the network are investigated. Dong-Hua Chen et al. [48] investigates full-duplex (FD) secure transmissions with simultaneous wireless information and power transfer (SWIPT) on downlink (DL), where an FD base station, with multiple transmit antennas and multiple receive antennas, serves a group of single-antenna users on both DL and uplink (UL). The minimization of the system power under constraints on EH and security rates is examined. In [49], a MIMO relay system consists of one base station, one relay station, multiple legitimate users and malicious eavesdroppers. The system worst-case secrecy rate is maximized by jointly optimizing base station beamforming matrix, the relay station amplify-and-forward transformation matrix, and the covariance matrix of artificial noise. In [50], the authors investigates the secrecy performance of multiuser dual-hop relay networks where a base station communicates with multiple legitimate users through the assistance of a trustful regenerative relay in the presence of multiple eavesdroppers. To evaluate the secrecy performance of the considered system, two practical situations are addressed based on the availability of eavesdropper’s CSI, where the eavesdropper’s CSI is unavailable or available at the relay. The new exact and asymptotic closed form expressions for the SOP and the ergodic secrecy rate (ESR) are accordingly derived. However, the relay in the aforementioned multiple users system model is trusted.

Thus, few works have examined the SOP performance of the SWIPT untrusted relay MIMO system. Besides, the trade-off between the SOP and COP has not been studied in the above literature. Note that the SOP and COP are used for characterizing the security and reliability performance of the system, respectively. However, the SOP and COP are a pair of contradictory metrics. Thus, the trade-off between SOP and COP also deserves careful consideration. Motivated by the above, this paper concentrates on an AF untrusted relay network, where both the source and the destination are multi-antennas. To reduce the computational complexity, the relay is equipped with a single antenna. Hence, to enhance the PLS of the system, four transmission and reception schemes are considered, i.e., transmit antenna selection-receive antenna selection (TAS-RAS), maximal ratio transmission-receive antenna selection (MRT-RAS), transmit antenna selection-maximal ratio combining (TAS-MRC), and maximal ratio transmission-maximal ratio combining (MRT-MRC). The main contributions of this work can be summarized as follows.

  • The SOP and COP performance of the energy harvesting multi-antenna untrusted relay network under PSR are studied. The paper further researches on the correlation between SOP and COP using the metric of effective secrecy throughput (EST). The SOP, COP and EST expressions of closed form are orderly derived for the proposed schemes, which provide deep insights into the effect of the system performance. In addition, the signal-to-noise ratio (SNR), the antennas number at the source and other parameters were also researched.

  • When the transmit SNR goes to infinity, a comprehensive study on the asymptotic analysis of the EST was conducted to elicit the optimal energy harvesting strategy for the network. The deduced expressions and simulation results illustrate that, for the four schemes, the EST approaches to a constant at high transmit SNR. The EST of the TAS-MRC scheme is superior to the three other schemes. In addition, the effect of the power allocation coefficient, the power splitting ratio factor and the number of antennas were researched on the EST.

The remainder of the paper is organized as follows. Section 2 introduces the system model and describes TAS-RAS scheme, MRT-RAS scheme, TAS-MRC scheme and MRT-MRC scheme, respectively. Section 3 presents the SOP, COP and EST expressions of the four schemes. Besides, the asymptotic expressions of the EST at high transmit SNR are investigated. Then, simulation analyses are discussed in Section 4. Finally, Section 5 summarizes the whole paper.

2. System Model

Consider a SWIPT untrusted relay MIMO system as shown in Figure 1, which consists of a source S and a destination D, equipped with Ns and Nd antennas, respectively. An untrusted energy harvesting relay R is equipped with a single antenna. It is assumed that the perfect CSI of all channels are available [51]. Each node operates in half-duplex mode and the AF protocol is adopted. hSR denotes the Ns×1 channels vector between S and R links, and the hRD stands for the 1×Nd channels vector between R and D links. hSR* and hRD* denote channel coefficients between the source and the relay, between the relay and the destination, respectively. hSR*2 and hRD*2 represent the maximal channel gain selected from the multiple antennas, i.e., hSR*2=argmax1sNshSRs2 and hRD*2=argmax1dNdhRDd2. Then, hSR*2 and hRD*2 follow exponential distribution with means γ¯SR and γ¯RD,respectively. It is assumed that each channel is independent and identically distributed (i.i.d.) and undergoes Rayleigh fading. In addition, the channels between the relay and destination are reciprocal, i.e., hRD*=hDR* [15,16]. For simplicity, all noises are additive white Gaussian noise (AWGN) with zero mean and variance N0.

Figure 1.

Figure 1

System model.

For the PSR, the entire communication is divided into two phases. In the first phase, the source transmits the confidential information to the untrusted relay. To enhance PLS, the destination simultaneously sends the jamming signal to prevent the untrusted relay from eavesdropping the confidential information. The relay harvests energy from the information sent by the source and the jamming signal transmitted by the destination. In the second phase, the relay employs the harvested energy to forward the confidential information. The jamming signal can be eliminated via the self-interference cancellation techniques [52]. It is assumed that the harvested energy at R is divided into two proportions. The ω denotes the allocation coefficient of the harvested energy, ω0,1. The ω proportion of the harvested energy is utilized for forwarding the confidential information to D and the other proportion is used for eavesdropping and decoding consumption.

Based on different proceed strategy at S and D, the transmission and reception of four schemes in the above system are considered.

2.1. TAS-RAS Scheme

For the TAS-RAS scheme, during the first phase, S selects only a single transmit antenna from Ns antennas to send the confidential signal with power βP, where P represents the total transmitted power of the S and D, and β denotes the power allocation coefficient between S and D, where 0<β1. Concurrently, D selects a single transmit antenna from Nd antennas to transmit the jamming signal with allocated power 1βP. The signal power received by R is split into two parts. The ρ portion of the received power is used for harvesting energy, while the rest power is applied for transmitting information to D, where 0<ρ<1. Hence, the received instantaneous signal-to-interference-plus-noise rate (SINR) at R can be written as

γRTASRAS=(1ρ)βλhSR*2(1ρ)(1β)λhRD*2+1, (1)

where λ=P/N0 denotes the transmit SNR.

From Equation (1), the transmit power at R, PRTASRAS, is given by

PRTASRAS=ωηρβPhSR*2+(1β)PhRD*2, (2)

where η denotes the energy conversion efficiency factor of the harvested energy, 0<η<1, and ω denotes the allocation coefficient of the harvested energy; the ω proportion of the harvested energy is utilized for forwarding the confidential information to D.

