This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
1. Introduction
As the key architecture of the fifth generation (5G) mobile communication system, the Internet of Things (IoT) has attracted more and more attention [1]. The primary driving thought for the prospective IoT has relation with smart sensors, and wireless sensor networks (WSNs) have been observed as key enablers of IoT applications recently, where multiple sensor nodes are caused by instant or periodic data acquisition in multiple environments [2]. However, among various types of IoT sensors, most of the objects are resource-constrained, battery-powered, and characterized by both of the low energy and poor computation capacity, resulting in the one of the biggest barrier impeding generalization of IoT in the future which is the limitation of energy [3]. Meanwhile, the rapid development of IoT will give rise to the massive deployment of sensor nodes and a vast amount of information exchange, making it unfeasible to flexibly recharge and control the power-constricted devices. Due to the rising power costs, green-oriented methods have inevitably become the dominating design consideration in the IoT system. Fortunately, far-field wireless energy transfer (WET), which enables wireless devices to acquire energy from the broadcast signals for their operation and information exchange, has considered as an appealing method to provide consistent and stable energy to power-constrained users of IoT, particularly when traditional energy harvesting (EH) techniques from reproducible energy sources are inapplicable [4]. Such a new communication type is known as wireless-powered communication (WPC), where the wireless users of IoT are powered through surrounding electromagnetic signals, which is likely to be dedicated wireless transmitters utilized to charge wireless terminals. As such, it can completely eliminate the burden of battery renewal and/or recharging, avoid the interruption caused by the running out of power, and provide networks with theoretically perpetual lifespans [5].
Generally, a basic hurdle of wireless transmission upon the basis of WPC rest with the fast attenuation of radio frequency (RF) signals with distance changing. Moreover, energy amount acquired at wireless-powered devices is fairly restricted, which limits the coverage severely and has become a bottleneck for the widespread application of WPC. Consequently, the design of energy-efficient transmission is of great significance for transforming the green concept into future wireless-powered IoT. Although the harvested energy from RF signals appears to be inefficient and the WPC-based wireless communication seems to be not widely available at the current stage, practical applications for power-constrained devices of IoT have already been investigated, and more feasible applications will be implemented in the near future [6–8]. Until now, a lot of research efforts have also been devoted to explore the advantages of WPC in most applications of IoT since it could be easily combined with wireless terminals [9–13]. Specifically, typical wireless-powered communication networks (WPCN) were investigated in [9], where introduction of a dynamic time division multiple access (TDMA) protocol was performed for a multiuser WPCN, and the best time allocation for the downlink WPC and the uplink wireless information transmission (WIT) had been analyzed. Until now, the studies on WPCN have been extended to various communication systems. In particular, a joint wireless power transfer (WPT) and relay selection method were proposed for WPCN in [10], where the source and relays utilize the time-switching-based RF-EH method to acquire energy from a power beacon (PB) with multiple antennas. Differently, secrecy performance discussion of EH wireless sensor networks was examined in [11], where the authors proposed an optimization method, in which a wireless-powered friendly jammer was utilized for improving the secrecy performance of the considered model. Furthermore, the authors in [12] analyzed the secrecy performance of the EH sensor system and proposed a best-relay-and-best-jammer protocol for enhancing the secrecy of a system with the source user and multiple sensor relays harvesting energy from diverse PBs. Recently, inspired by abovementioned works, a secure energy-efficient transmission design for wireless-powered IoT possessing various PBs was investigated in [13], where the authors introduce different relay selection schemes possessing the optimal PB under the selection of the single source and solve the optimization problem of secure energy efficiency (SEE). It is worth mentioning that above works mostly focused on the secrecy performance improvement contributed by relay selection, while ignored the practical scenario with multiusers, which can be considered as the typical application of IoT.
