1. Introduction
Wireless sensor networks (WSNs) has been emerged as a networking solution for future wireless networks supporting Internet-of-thing (IoT) ecosystems [1,2]. In practice, WSNs are deployed in the battlefield or hazardous environments to allow collecting and monitoring the physical phenomena without human interaction [3,4]. However, one of the most challenges faced by traditional WSNs is how to maintain the network lifetime since the sensor nodes are low cost, small size, and have limited power supply [5]. Moreover, energy for encoding and protecting information against eavesdropping is also raising a significant burden on the traditional WSNs and IoT systems. Wireless power transfer (WPT) is a sustainable energy solution to efficiently solve such a problem in WSNs since each sensor node can harvest energy from multiple power beacons (PBs) to maintain their operation [6,7,8]. Specifically, the authors in [9] introduced the time-switching-based relaying (TSR) and power splitting-based relaying (PSR) architectures to allow energy harvesting and information processing at a battery-less relay node, which enables a wide range of attractive applications with stringent quality of services in future IoT systems and WSNs. Recently, the researches on energy harvesting address the harvesting energy from the light-emitting diode (LED) as well as the radio frequency (RF) in indoor IoT systems [10].
Multi-hop transmission has been identified as an effective technique to extend the networks coverage in WSNs by leveraging information transmission from a source node to a destination node via multiple intermediate sensor nodes. However, the broadcast of the wireless signals in multi-hop transmissions is easily wiretapped by illegitimate users [11]. Physical layer security (PLS) is one of the most effective approaches to protect the information against eavesdroppers by exploiting physical characteristics of wireless channels [12]. Moreover, the PLS concept can be naturally applied to the WPT-based multi-hop transmission in WSNs, where the PBs not only radiate RF signals to power to the sensor nodes but also generate artificial noise to degrade the eavesdropping channels. The secrecy outage probability (SOP) is one of the system metrics to evaluate secure performance, and is defined as the probability that the difference between capacity of the main channel and that of the eavesdropper channel falls below a predefined secrecy target data rate [13,14]. Additionally, perfect secure transmission is achieved when the channel state information (CSI) of the main channel is higher than that of the eavesdropper channel [15].
1.1. Related Works and Motivations
In this subsection, we discuss the most recent works for the PLS and WPT-based enabling multi-hop transmission in WSNs. Do et al. in [16] proposed the relay selection schemes to enhance the system performance under independent and non-identical distribution (i.n.i.d.) fading channel. The paper also proposed the PSR mechanism for relays to harvest energy from the source RF radiation. The authors in [17] proposed two antenna selection schemes by using the CSI to improve secrecy performance in underlay cognitive radio network. Additionally, the secondary transmitter can harvest energy from the primary transmitter’s signal to transmit the message to a secondary receiver. In [18], the authors considered the cooperative relaying system, where the relay is equipped with TSR architecture to support data transmission from a source and a destination with maximal ratio combining (MRC) technique. In [19], the authors considered the wireless energy harvesting (EH) multi-hop cluster-based networks, where the destination in the considered networks is equipped with multiple antenna and proposed relay selection schemes to enhance the system performance. In our previous work [20], we proposed the WPT-based multi-hop transmission model in the presence of an eavesdropper. More specifically, the power beacons radiated the jamming signal during the data transmission phase to reduce the eavesdropper’s CSI. However, reference [20] did not consider cluster networks.
The authors in [21] considered multi-hop transmission under multiple eavesdroppers over Nakagami-m fading channel. However, the authors did not consider node selection to enhance secrecy performance in the considered model. The author in [22] studied the secrecy performance in multi-hop relaying systems, where the relays worked on full-duplex mode. However, this work had some limitations that the full-duplex relay could cancel the self-interference, and the author did not consider any technique to enhance the secrecy performance on the considered system similar to [21]. The authors in [23] exploited the secrecy performance in multi-hop transmission under the underlay cognitive radio networks. The authors addressed that the CSI of interference link is imperfect. Interestingly, in the case of one primary user, the imperfect CSI did not affect the secrecy performance. From the aforementioned works [21,22,23], the multi-hop transmission shows that the system secrecy performance decreases when the number of hops increases.