In the second phase, R forwards the information to D with the power normalization coefficient 1/βPhSR*2+1βPhRD*2+N0. Therefore, the received instantaneous SINR of D can be calculated as

γDTASRAS=ωηρ(1ρ)βλ2hSR*2hRD*2βhSR*2+(1β)hRD*2λωηρhRD*2+1ρβhSR*2+(1β)hRD*2+1. (3)

2.2. MRT-RAS Scheme

For the MRT-RAS scheme, S firstly transmits the confidential information to R with Ns antennas to maximize SNR of the relay. At the same time, D selects a single transmit antenna from Nd antennas to transmit the jamming signal. Thus, the received instantaneous SINR of R can be written as

γRMRTRAS=(1ρ)βλhSR2(1ρ)(1β)λhRD*2+1, (4)

where 2 denotes the Frobenius norm.

The transmit power at R is denoted by PRMRTRAS, which is calculated as

PRMRTRAS=ωηρβPhSR2+(1β)PhRD*2. (5)

The R forwards the information to D with the power constraint factor 1/βPhSR2+1βPhRD*2+N0. Thus, the received instantaneous SINR of D can be written as

γDMRTRAS=ωηρ(1ρ)βλ2hSR2hRD*2βhSR2+(1β)hRD*2λωηρhRD*2+1ρβhSR2+(1β)hRD*2+1. (6)

2.3. TAS-MRC Scheme

In the TAS-MRC scheme, in the first phase, S transmits the information to R with only a single antenna. Meanwhile, D sends the jamming signal to R with Nd antennas. Hence, the received instantaneous SINR of R is given by

γRTASMRC=(1ρ)βλhSR*2(1ρ)(1β)λhRD2+1. (7)

The transmit power at R is denoted by PRTASMRC, which is written as

PRTASMRC=ωηρβPhSR*2+(1β)PhRD2. (8)

During the second phase, R forwards the received information with the power normalization coefficient 1/βPhSR*2+1βPhRD2+N0, and D adopts MRC technique to receive the information. Hence, the received instantaneous SINR of D can be calculated as

γDTASMRC=ωηρ(1ρ)βλ2hSR*2hRD2βhSR*2+(1β)hRD2λωηρhRD2+1ρβhSR*2+(1β)hRD2+1. (9)

2.4. MRT-MRC Scheme

For the MRT-MRC scheme, R firstly receives the information from S with Ns antennas and the jamming signal from D with Nd antennas, respectively. Hence, the received SINR of R can be given by

γRMRTMRC=(1ρ)βλhSR2(1ρ)(1β)λhRD2+1. (10)

The transmit power of R is denoted by PRMRTMRC, which can be expressed as

PRMRTMRC=ωηρβPhSR2+(1β)PhRD2. (11)

In the second phase, R forwards the information with the power constraint factor 1/βPhSR2+1βPhRD2+N0, and D applies MRC technique to receive the information. Therefore, the received SINR of D can be calculated as

γDMRTMRC=ωηρ(1ρ)βλ2hSR2hRD2βhSR2+(1β)hRD2λωηρhRD2+1ρβhSR2+(1β)hRD2+1. (12)

3. Performance Analysis

In this work, the wiretap codes for confidential information are assumed the fixed-rate Wyner coded strategy. Rs is the confidential information rate and R0 is the codeword transmission rate. To protect the information from eavesdropping, the redundancy rate should be positive, denoted by Re=R0Rs. On the contrary, when the channel capacity of the untrusted relay R is higher than redundancy rate, the information is unsafe, which is the definition of SOP. The SOP can be formulated as follows [53].

PSOPi=PrIRi>Re, (13)

where IRi=12log21+γRi and i is TAS-RAS scheme, MRT-RAS scheme, TAS-MRC scheme or MRT-MRC scheme. The coefficient 1/2 is due to two phases.

If the channel capacity of D is lower than R0, D is unable to decode the information correctly, and this is the definition of COP. The COP can be formulated as follows [53].

PCOPi=PrIDi<R0, (14)

where IDi=12log2(1+γDi).

SOP and COP can be used to measure the security and reliability performance, respectively. Furthermore, to comprehensively characterize the security and reliability performance, the EST is proposed in [40]. The EST is defined as the product of the secrecy rate and the probability of a successful transmission, which is given by

ζi=RsPrIRi<Re,IDi>R0. (15)

Next, we derive the exactly equations of the SOP, COP and EST of the aforementioned four transmission and reception schemes.

3.1. TAS-RAS Scheme

For the TAS-RAS scheme, let X1=hSR*2 and Y1=hRD*2. Substituting Equation (1) into Equation (13), the SOP can be calculated as

PsopTASRAS=PrIRTASRAS>Re=Pr12log21+(1ρ)βλhSR*2(1ρ)(1β)λhRD*2+1>Re=0X1bfX1x1fY1y1dx1dy1, (16)

where X1b=1βt1Y1β+t11ρβλ and t1=22R0Rs1.

Firstly, the preliminary of the following lemma is present.

Lemma 1.

The cumulative distribution function (CDF) of X1 is given by

FX1(x1)=1ex1γ¯SRNs. (17)

Proof. 

By taking the derivation operation of X1, the probability density function (PDF) of X1 is calculated as

fX1(x1)=Nsγ¯SRex1γ¯SR1ex1γ¯SRNs1. (18)

 □

Similarly, the PDF of Y1 is calculated as follows.

fY1(y1)=Ndγ¯RDey1γ¯RD1ey1γ¯RDNd1. (19)

Substituting Equations (18) and (19) into Equation (16), the SOP can be calculated as

PsopTASRAS=NsNdγ¯SRγ¯RD0X1bex1γ¯SR+y1γ¯RD1ex1γ¯SRNs11ey1γ¯RDNd1dx1dy1. (20)

After some manipulations, the SOP expression of the TAS-RAS scheme can be rewritten as

PsopTASRAS=1ns=0Nsnd=0Nd1NsnsNd1nd(1)ns+ndNdβγ¯SRet1ns(1ρ)βλγ¯SR(1β)t1nsγ¯RD+(nd+1)βγ¯SR. (21)

From Equation (21), the SOP of the TAS-RAS scheme is closely related to β and ρ. In particular, the SOP is improved when β increases from 0 to 1. This is because the allocated power for transmitting information increases when gradually increasing β, which in turn leads to the descent of transmit power for the jamming signal. Besides, the security of the system improves when ρ continuously increases. The reason is that R extracts less information from the source signal when the portion of harvested energy increases.

Substituting Equation (3) into Equation (14), the COP of the TAS-RAS scheme is given by

PcopTASRAS=PrIDTASRAS<R0Prωηρ(1ρ)βλhSR*2hRD*2ωηρhRD*2+1ρ<t2=00X1sfX1x1fY1y1dx1dy1, (22)

where X1s=t21ρβλ+t2ωηρβλY1, t2=22R01.