1.1. Related Works
Remarkably, in an effort to reduce the complexity and the costs of resource-constricted wireless-powered IoT, the multiuser scheduling has drawn wide attention due to the significant potential performance improvement [14–19]. Particularly, the authors in [14] explore the largest energy efficiency for multiuser WPCN by joint power control and time allocation while taking account of the initial battery energy level of all the users. Furthermore, the authors in [15] applied the notion of proportional fair scheduling to WPCN and overcome the doubly near fair problem by an opportunistic scheme. Meanwhile, in a multiuser system, the authors in [16] consider multiuser scheduling criteria taking into account cochannel interference in a multicell environment and propose an adaptive scheduling scheme. Then, in a WPCN-based multi-input multioutput (MU-MIMO) multiuser system, [17] proposes a zero-forcing-based transmission method by a downlink energy beamformer to optimize the related parameters. Afterwards, the authors in [18] concentrate on an MIMO-WPCN, in which a dedicated multiantenna PB transfers RF energy to some starve users, and then these users send required information to the destination. And, last but not the least, [19] focuses on the cumulative transmission framework of multiuser scheduling in full-duplex wireless-powered IoT system and designs a novel throughput-oriented scheduling strategy, which models the dynamic charging and discharging procedures for all the devices in IoT as a finite-state Markov chain.
On the contrary, the broadcast characteristics of wireless transmission make the WPT and WIT more vulnerable to malicious attacks, turning secure transmission into a burdensome task [20]. Typically, the upper layer cryptographic techniques are explored for securing the privacy information against intercepting in traditional wireless transmissions [21]. However, conventional cryptographic technology is limited in wireless-powered IoT because of the requirements of high hardware complicacy and massive energy [22]. Furthermore, an eavesdropper (Eve) possessing unlimited computing capacity is likely to make such technology compromised [23]. Fortunately, physical layer security (PLS), as a promising approach to make sure the safety of wireless communication, has been a high-effectiveness supplement to current solutions. As far as wireless PLS is concerned, the fundamental thought is to utilize the features of wireless channels for transmitting information in a reliable manner from the source to the intended receiver and to make sure the privacy of the information, to put in different way, not to be intercepted or eavesdropped [24]. Currently, PLS has been broadly deployed for ensuring security of future wireless networks [25, 26] because it can provide the security of new network architectures such as the IoT. In recent years, some literatures have explored secure communications in multiuser-scheduling-aided WPCN [27, 28]. Specifically, [27] investigates the secrecy performance of dual-hop multiuser relay system by exploiting the maximal ratio transmission (MRT) scheme and proposes a threshold-based multiuser scheduling method. On the contrary, the authors in [28] consider a multiantenna wireless network, in which the base station and the users have been given with multiple antennas. However, it is worth noting that few works have considered the SEE in wireless-powered IoT scenario.
1.2. Paper Contributions and Organization
Enlightened by the aforementioned observations, this paper focuses on the secrecy performance analysis of a typical wireless-powered IoT, in which multiple source sensors that perform monitoring or operating tasks in a localized group and an intermediate node performs as relay are powered by multiple dedicated PBs. Furthermore, we propose two multiuser scheduling schemes and compare their secrecy performance for providing the secure energy-efficient transmissions. The main contributions of our work are listed as follows:
(i)
We explore the PLS in the wireless-powered IoT and propose two green-oriented multiuser scheduling schemes, in which the optimal PB is decided by the relay; meanwhile, the best source is scheduled in a random way (BSR) or chosen by the best PB (BSBP), respectively.
(ii)
For the two proposed schemes, we obtain the closed-form expressions of the secrecy outage probability (SOP) and solve the SEE optimization problem with constrained transmission power in PB by resorting to the searching method. Compared with the BSR scheme characterized by lower complexity and simpler application, the BSBP scheme can make full use of the power transfer links contributed by diverse PBs and present the better secrecy performance.
(iii)
Simulation results demonstrate that increasing the number of PBs is favorable to improve the SEE of the studied scenario. Meanwhile, decreasing both the ratio of distance from PBs to the sources and the total communication distance to some extent is advantageous for SEE. Additionally, the time-switching factor has an important effect upon the secrecy performance of the considered system, which is worth designing and optimizing carefully.