The approximation follows the fact that when λ is sufficiently high compared with the transmit power and channel gains, the sum item of the denominator in Equation (3) can be negligible and the denominator can be approximated as λωηρhRD*2+1ρβhSR*2+(1β)hRD*2 [15,31,54].

Substituting Equations (18) and (19) into Equation (22), the COP of the TAS-RAS scheme can be rewritten as

PcopTASRAS=Ndγ¯RDns=0Nsnd=0Nd1NsnsNd1nd(1)ns+ndenst2(1ρ)βλγ¯SR0enst2ωηρβλγ¯SRy1+(nd+1)y1γ¯RDdy1. (23)

Applying Equation (3.324.1) in [55], the COP can be given by

PcopTASRAS=ns=0Nsnd=0Nd1NsnsNd1nd(1)ns+ndenst2(1ρ)βλγ¯SR4nst2Nd2ωηρβλγ¯SRγ¯RD(nd+1)K14nst2(nd+1)ωηρβλγ¯SRγ¯RD, (24)

where K1 is the second kind of Modified Bessel function.

Equation (24) shows the COP decreases with continuously increasing β. The probability of decoding the confidential information improves when the allocated power of S increases.

Based on the expressions of SOP and COP, it can be noted that increasing λ improves the reliability of the system. Nevertheless, it also leads to increasing the risk of information leakage. Therefore, the EST is used for comprehensively measuring the reliability and security in untrusted energy harvesting networks. Based on Equation (15), the EST is given by

ζTASRAS=Rs2PrIRTASRAS<Re,IDTASRAS>R0Rs2Pr(1ρ)βλhSR*2(1ρ)(1β)λhRD*2+1<t1,ωηρ(1ρ)βλhSR*2hRD*2ωηρhRD*2+1ρ>t2=Rs2PrX1<X1b,X1>X1s. (25)

Note that X1b is larger than X1s only when Y1>u, where u=b+b2+4ac/2a, a=ωηρλ(1ρ)(1β)t1, b=ωηρ(t2t1), c=(1ρ)t2.

Hence, ζTASRAS can be calculated as

ζTASRAS=Rs2uX1sX1bfX1x1fY1y1dx1dy1=RsNd2γ¯RDuey1γ¯RD1ey1γ¯RDNd11eX1bγ¯SRNs1eX1sγ¯SRNsdy1. (26)

Applying Equations (1.111) and (3.381.4) in [55], the EST expression is given by

ζTASRAS=RsNd2ns=0Nsnd=0Nd1NsnsNd1nd1ns+nd×βγ¯SReu11βt1nsγ¯RD+nd+1βγ¯SRm=0t2nsnd+1met2ns1ρβλγ¯SRΓ1m,(nd+1)uγ¯RDnd+1m!ωηρβλγ¯SRγ¯RDm, (27)

where u1=1β1ρλt1nsuγ¯RD+β1ρnd+1λuγ¯SR+t1nsγ¯RD/1ρλβγ¯SRγ¯RD.

Based on Equations (21), (24) and (27), there are optimal values of β and ρ that maximize the EST, as shown in Figures 4 and 7, respectively.

When λ goes to infinity, the asymptotical performance of the EST is considered. According to Equation (25) and after some manipulations, the asymptotic approximation analysis of the EST in the TAS-RAS scheme can be derived as

limλζTASRAS=limλRs2PrX1<1βt1yβ=RsNd2ns=0Nsnd=0Nd1NsnsNd1nd(1)ns+ndβγ¯SR(1β)t1nsγ¯RD+(nd+1)βγ¯SR. (28)

Equation (28) shows that the EST of the TAS-RAS scheme is independent of the transmit SNR at high transmit SNR. Hence, the EST should be a constant when λ.

3.2. MRT-RAS Scheme

In the MRT-RAS scheme, substituting Equation (4) into Equation (13), the SOP can be rewritten as

PsopMRTRAS=PrIRMRTRAS>Re=Pr12log21+(1ρ)βλhSR2(1ρ)(1β)λhRD*2+1>Re=0X1bfX2x2fY1y1dx2dy1, (29)

where X2=hSR2, and the PDF of X2 can be written as

fX2(x2)=x2Ns1ex2γ¯SRΓNsγ¯SRNs. (30)

Submitting Equations (19) and (30) into Equation (29), the SOP can be expressed as

PsopMRTRAS=NdΓNsγ¯SRNsγ¯RD0X1bx2Ns1ex2γ¯SR+y1γ¯RD1ey1γ¯RDNd1dx2dy1. (31)

Hence, the SOP of the MRT-RAS scheme can be calculated as

PsopMRTRAS=ns=0Ns1nd=0Nd1k=0nsNd1ndnsk(1)ndNdk!t1ns(1β)γ¯RDket1(1ρ)βλγ¯SRns!(βγ¯SR)nsk1(1ρ)λnsku2k+1. (32)

where u2=(1β)t1γ¯RD+nd+1βγ¯SR. The SOP of the MRT-RAS scheme is associated with parameters β and ρ. Moreover, the SOP increases when β increases, and it decreases as ρ increases.

Plugging Equation (6) into Equation (14), the COP of the MRT-RAS scheme is given by

PcopMRTRAS=PrIDMRTRAS<R0Prωηρ(1ρ)βλhSR2hRD*2ωηρhRD*2+1ρ<t2=00X1sfX2x2fY1y1dx2dy1. (33)

Substituting Equations (19) and (30) into Equation (33), the COP can be written as

PcopMRTRAS=1Ndns=0Ns1nd=0Nd1m=0nsNd1ndnsm(1)ndt2nset2(1ρ)βλγ¯SR0y1met2ωηρβλγ¯SRy1+(nd+1)y1γ¯RDγ¯RDns!(1ρ)nsmβλγ¯SRnsωηρm. (34)

Utilizing Equation (3.471.9) in [55], the expression of COP is given by

PcopMRTRAS=12Ndns=0Ns1nd=0Nd1m=0nsNd1ndnsm(1)ndt22ns+1m2et2(1ρ)βλγ¯SRK1m4t2(nd+1)ωηρβλγ¯SRγ¯RDns!(1ρ)nsmβλγ¯SR2ns+1m2ωηργ¯RDm+12(nd+1)1m2. (35)

Equation (35) shows that the COP of the MRT-RAS scheme decreases with the increase of β. According to Equation (15), the closed-form EST expression is calculated as follows.