The remaining part of this paper is summarized as follows. Section 2 provides details concerning the system model, the process of WPT, signal analysis, and two proposed multiuser scheduling schemes. Section 3 derives the exact SOP of BSR and BSBP schemes, respectively. Then, in Section 4, the SEE optimization research is given. The simulation results are presented in Section 5. Eventually, conclusions of this paper are drawn in Section 6.
2. System and Channel Model
The system model, the process of WPT, signal analysis, and two multiuser scheduling strategies are presented in this section.
2.1. System Model
Consider a dual-hop multiuser uplink WPCN for the IoT application as illustrated in Figure 1, where multiple source users
[figure omitted; refer to PDF]
Furthermore, we consider that each link will be affected by Rayleigh fading. Thus, the power gains of the channel are subject to exponential distribution with parameter
In order to facilitate mathematical modeling, the channel coefficients of the
2.2. Wireless Power Transfer
In the WPT process, the receiver adopts the EH model based on rectangular antenna structure. For the rectangular antenna, the received signal can be converted into a direct current (DC) signal by a rectifier consisting of a passive low-pass filter (LPF) and a Schottky diode [30]. Then, it is considered that the harvested energy by all users at the stage of WPT is entirely used to transmit message in WIT, which is known as the harvest-use (HU) mode as in [31]. This consideration is practical for devices of IoT because they are limited by the size and cost, which leads to the smaller batteries. As for the relaying strategy, the time-switching-based receiver (TSR) protocol is applied in the data transmission, thanks to its high throughput compared with power splitting-based receiver (PSR) protocol [32]. In particular, the duration between two successive data transmission is defined as a transfer time slot T,
[figure omitted; refer to PDF]
Then, we consider the scenario that a particular PB is activated, while other PBs remain silent in order to reduce the computational complexity and energy consumption, because PB selection is an green-oriented WPT scheme [12]. To be more specific, the PB with the best link for the
Lemma 1.
If
According to Lemma 1, the PDF of
Assuming that the channel fading factors are still unchanged within a transfer time slot, the transmit power of
From (6) and (7), it is assumed that the SNRs at R and E in the first hop are denoted as
2.3. Multiuser Scheduling Scheme
Then, when the best PB is determined, we pay attention to the two multiuser scheduling schemes, one is a straightforward scheme with the lower complexity, in which the best source is scheduled randomly from multiple users (BSR), and another is a joint PB and source user selection scheme, in which the best source is chosen by the optimal PB (BSBP).
2.3.1. The BSR Scheme
For reduction of the complexity and costs of considered networks, the source user is scheduled randomly among the candidates in the BSR scheme. It is worth noting that
Remark 1.
The BSR scheme is applicable for the delay-sensitive and resource-constricted scenarios owing to its lower complexity of computation. However, the BSR scheme fails to have the diversity gain contributed by diverse users, which hinders the secrecy improvement of communication systems.
2.3.2. The BSBP Scheme
Aiming to obtain the diversity gain, the best user is chosen from the perspective of
Therefore,
Remark 2.
According to the (10) and (11), we find that the BSBP scheme is able to obtain the diversity gain contributed by multiple users. Note that this scheme schedules the source user, taking into account the selection of PB adequately. As a result, this scheme can decline the interruption probability of information communication for source sensors in an effective way, which is beneficial to energy-limited IoT applications.
3. Secrecy Outage Probability Analysis
In the system, we consider that
Regarding evaluation of the secrecy performance, the SOP is used as the figure of merit, which is regarded as an important indicator of PLS generally. From the perspective of information theory, the transmission incurs secrecy outage if
3.1. Derivation for the BSR Scheme
According to the BSR scheme, each source user of the system has the same opportunity to participate in the transmission. Therefore, the exact SOP of the BSR scheme should be formulated as
Proof.
See Appendix A.
3.2. Derivation for the BSBP Scheme
Furthermore, according to (16), the closed-form expression of SOP for BSBP scheme is calculated as
Proof.
See Appendix B.
4. Secure Energy Efficiency Maximization
Generally, security improvement comes at the expense of more energy consumption frequently. With regard to energy-limited IoT applications, recklessly pursuing secrecy improvement has a negative effect on the performance of networks. Consequently, it is of great significance to make sure the safe communication in the application of IoT with low energy cost. From the above, the SEE is utilized as the proper metric for evaluation of the secrecy performance [39]. Mathematically, the SEE of above discussed schemes can be given as
To find the best transmit power of PBs and the time-switching factor, the SEE maximization problem can be considered as
5. Numerical Results and Discussion
In this section, some numerical outcomes are provided for validation of the abovementioned secrecy analysis and for discussion of the joint effect of corresponding parameters upon the secrecy performance of the two proposed multiuser scheduling schemes. Consistent with [40], the simulation is conducted on a linear topology, in which the multiuser sensors in a localized group as well as multiple PBs, relay R, and controller D are arranged horizontally. Unless otherwise stated, we use the following parameters in accordance with [10] throughout this section. In particular, we set
Figure 3 describes the SOP of the proposed multiuser scheduling schemes versus
[figure omitted; refer to PDF]
Figure 4 shows the SEE of the system with BSR/BSBP scheme versus
[figure omitted; refer to PDF]
[figure omitted; refer to PDF]Figure 6 presents the SEE of the two proposed strategies versus
[figure omitted; refer to PDF]
Figure 7 plots the impact of
[figure omitted; refer to PDF]
6. Conclusion
In this paper, the secrecy performance analysis of wireless-powered IoT possessing diverse PBs has been investigated. Specifically, the two green-oriented multiuser scheduling schemes to promote the secrecy performance of the networks are proposed. For each scheme, the analytical closed-form expression of SOP is obtained, while the optimization problem of SEE is solved by resorting to the searching method. To shed light on future applications of wireless-powered IoT, simulation results are presented to demonstrate the accuracy of our analysis, and the secrecy performance of the two proposed schemes is discussed, subject to various important parameters of the system.
Acknowledgments
This work was supported by the National Natural Science Foundation of China under Grant numbers 61501508 and 61671476.
Appendix
A. Proof of Formula (17)
According to (16),
Then, in line with (15) and (16), we have
Furthermore,
Finally, by substituting (A.4) and (A.5) into (A.3) and performing some mathematical manipulations, (17) can be derived.
B. Proof of Formula (18)
Similar with
Meanwhile, according to (15) and (16), we find
After that,
Finally, by substituting (B.4) and (B.5) into (B.3) and performing some mathematical manipulations, (18) can be derived.
[1] G. A. Akpakwu, B. J. Silva, G. P. Hancke, A. M. Abu-Mahfouz, "A survey on 5G networks for the internet of things: communication technologies and challenges," IEEE Access, vol. 6, pp. 3619-3647, DOI: 10.1109/access.2017.2779844, 2018.
[2] F. Jameel, S. Wyne, I. Krikidis, "Secrecy outage for wireless sensor networks," IEEE Communications Letters, vol. 21 no. 7, pp. 1565-1568, DOI: 10.1109/lcomm.2017.2691347, 2017.
[3] A. S. M. Z. Kausar, A. W. Reza, M. U. Saleh, H. Ramiah, "Energizing wireless sensor networks by energy harvesting systems: scopes, challenges and approaches," Renewable & Sustainable Energy Reviews, vol. 38, pp. 973-989, 2014.
[4] Z. Hadzi-Velkov, I. Nikoloska, G. K. Karagiannidis, T. Q. Duong, "Wireless networks with energy harvesting and power transfer: joint power and time allocation," IEEE Signal Processing Letters, vol. 23 no. 1, pp. 50-54, DOI: 10.1109/lsp.2015.2500340, 2015.