ζMRTRAS=Rs2PrIRMRTRAS<Re,IDMRTRAS>R0Rs2Pr(1ρ)βλhSR2(1ρ)(1β)λhRD*2+1<t1,ωηρ(1ρ)βλhSR2hRD*2ωηρhRD2+1ρ>t2=Rs2uX1sX1bfX2x2fY1y1dx2dy1. (36)

Substituting Equations (19) and (30) into Equation (36), the EST can be rewritten as

ζMRTRAS=RsNd2γ¯RDuns=0NS11ns!X1sγ¯SRnseX1sγ¯SR+y1γ¯RD1ey1γ¯RDNd1dy1uns=0NS11ns!X1bγ¯SRnseX1bγ¯SR+y1γ¯RD1ey1γ¯RDNd1dy1=RsNd2Ξ1Ξ2. (37)

Applying Equation (3.381.3.8) in [55], Ξ1 and Ξ2, respectively, are as follows.

Ξ1=ns=0Ns1nd=0Nd1m=0nsk=0Nd1ndnsm(1)nd+kt2ns+k(nd+1)m+k1et2(1ρ)βλγ¯SRΓ1mk,(nd+1)uγ¯RDns!k!1ρnsmβλγ¯SRns+kωηργ¯RDm+k, (38)
Ξ2=ns=0Ns1nd=0Nd1m=0nsNd1ndnsm(1)ndt1ns(1β)γ¯RDmet1(ρ)βλγ¯SRΓ1+m,u2uβγ¯SRγ¯RDns!u2m+1(1ρ)λnsmβγ¯SRnsm1. (39)

The maximal EST with the optimal β and ρ is illustrated in Figures 4 and 7, respectively.

Based on Equations (37), (38) and (39), when λ goes to infinity, the asymptotical performance of the EST in the MRT-RAS scheme can be calculated as

limλζMRTRAS=Rs21ns=0Ns1nd=0Nd1Nd1nd(1)ndNdβγ¯SR1βt1γ¯RDns1βt1γ¯RD+nd+1βγ¯SRns+1. (40)

Equation (40) shows that the EST of the MRT-RAS scheme is irrelevant with the transmit SNR at high transmit SNR.

3.3. TAS-MRC Scheme

In TAS-MRC scheme, plugging Equation (7) into Equation (13), the SOP can be rewritten as

PsopTASMRC=PrIRTASMRC>Re=Pr12log21+(1ρ)βλhSR*2(1ρ)(1β)λhRD2+1>Re=0X2bfX1x1fY2y2dx1dy2, (41)

where X2b=1βt1Y2β+t11ρβλ.

Let Y2=hRD2, then the PDF of Y2 is given by

fY2(y2)=y2Nd1ey2γ¯RDγ¯RDNdΓNd. (42)

Substituting Equations (18) and (42) into Equation (41), the SOP can be calculated as

PsopTASMRC=1ns=0NsNsns(1)nset1ns(1ρ)βλγ¯SR0y2Nd1e1βt1nsγ¯RD+βγ¯SRβγ¯SRγ¯RDy2dy2γ¯RDNdΓNd1βt1nsγ¯RD+βγ¯SRNd. (43)

Using Equation (3.35.3) in [55], the expression of SOP can be calculated as

PsopTASMRC=1ns=0NsNsns(1)nsβγ¯SRNdet1ns(1ρ)βλγ¯SR(1β)t1nsγ¯RD+βγ¯SRNd. (44)

Combining Equations (9) and (14), the COP of the TAS-MRC scheme is written as

PcopTASMRC=PrIDTASMRC<R0Prωηρ(1ρ)βλhSR*2hRD2ωηρhRD2+1ρ<t2=00X2sfX1x1fY2y2dx1dy2, (45)

where X2s=t21ρβλ+t2ωηρβλY2.

Substituting Equations (18) and (42) into Equation (45) and utilizing Equation (3.471.9) in [55], the COP can be calculated as

PcopTASMRC=1+2ns=1NsNsns(1)nst2nsNd2et2ns(1ρ)βλγ¯SRKNd4t2nsωηρβλγ¯SRγ¯RDΓNdωηρβλγ¯SRγ¯RDNd2. (46)

To measure the trade-off between the SOP and COP, the EST can be written as

ζTASMRC=Rs2PrIRTASMRC<Re,IDTASMRC>R0Rs2Pr(1ρ)βλhSR*2(1ρ)(1β)λhRD2+1<t1ωηρ(1ρ)βλhSR*2hRD2ωηρhRD2+1ρ>t2=Rs2uX2sX2bfX1x1fY2y2dx1dy2. (47)

Substituting Equations (18) and (42) into Equation (47), using Equation (3.381.3.8) in [55], and after some manipulations, the EST can be calculated as

ζTASMRC=Rs2γ¯RDNdΓNduy2Nd1ey2γ¯RD×1eX2bγ¯SRNs1eX2sγ¯SRNsdy2=Rs2ΓNdΞ3Ξ4, (48)

where Ξ3 and Ξ4 are as follows.

Ξ3=ns=0NsNsns(1)nsβγ¯SRNdet1ns(1ρ)βλγ¯SRΓNd,(1β)t1nsuγ¯RD+βuγ¯SRβγ¯SRγ¯RD(1β)t1nsγ¯RD+βγ¯SRNd, (49)
Ξ4=ns=0Nsk=0Nsns(1)ns+ket2ns(1ρ)βλγ¯SRt2nskΓNdk,uγ¯RDk!ωηρβλγ¯SRγ¯RDk. (50)

Therefore, when λ, the asymptotical performance of the EST in the TAS-MRC scheme can be calculated as

limλζTASMRC=Rs2ns=0NsNsns(1)nsβγ¯SRNd1βt1nsγ¯RD+βγ¯SRnd. (51)

Equation (51) indicates that the EST of the TAS-MRC scheme is a constant at high transmit SNR.

3.4. MRT-MRC Scheme

In the MRT-MRC scheme, combining Equations (10), (12), (13) and (14), the exact expressions of the SOP and COP can be obtained as Equations (52) and (53).

PsopMRTMRC=PrIRMRTMRC>Re=Pr12log21+(1ρ)βλhSR2(1ρ)(1β)λhRD2+1>Re=ns=0Ns1m=0n1nsmNd+m1!t1nsβγ¯SRNd1βγ¯RDmet1(1ρ)βλγ¯SRns!ΓNd1ρλβγ¯SRnsmu3Nd+m, (52)

where u3=1βt1γ¯RD+βγ¯SR.

PcopMRTMRC=PrIDMRTMRC<R0Prωηρ(1ρ)βλhSR2hRD2ωηρhRD2+1ρ<t2=12ΓNdns=1Ns1m=0nsnsmt22ns+Ndm2et2(1ρ)βλγ¯SRKNdm4t2ωηρβλγ¯SRγ¯RDns!1ρβλγ¯SRnsmωηρβλγ¯SRγ¯RDNd+m2. (53)

Equation (53) shows that the COP decreases when β increases. When much power is allocated for the source signal, the probability of successfully decoding the source information increases.