[5] H. Chen, C. Zhai, Y. Li, B. Vucetic, "Cooperative strategies for wireless-powered communications: an overview," IEEE Wireless Communications, vol. 25 no. 4,DOI: 10.1109/mwc.2017.1700245, 2018.
[6] Y.-J. Kim, H. S. Bhamra, J. Joseph, P. P. Irazoqui, "An ultra-low-power RF energy-harvesting transceiver for multiple-node sensor application," IEEE Transactions on Circuits and Systems II: Express Briefs, vol. 62 no. 11, pp. 1028-1032, DOI: 10.1109/tcsii.2015.2456511, 2015.
[7] J. Bito, R. Bahr, J. G. Hester, S. A. Nauroze, A. Georgiadis, M. M. Tentzeris, "A novel solar and electromagnetic energy harvesting system with a 3-D printed package for energy efficient internet-of-things wireless sensors," IEEE Transactions on Microwave Theory and Techniques, vol. 65 no. 5, pp. 1831-1842, DOI: 10.1109/tmtt.2017.2660487, 2017.
[8] X. Lu, P. Wang, D. Niyato, D. I. Kim, Z. Han, "Wireless networks with RF energy harvesting: a contemporary survey," IEEE Communications Surveys & Tutorials, vol. 17 no. 2, pp. 757-789, DOI: 10.1109/comst.2014.2368999, 2015.
[9] H. Ju, R. Zhang, "Throughput maximization in wireless powered communication networks," IEEE Transactions on Wireless Communications, vol. 13 no. 1, pp. 418-428, DOI: 10.1109/twc.2013.112513.130760, 2014.
[10] N.-P. Nguyen, T. Q. Duong, H. Q. Ngo, Z. Hadzi-Velkov, L. Shu, "Secure 5G wireless communications: a joint relay selection and wireless power transfer approach," IEEE Access, vol. 4, pp. 3349-3359, DOI: 10.1109/access.2016.2582719, 2016.
[11] V. N. Vo, T. G. Nguyen, C. So-In, D.-B. Ha, "Secrecy performance analysis of energy harvesting wireless sensor networks with a friendly jammer," IEEE Access, vol. 5, pp. 25196-25206, DOI: 10.1109/access.2017.2768443, 2017.
[12] V. N. Vo, T. G. Nguyen, C. So-In, Z. A. Baig, S. Sanguanpong, "Secrecy outage performance analysis for energy harvesting sensor networks with a jammer using relay selection strategy," IEEE Access, vol. 6, pp. 23406-23419, DOI: 10.1109/access.2018.2829485, 2018.
[13] Y. Wang, W. Yang, X. Shang, J. Hu, Y. Huang, Y. Cai, "Energy-efficient secure transmission for wireless powered internet of things with multiple power beacons," IEEE Access, vol. 6, pp. 75086-75098, DOI: 10.1109/access.2018.2883143, 2018.
[14] Q. Wu, M. Tao, D. W. Ng, W. Chen, R. Schober, "Energy-efficient transmission for wireless powered multiuser communication networks," Proceedings of the 2015 IEEE International Conference on Communications (ICC), pp. 154-159, DOI: 10.1109/ICC.2015.7248314, .
[15] Z. Hadzi-Velkov, I. Nikoloska, H. Chingoska, N. Zlatanov, "Proportional fair scheduling in wireless networks with RF energy harvesting and processing cost," IEEE Communications Letters, vol. 20 no. 10, pp. 2107-2110, DOI: 10.1109/lcomm.2016.2593730, 2016.
[16] I. Bang, S. M. Kim, D. K. Sung, "Adaptive multiuser scheduling for simultaneous wireless information and power transfer in a multicell environment," IEEE Transactions on Wireless Communications, vol. 16 no. 11, pp. 7460-7474, DOI: 10.1109/twc.2017.2748942, 2017.
[17] J. Choi, C. Song, J. Joung, "Wireless powered information transfer based on zero-forcing for multiuser MIMO systems," IEEE Transactions on Vehicular Technology, vol. 67 no. 9, pp. 8561-8570, DOI: 10.1109/tvt.2018.2852631, 2018.