The EST of the MRT-MRC scheme is calculated as

ζMRTMRC=Rs2PrIRMRTMRC<Re,IDMRTMRC>R0Rs2Pr(1ρ)βλhSR2(1ρ)(1β)λhRD2+1<t1,ωηρ(1ρ)βλhSR2hRD2ωηρhRD2+1ρ>t2=Rs2ΓNdΞ5Ξ6, (54)

where Ξ5 and Ξ6 can be calculated as Equations (55) and (56), respectively.

Ξ5=ns=0Ns1m=0nsk=0nsm(1)kt2ns+ket2(1ρ)βλγ¯SRΓNdmk,uγ¯RDns!k!1ρβλγ¯SRnsmωηρβλγ¯SRγ¯RDm+k, (55)
Ξ6=ns=0Ns1m=0nsnsmt1nsβγ¯SRNd1βγ¯RDmet1(1ρ)βλγ¯SRΓNd+m,u3uβγ¯SRγ¯RDns!1ρβλγ¯SRnsmu3Nd+m. (56)

Based on Equations (54)–(56), when λ, the asymptotical performance of the EST in the MRT-MRC scheme can be calculated as

limλζMRTMRC=Rs21ns=0Ns1Nd+ns+1!βγ¯SRNd1βt1γ¯RDnsns!Nd1!1βt1γ¯RD+βγ¯SRNd+ns+1. (57)

Equation (57) denotes that the EST of the MRT-MRC scheme is irrelevant with λ when λ is sufficiently high.

4. Simulation and Discussion

The Monte Carlo simulation was utilized to verify the analytical expressions carried out in Section 4, and compare the performance of the four schemes. For each figure, R0=2bit/s/Hz, Rs=1bit/s/Hz, η=0.5, ω=0.8 and γ¯SR=γ¯RD=0. The black solid lines represent the numerical analyses in all figures. The dashed-lines are the asymptotic analysis results.

Figure 2 illustrates the SOP and COP versus the transmit SNR under the four schemes, where β and ρ were set as 0.5. As shown in Figure 2, the derived analytical curves excellently match with simulation results, which validate our derivation. Several observations can be obtained as follows: (1) The SOP of the four schemes increases continuously with increasing the transmit SNR, whereas the COP decreases. This is because, as the transmit SNR increases, the received SNR at R and D are improved. Therefore, there is a trade-off between security and reliability. (2) The SOP of each scheme approaches saturation when the transmit SNR is sufficient high. The reason is that the utilization of jamming signal protects the confidential information. (3) Both the TAS-RAS scheme and TAS-MRC scheme are superior to MRT-RAS scheme and MRT-MRC in terms of security performance, while inferior to MRT-RAS scheme and MRT-MRC in terms of reliability performance. It denotes that the security performance of TAS scheme is superior to MRT, while the reliability performance of RAS scheme is worse than MRC.

Figure 2.

Figure 2

SOP and COP vs. the transmit SNR.

Figure 3 depicts that the EST versus the transmit SNR under the four schemes. It can be easily observed that the analytical approximations are close to the exact simulation results for all schemes. It is shown that, when λ, the EST approaches to a constant for each scheme, which verifies the asymptotical optimality property shown in Equations (28), (40), (51) and (57). Therefore, by applying excessive transmit power to improve the EST is meaningless. In the high transmit SNR regime, several observations can be drawn as follows: (1) The EST performance of TAS-MRC scheme outperforms MRT-MRC scheme, and TAS-RAS scheme outperforms MRT-RAS scheme. This is because that the source node may leak more confidential information to the untrusted relay when applying the MRT. (2) The saturation values of TAS-RAS and MRT-MRC are very close. However, TAS-RAS is less complicated than MRT-MRC. (3) The EST of TAS-MRC scheme is more advantageous than MRT-RAS scheme.

Figure 3.

Figure 3

EST vs. the transmit SNR.

Figure 4 depicts the curves of the ESTs versus β for four schemes. It is shown that: (1) There is an optimal β value that maximizes the EST. When β is less than the optimal value, the EST increases, and when β is greater than the optimal value, the EST decreases. This is because, when β is small, the source allocated power is small, thus the reliable link cannot be established between S and D, which leads to small EST. While β is large, the security of the transmitted information cannot be guaranteed, which also degrades EST. (2) For a given β, the EST of MRT-MRC scheme outperforms MRT-RAS scheme, and TAS-MRC scheme outperforms TAS-RAS scheme. This is because utilizing the MRC technique can obtain superior reliability to RAS. (3) In terms of EST, MRT-MRC scheme outperforms TAS-MRC scheme when β0,0.7, and then with continuously increasing β, MRT-MRC scheme is inferior to TAS-MRC scheme. Similarly, MRT-RAS scheme outperforms than TAS-RAS scheme when β0,0.675. This is explained as, with increase of β, the allocated power for the source increases, and the reliability of the system would improve. However, the allocated power for the destination decreases, and this leads to worse security performance.

Figure 4.

Figure 4

EST vs. the power allocation factor β.

Figure 5 depicts the EST with the number of antennas Ns at the source node under four schemes. The figures show that: (1) The EST increases and then decreases when Ns is increasing, thus there is an optimal Ns that maximizes the EST. For MRT and TAS, the optimal Ns is 4 and 17, respectively. This can be explained as increasing Ns can improve the connection reliability. Therefore, the EST would increase firstly. However, the source node may leak more information to the untrusted relay with continuously increasing Ns, which degrades the security performance. (2) When the source antennas are more than 4, the EST of MRT-MRC scheme and MRT-RAS scheme deceases rapidly, whereas the EST of TAS-MRC scheme and TAS-RAS scheme declines slowly when the antenna number is higher than 17. This implies that MRT is more sensitive to the number of the source antennas compared with TAS.

Figure 5.

Figure 5

EST vs. the number of antenna Ns.

Figure 6 shows that the EST versus the number of antennas Nd. It is observed that: (1) The EST increases with the increase of Nd and then approaches a saturation value. This is because increase of Nd improves the security of the system. The growing trend would saturate because the power of the destination is constrained. (2) The EST of MRT-MRC scheme outperforms TAS-MRC scheme, and MRT-RAS scheme outperforms TAS-RAS scheme. The reason is that MRT outperforms TAS for the source node. (3) The EST of MRT-MRC scheme outperforms MRT-RAS scheme, and TAS-MRC scheme outperforms TAS-RAS scheme. The reason is that MRC is more advantageous than RAS for the destination node.

Figure 6.

Figure 6

EST vs. the number of antenna Nd.

Figure 7 depicts the curves of the derived EST versus ρ for four schemes. It is observed that: (1) There is an optimal ρ that maximizes the EST. Smaller ρ implies the harvested energy at R is smaller, which leads to the lower EST. For a larger ρ, the harvested energy for information transmission is small, which also degrades the EST. (2) The EST of MRT-MRC scheme is superior to TAS-MRC scheme, and MRT-RAS scheme outperforms TAS-RAS scheme. The EST of MRT-MRC scheme is superior to MRT-RAS scheme, and TAS-MRC scheme outperforms TAS-RAS scheme. The reason is as same as for the results shown in Figure 6. (3) The EST of TAS-MRC scheme is very close to MRT-RAS scheme.

Figure 7.

Figure 7

EST vs. the power splitting ratio ρ.

Figure 8 shows the EST of the four schemes versus ω. Here, the ω proportion of the harvested energy is utilized for forwarding the confidential information to D and the other proportion is used for eavesdropping and decoding consumption. The results show that: (1) The EST is increasing according with the increase of ω. The reason is that, when ω increases, the allocated harvested energy at R for forwarding the confidential information to D is improved. As a result, the harvested energy for eavesdropping and decoding the information is reduced at R. Therefore, the security performance is promoted. (2) MRT-MRC scheme and MRT-RAS scheme are superior to TAS-MRC scheme and TAS-RAS scheme, respectively.

Figure 8.

Figure 8

EST vs. the power splitting ratio ω.

5. Conclusions

This paper presents secure transmission for a half-duplex AF untrusted and energy harvesting relay network under the PSR strategy, where both S and D are multi-antennas and R is a single antenna. The expressions of SOP, COP and EST for the four schemes are successively derived. Moreover, the EST asymptotic analysis of each scheme is provided in the high transmits SNR regime. These expressions were verified by Monte-Carlo simulation. The effects of various key parameters on the EST, such as λ, β, ρ, Ns and Nd, were taken into account. In general, the EST of MRT-MRC scheme was superior to the other schemes in terms of the parameters β, Nd, ρ, and ω. However, the EST of MRT-MRC scheme was inferior to TAS-MRC scheme in the high transmit SNR regime. There existed an optimal Ns to maximize the EST of the proposed schemes, i.e., 4 or 17 antennas.

Acknowledgments

The authors extend their gratitude to the anonymous reviewers for their valuable and constructive comments, which have largely improved and clarified this paper.

Author Contributions

H.S., W.Y., and D.C. conceived the main proposal of the secure transmission schemes. H.S. carried out formal analysis. W.Y. and D.C. provided methodology. H.S. and D.C. designed software. H.S. and W.Y. wrote the original draft. Y.L. and Y.C. supervised the analysis and numerical simulation of the proposed schemes, and reviewed and edited the manuscript.

Funding

This work was supported in part by the National Natural Science Foundation of China under Grant Nos. 61771487, 61471393, and 61501512, in part by the Jiangsu Provincial National Science Foundation under Grant No. BK20150718.

Conflicts of Interest

The authors declare no conflict of interest.