[18] H. Lee, H. Kin, K.-J. Lee, I. Lee, "Asynchronous designs for multiuser MIMO wireless powered communication networks," IEEE Systems Journal, vol. 13 no. 3,DOI: 10.1109/jsyst.2018.2827077, 2018.
[19] D. Zhai, H. Chen, Z. Lin, Y. Li, B. Vucetic, "Accumulate then transmit: multiuser scheduling in full-duplex wireless-powered IoT systems," IEEE Internet of Things Journal, vol. 5 no. 4, pp. 2753-2767, DOI: 10.1109/jiot.2018.2815650, 2018.
[20] L. Fan, N. Yang, T. Q. Duong, M. Elkashlan, G. K. Karagiannidis, "Exploiting direct links for physical layer security in multiuser multirelay networks," IEEE Transactions on Wireless Communications, vol. 15 no. 6, pp. 3856-3867, DOI: 10.1109/twc.2016.2530068, 2016.
[21] F. Gandino, B. Montrucchio, M. Rebaudengo, "Key management for static wireless sensor networks with node adding," IEEE Transactions on Industrial Informatics, vol. 10 no. 2, pp. 1133-1143, DOI: 10.1109/tii.2013.2288063, 2014.
[22] Y. Zou, J. Zhu, X. Wang, V. Leung, "Improving physical-layer security in wireless communications using diversity techniques," IEEE Network, vol. 29 no. 1, pp. 42-48, DOI: 10.1109/mnet.2015.7018202, 2015.
[23] Y. Zou, G. Wang, "Intercept behavior analysis of industrial wireless sensor networks in the presence of eavesdropping attack," IEEE Transactions on Industrial Informatics, vol. 12 no. 2, pp. 780-787, DOI: 10.1109/tii.2015.2399691, 2016.
[24] M. Bloch, J. Barros, Physical-layer Security: From Information Theory to Security Engineering, 2011.
[25] L. Wang, K. J. Kim, T. Q. Duong, M. Elkashlan, H. V. Poor, "Security enhancement of cooperative single carrier systems," IEEE Transactions on Information Forensics and Security, vol. 10 no. 1, pp. 90-103, DOI: 10.1109/tifs.2014.2360437, 2015.
[26] L. J. Rodriguez, N. H. Tran, T. Q. Duong, T. Le-Ngoc, M. Elkashlan, S. Shetty, "Physical layer security in wireless cooperative relay networks: state of the art and beyond," IEEE Communications Magazine, vol. 53 no. 12, pp. 32-39, DOI: 10.1109/mcom.2015.7355563, 2015.
[27] M. Yang, D. Guo, Y. Huang, T. Q. Duong, B. Zhang, "Secure multiuser scheduling in downlink dual-hop regenerative relay networks over Nakagami- m fading channels," IEEE Transactions on Wireless Communications, vol. 15 no. 12, pp. 8009-8024, DOI: 10.1109/twc.2016.2610965, 2016.
[28] M. Yang, D. Guo, Y. Huang, T. Q. Duong, B. Zhang, "Physical layer security with threshold-based multiuser scheduling in multi-antenna wireless networks," IEEE Transactions on Communications, vol. 64 no. 12, pp. 5189-5202, DOI: 10.1109/tcomm.2016.2606396, 2016.
[29] G. Wang, Q. Liu, R. He, F. Gao, C. Tellambura, "Acquisition of channel state information in heterogeneous cloud radio access networks: challenges and research directions," IEEE Wireless Communications, vol. 22 no. 3, pp. 100-107, DOI: 10.1109/mwc.2015.7143332, 2015.
[30] T. Paing, J. Shin, R. Zane, Z. Popovic, "Resistor emulation approach to low-power RF energy harvesting," IEEE Transactions on Power Electronics, vol. 23 no. 3, pp. 1494-1501, DOI: 10.1109/tpel.2008.921167, 2008.