References

  • 1.Wyner A.D. The wire-tap channel. Bell Syst. Tech. J. 1975;53:1355–1387. doi: 10.1002/j.1538-7305.1975.tb02040.x. [DOI] [Google Scholar]
  • 2.Yang N., Wang L., Geraci G., Elkashlan M. Safeguarding 5G wireless communication networks using physical layer security. IEEE Commun. Mag. 2015;53:20–27. doi: 10.1109/MCOM.2015.7081071. [DOI] [Google Scholar]
  • 3.Liu T., Shamai S. A Note on the Secrecy Capacity of the Multi-antenna Wiretap Channel. IEEE Trans. Inf. Theory. 2009;55:2547–2553. doi: 10.1109/TIT.2008.2011448. [DOI] [Google Scholar]
  • 4.Hasna M.O., Alouini M.S. End-to-end performance of transmission systems with relays over Rayleigh-fading channels. IEEE Trans. Wirel. Commun. 2003;2:1126–1131. doi: 10.1109/TWC.2003.819030. [DOI] [Google Scholar]
  • 5.Anghel P.A., Kaveh M. Exact Symbol Error Probability of a Cooperative Network in a Rayleigh-Fading Environment. IEEE Trans. Wirel. Commun. 2004;3:1416–1421. doi: 10.1109/TWC.2004.833431. [DOI] [Google Scholar]
  • 6.Shim K., Do N., An B. Performance Analysis of Physical Layer Security of Opportunistic Scheduling in Multiuser Multirelay Cooperative Networks. Sensors. 2017;17:377. doi: 10.3390/s17020377. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 7.Liau Q.Y., Leow C.Y., Ding Z. Physical Layer Security Using Two-Path Successive Relaying. Sensors. 2016;16:846. doi: 10.3390/s16060846. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 8.Kuhestani A., Mohammadi A. Destination-based cooperative jamming in untrusted amplify-and-forward relay networks: Resource allocation and performance study. IET Commun. 2016;10:17–23. doi: 10.1049/iet-com.2015.0078. [DOI] [Google Scholar]
  • 9.Kuhestani A., Yeoh P.L., Mohammadi A. Optimal Power Allocation and Secrecy Sum Rate in Two-Way Untrusted Relaying; Proceedings of the 2017 IEEE Global Communications Conference GLOBECOM; Singapore. 4–8 December 2017; pp. 1–6. [DOI] [Google Scholar]
  • 10.Kuhestani A., Mohammadi A., Mohammadi M. Joint Relay Selection and Power Allocation in Large-Scale MIMO Systems with Untrusted Relays and Passive Eavesdroppers. IEEE Trans. Inf. Forensics Secur. 2018;13:341–355. doi: 10.1109/TIFS.2017.2750102. [DOI] [Google Scholar]
  • 11.Mekkawy T., Yao R., Xu F., Wang L. Optimal power allocation for achievable secrecy rate in an untrusted relay network with bounded channel estimation error; Proceedings of the 26th Wireless and Optical Communication Conference (WOCC); Newark, NJ, USA. 7–8 April 2017; pp. 1–5. [DOI] [Google Scholar]
  • 12.Kuhestani A., Mohammadi A., Noori M. Optimal power allocation to improve secrecy performance of non-regenerative cooperative systems using an untrusted relay. IET Commun. 2016;10:962–968. doi: 10.1049/iet-com.2015.0876. [DOI] [Google Scholar]
  • 13.Atapattu S., Rajatheva N., Tellambura C. Performance Analysis of TDMA Relay Protocols Over Nakagami-m Fading. IEEE Trans. Veh. Technol. 2010;59:93–104. doi: 10.1109/TVT.2009.2029980. [DOI] [Google Scholar]
  • 14.Zhong C., Jin S., Wong K.K. Dual-hop systems with noisy relay and interference-limited destination. IEEE Trans. Commun. 2010;58:764–768. doi: 10.1109/TCOMM.2010.03.080156. [DOI] [Google Scholar]
  • 15.Kalamkar S.S., Banerjee A. Secure Communication via a Wireless Energy Harvesting Untrusted Relay. IEEE Trans. Vech. Technol. 2017;66:2199–2213. doi: 10.1109/TVT.2016.2572960. [DOI] [Google Scholar]
  • 16.Huang J., Mukherjee A., Swindlehurst A. Secure Communication Via an Untrusted Non-Regenerative Relay in Fading Channels. IEEE Trans. Signal Process. 2013;61:2536–2550. doi: 10.1109/TSP.2013.2247600. [DOI] [Google Scholar]
  • 17.Liu Y., Li L., Alexandropoulos G.C., Pesavento M. Securing Relay Networks with Artificial Noise: An Error Performance-Based Approach. Entropy. 2017;19:384. doi: 10.3390/e19080384. [DOI] [Google Scholar]
  • 18.Zhu J., Mo J., Tao M. Cooperative Secret Communication with Artificial Noise in Symmetric Interference Channel. IEEE Commun. Lett. 2010;14:885–887. doi: 10.1109/LCOMM.2010.081910.101121. [DOI] [Google Scholar]
  • 19.Hu H., Gao Z., Liao X., Leung V.C.M. Secure Communications in CIoT Networks with a Wireless Energy Harvesting Untrusted Relay. Sensors. 2017;17:2023. doi: 10.3390/s17092023. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 20.Chen S., Wang W., Zhang X. Capacity Performance of Amplify-and-Forward MIMO Relay with Transmit Antenna Selection and Maximal-Ratio Combining; Proceedings of the IEEE Wireless Communications and Networking Conference (WCN); Budapest, Hungary. 5–8 April 2009; pp. 1–6. [DOI] [Google Scholar]
  • 21.Jeong C., Kim I.M., Kim D.I. Joint Secure Beamforming Design at the Source and the Relay for an Amplify-and-Forward MIMO Untrusted Relay System. IEEE Trans. Signal Process. 2012;60:310–325. doi: 10.1109/TSP.2011.2172433. [DOI] [Google Scholar]
  • 22.Chen X., Chen J., Liu T. Secure wireless information and power transfer in large-scale MIMO relaying systems with imperfect CSI; Proceedings of the IEEE Global Communications Conference (GLOBECOM); Austin, TX, USA. 8–12 December 2014; pp. 4131–4136. [DOI] [Google Scholar]
  • 23.Xiong J., Cheng L., Ma D., Wei J. Destination Aided Cooperative Jamming for Dual-Hop Amplify-and-Forward MIMO Untrusted Relay Systems. IEEE Trans. Veh. Technol. 2016;65:7274–7284. doi: 10.1109/TVT.2015.2490099. [DOI] [Google Scholar]
  • 24.Li Q., Yang L. Artificial Noise Aided Secure Precoding for MIMO Untrusted Two-Way Relay Systems with Perfect and Imperfect Channel State Information. IEEE Trans. Inf. Forensics Secur. 2018;13:2628–2638. doi: 10.1109/TIFS.2018.2825944. [DOI] [Google Scholar]
  • 25.Benkhelifa F., Member I.S., Fellow I., Alouini M.S. Precoding Design of MIMO Amplify-and-Forward Communication System with an Energy Harvesting Relay and Possibly Imperfect CSI. IEEE Access. 2017;5:578–594. doi: 10.1109/ACCESS.2016.2646387. [DOI] [Google Scholar]
  • 26.Rostampoor J., Razavizadeh S.M., Lee I. Energy Efficiency Maximization Precoding Design for SWIPT in MIMO Two-Way Relay Networks. IEEE Trans. Veh. Technol. 2017;66:7888–7896. doi: 10.1109/TVT.2017.2681942. [DOI] [Google Scholar]
  • 27.Seah W.K.G., Zhi A.E., Tan H. Wireless sensor networks powered by ambient energy harvesting (WSN-HEAP)—Survey and challenges; Proceedings of 2009 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology; Aalborg, Denmark. 17–20 May 2009; pp. 1–5. [DOI] [Google Scholar]
  • 28.Paradiso J.A., Starner T. Energy Scavenging for Mobile and Wireless Electronics. IEEE Pervasive Comput. 2005;4:18–27. doi: 10.1109/MPRV.2005.9. [DOI] [Google Scholar]
  • 29.Visser H.J., Vullers R.J.M. RF Energy Harvesting and Transport for Wireless Sensor Network Applications: Principles and Requirements. Proc. IEEE. 2013;101:1410–1423. doi: 10.1109/JPROC.2013.2250891. [DOI] [Google Scholar]
  • 30.Lu X., Wang P., Niyato D. Wireless Networks with RF Energy Harvesting: A Contemporary Survey. IEEE Commun. Surv. Tutor. 2015;17:757–789. doi: 10.1109/COMST.2014.2368999. [DOI] [Google Scholar]
  • 31.Nasir A.A., Zhou X., Durrani S. Relaying Protocols for Wireless Energy Harvesting and Information Processing. IEEE Trans. Wirel. Commun. 2013;12:3622–3636. doi: 10.1109/TWC.2013.062413.122042. [DOI] [Google Scholar]
  • 32.Kalamkar S.S., Banerjee A. Interference-Assisted Wireless Energy Harvesting in Cognitive Relay Network with Multiple Primary Transceivers; Proceedings of 2015 IEEE Global Communications Conference (GLOBECOM); San Diego, CA, USA. 6–10 December 2015; pp. 1–6. [DOI] [Google Scholar]
  • 33.Chen H., Li Y., Jiang Y. Distributed Power Splitting for SWIPT in Relay Interference Channels Using Game Theory. IEEE Trans. Wirel. Commun. 2014;14:410–420. doi: 10.1109/TWC.2014.2349892. [DOI] [Google Scholar]
  • 34.Nasir A.A., Zhou X., Durrani S., Kennedy R.A. Wireless-Powered Relays in Cooperative Communications: Time-Switching Relaying Protocols and Throughput Analysis. IEEE Trans. Commun. 2015;63:1607–1622. doi: 10.1109/TCOMM.2015.2415480. [DOI] [Google Scholar]
  • 35.Yang Z., Ding Z., Fan P. Outage Performance of Cognitive Relay Networks With Wireless Information and Power Transfer. IEEE Trans. Veh. Technol. 2016;65:3828–3833. doi: 10.1109/TVT.2015.2443875. [DOI] [Google Scholar]
  • 36.Zhang R., Ho C.K. MIMO Broadcasting for Simultaneous Wireless Information and Power Transfer. IEEE Trans. Wirel. Commun. 2013;12:1989–2001. doi: 10.1109/TWC.2013.031813.120224. [DOI] [Google Scholar]
  • 37.Zhou X., Zhang R., Ho C.K. Wireless Information and Power Transfer: Architecture Design and Rate-Energy Tradeoff. IEEE Trans. Commun. 2013;61:4754–4767. doi: 10.1109/TCOMM.2013.13.120855. [DOI] [Google Scholar]
  • 38.Tran D.D., Tran H.V., Ha D.B. Performance Analysis of Two-Way Relaying System with RF-EH and Multiple Antennas; Proceedings of the IEEE 84th Vehicular Technology Conference (VTC-Fall); Montreal, QC, Canada. 18–21 September 2016; [DOI] [Google Scholar]
  • 39.Bin L., Haiyan G., Zhen Y., Guan G. Throughput Maximization for Hybrid Backscatter Assisted Cognitive Wireless Powered Radio Networks. IEEE IoT. 2018;5:2015–2024. doi: 10.1109/JIOT.2018.2820180. [DOI] [Google Scholar]
  • 40.Wang L., Cai Y., Zou Y. Joint Relay and Jammer Selection Improves the Physical Layer Security in the Face of CSI Feedback Delays. IEEE Trans. Veh. Technol. 2016;65:6259–6274. doi: 10.1109/TVT.2015.2478029. [DOI] [Google Scholar]
  • 41.Alexandropoulos G.C., Peppas K.P. Secrecy Outage Analysis over Correlated Composite Nakagami-m/Gamma Fading Channels. IEEE Commun. Lett. 2018;22:77–80. doi: 10.1109/LCOMM.2017.2760255. [DOI] [Google Scholar]
  • 42.Cheng Y., Nguyen N.P., Garcia-Palacios E., Xuan N.T., Le-Tien T. Secure Energy Harvesting Communications with Relay Selection over Nakagami-m Fading Channels. Mob. Netw. Appl. 2017;23:1–8. doi: 10.1007/S11036-017-0919-5. [DOI] [Google Scholar]
  • 43.Mishra D., Alexandropoulos G.C. Transmit Precoding and Receive Power Splitting for Harvested Power Maximization in MIMO SWIPT Systems. IEEE Trans. Green Commun. Netw. 2018;2:774–786. doi: 10.1109/TGCN.2018.2835409. [DOI] [Google Scholar]
  • 44.Mishra D., Alexandropoulos G.C. Jointly Optimal Spatial Channel Assignment and Power Allocation for MIMO SWIPT Systems. IEEE Wirel. Commun. Lett. 2017;7:214–217. doi: 10.1109/LWC.2017.2765320. [DOI] [Google Scholar]
  • 45.Cumanan K., Alexandropoulos G.C., Ding Z., Karagiannidis G.K. Secure Communications with Cooperative Jamming Optimal Power Allocation and Secrecy Outage Analysis. IEEE Trans. Veh. Technol. 2017;6:7495–7505. doi: 10.1109/TVT.2017.2657629. [DOI] [Google Scholar]
  • 46.Cheng Y., Nguyen H.T., Kundu C., Kaleem Z., Garcia-Palacios E., Duong T.Q. Secure Energy Harvesting Relay Networks with Unreliable Backhaul Connections. IEEE Access. 2018;6:12074–12084. doi: 10.1109/ACCESS.2018.2794507. [DOI] [Google Scholar]
  • 47.Hoang T.M., Duong T.Q., Suraweera H.A., Tellambura C., Poor V. Cooperative Beamforming and User Selection for Improving the Security of Relay-Aided Systems. IEEE Trans. Commun. 2015;63:5039–5051. doi: 10.1109/TCOMM.2015.2494012. [DOI] [Google Scholar]
  • 48.Chen D.H., He Y.C. Full-Duplex Secure Communications in Cellular Networks With Downlink Wireless Power Transfer. IEEE Trans. Commun. 2018;66:265–277. doi: 10.1109/TCOMM.2017.2756884. [DOI] [Google Scholar]
  • 49.Cai Y., Shi Q., Champagne B., Li G.Y. Joint Transceiver Design for Secure Downlink Communications Over an Amplify and Forward MIMO Relay. IEEE Trans. Commun. 2017;65:3691–3704. doi: 10.1109/TCOMM.2017.2708110. [DOI] [Google Scholar]
  • 50.Yang M., Guo D., Huang Y., Duong T.Q., Zhang B. Secure Multiuser Scheduling in Downlink Dual-Hop Regenerative Relay Networks Over Nakagami-m Fading Channels. IEEE Trans. Wirel. Commun. 2016;15:8009–8024. doi: 10.1109/TWC.2016.2610965. [DOI] [Google Scholar]
  • 51.Alessio Z., Pan C., Jorswieck E.A. Energy Efficiency Optimization in Relay-Assisted MIMO Systems with Perfect and Statistical CSI. IEEE Trans. Signal Process. 2014;62:443–457. doi: 10.1109/TSP.2013.2292031. [DOI] [Google Scholar]
  • 52.Kang Y.Y., Kwak B.J., Cho J.H. An Optimal Full-Duplex AF Relay for Joint Analog and Digital Domain Self-Interference Cancellation. IEEE Trans. Commun. 2014;62:2758–2772. doi: 10.1109/TCOMM.2014.2342230. [DOI] [Google Scholar]
  • 53.Chen D., Cheng Y., Yang W., Hu J., Cai Y. Physical Layer Security in Cognitive Untrusted Relay Networks. IEEE Access. 2017;6:7055–7065. doi: 10.1109/ACCESS.2017.2762738. [DOI] [Google Scholar]
  • 54.Wang Z., Chen Z., Xia B. Cognitive Relay Networks with Energy Harvesting and Information Transfer: Design, Analysis, and Optimization. IEEE Trans. Wirel. Commun. 2016;15:2562–2576. doi: 10.1109/TWC.2015.2504581. [DOI] [Google Scholar]
  • 55.Gradshteyn I.S., Ryzhik I.M. Table of Integrals, Series, and Products. 7th ed. Elsevier/Academic Press; Amsterdam, The Netherlands: 2007. [Google Scholar]

Articles from Sensors (Basel, Switzerland) are provided here courtesy of Multidisciplinary Digital Publishing Institute (MDPI)

RESOURCES