[31] Z. Chen, L. Hadley, Z. Ding, X. Dai, "Improving secrecy performance of a wirelessly powered network," IEEE Transactions on Communications, vol. 65 no. 11, pp. 4996-5008, DOI: 10.1109/tcomm.2017.2732449, 2017.
[32] A. A. Nasir, X. Zhou, S. Durrani, R. A. Kennedy, "Relaying protocols for wireless energy harvesting and information processing," IEEE Transactions on Wireless Communications, vol. 12 no. 7, pp. 3622-3636, DOI: 10.1109/twc.2013.062413.122042, 2013.
[33] X. Zhou, R. Zhang, C. K. Ho, "Wireless information and power transfer: architecture design and rate-energy tradeoff," IEEE Transactions on Communications, vol. 61 no. 11, pp. 4754-4767, DOI: 10.1109/tcomm.2013.13.120855, 2013.
[34] N. Shinohara, Wireless Power Transfer via Radiowaves, 2014.
[35] X. Kang, Y.-C. Liang, J. Yang, "Riding on the primary: a new spectrum sharing paradigm for wireless-powered IoT devices," IEEE Transactions on Wireless Communications, vol. 17 no. 9, pp. 6335-6347, DOI: 10.1109/twc.2018.2859389, 2018.
[36] T. M. Hoang, T. Q. Duong, N.-S. Vo, C. Kundu, "Physical layer security in cooperative energy harvesting networks with a friendly jammer," IEEE Wireless Communications Letters, vol. 6 no. 2, pp. 174-177, DOI: 10.1109/lwc.2017.2650224, 2017.
[37] O. O. Koyluoglu, C. E. Koksal, H. E. Gamal, "On secrecy capacity scaling in wireless networks," IEEE Transactions on Information Theory, vol. 58 no. 5, pp. 3000-3015, DOI: 10.1109/tit.2012.2184692, 2012.
[38] I. S. Gradshteyn, I. M. Ryzhik, Table of Integrals, Series, and Products, 2007.
[39] J. Farhat, G. Brante, R. D. Souza, J. L. Rebelatto, "Energy efficiency of repetition coding and parallel coding relaying under partial secrecy regime," IEEE Access, vol. 4, pp. 7275-7288, DOI: 10.1109/access.2016.2622062, 2016.
[40] W. Liu, X. Zhou, S. Durrani, P. Popovski, "Secure communication with a wireless-powered friendly jammer," IEEE Transactions on Wireless Communications, vol. 15 no. 1, pp. 401-415, DOI: 10.1109/twc.2015.2474378, 2016.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Copyright © 2020 Xiaohui Shang et al. This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Abstract
In this paper, we consider the secure green-oriented multiuser scheduling for the wireless-powered Internet of Things (IoT) scenario, in which multiple source sensors communicate with a controller assisted by an intermediate sensor with the existence of a passive tapping device. Due to the limited energy, all sensors must acquire energy from external power beacons (PBs). Specifically, for the security improvement, we introduce two multiuser scheduling schemes possessing the optimal PB chosen by the relay, i.e., the best source sensor is scheduled in a random way (BSR), while the best source sensor is decided by the best PB (BSBP). Furthermore, for every scheme, we derive the analytical expressions for the secrecy outage probability (SOP) and investigate the secure energy efficiency (SEE) optimization problem with constricted transmission power in PBs. Simulation results reveal that the BSBP scheme provides better secrecy performance, and elevating the PBs quantity or reducing both the ratio of distance from PBs to source users and the total communication distance to some extent is helpful for improving SEE. In addition, the time-switching factor shows an important effect upon secrecy performance of the considered system.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Details

1 College of Communications Engineering, Army Engineering University of PLA, Nanjing 210007, China; Institute of Systems Engineering, AMS, Beijing 100039, China
2 Institute of Systems Engineering, AMS, Beijing 100039, China
3 College of Communications Engineering, Army Engineering University of PLA, Nanjing 210007, China