In order to enhance the secrecy performance in multi-hop transmission, some authors have addressed the opportunistic scheduling in multi-hop transmission systems. The authors in [24] proposed opportunistic scheduling scheme in cluster networks to improve the secrecy performance. The nodes were selected to improve the main channel performance. Additionally, the eavesdropper employed the MRC technique to enhance wiretapping performance. Recently, the authors in [25] addressed the path-selection method to enhance the secrecy performance in multi-hop transmission for wireless sensor networks. Additionally, the authors exploited the impact of hardware impairment in secrecy performance. In [26], the authors exploited the cooperative multi-hop transmission protocol in underlay cognitive radio networks. The authors considered hardware impairments for a more practical scenario. However, the authors did not propose any technique to improve the system secrecy performance. From the numerical results, in spite of node/path selection schemes, the considered system achieves very low secrecy performance. The PLS is addressed in multi-hop transmission in [23,24,25,26]. Thus, future research needs to consider not only opportunistic scheduling scheme but also some techniques to enhance the secrecy performance in multi-hop scenarios.
The aforementioned works [16,18,19,20] mainly focused on EH-based multi-hop transmission or [21,22,23,24,25,26] considered multi-hop secure transmission, which is not feasible in practice. In practical WSNs, because of the limited antenna performance of sensor nodes and deep shadowing, the direct link between source node and destination node is not available. The sensor nodes cooperate with other sensor nodes in order to overcome the channel attenuation between the source node and destination node. However, different from the legitimate users transmission, the eavesdropper overhears the legitimate users transmission in the vicinity. Thus, in the WSNs, sensor nodes are densely deployed and grouped into clusters as well as the existing wiretapping attacks. The study of PLS in WPT-based multi-hop transmissions is necessary for WSNs. Additionally, from [23,24,25,26], the multi-hop transmissions show low secrecy performance when the number of hops is increased. Thus, the PLS in WPT-based multi-hop transmissions plays a vital role in the future WSNs and IoT systems.
1.2. Contributions and Organization
In this paper, we study the effects of node selection on the performance of WPT-based multi-hop transmissions in WSNs. Specifically, we propose two node selection schemes to improve the secrecy performance, named the minimum node selection (MNS) scheme and optimal node selection (ONS) scheme. In particular, the MNS scheme selects the sensor node in each cluster based on the minimization of the eavesdropper channel capacity, while the ONS scheme tries to choose the best sensor node that maximizes the secrecy capacity in each hop transmission. Furthermore, the power beacons are deployed to not only charge the sensor nodes in energy harvesting phase but also generate the jamming signal to confuse the eavesdropper in data transmission phase. By employing the randomize-and-forward strategy [27,28], the considered cooperative relaying prevents the eavesdropper from combining the wiretapped information during the data transmission phase. The main contributions of this paper can be summarized as follows:
We deploy an effective secure model for WPT-based multi-hop transmission to improve the energy capability of sensor nodes and reduce the decoding ability of eavesdropper in WSNs. Specifically, the dedicated RF signal for powering sensor nodes can be used to interfere the wiretapping channels. The considered WPT-based multi-hop transmission has been reported in this literature.
We propose two scheduling schemes to improve the secrecy performance in WSNs. We then derive the new exact closed-form expressions for the SOP of the proposed schemes. The asymptotic analyses of the SOP are further provided to show some insight information into the considered system. The analytical results are verified by Monte-Carlo simulations confirming the correctness of our analysis.
We show through the numerical results that the ONS scheme provides the best secrecy performance among the proposed schemes. Additionally, the effects of the number of sensor nodes, the number of PBs, and time switching ratio on the secrecy performance are also evaluated and discussed.
The rest of the paper is organized as follows. Section 2 describes the system model. Section 3 analyzes the exact closed-form expression for SOP of the proposed schemes. Section 4 presents the numerical results based on the derived analytical results. Finally, the paper is concluded in Section 5.
2. System Model
2.1. System Description and Channel Modeling
Let us consider a WPT-based multi-hop transmission in wireless sensor networks, as depicted in Figure 1, where a desired source in the first cluster transmits its information to a destination with the help of intermediate nodes located in K-1 cluster, with K > 1, while an eavesdropper overhears the signals transmitted by the source and relays. In this paper, we assume that sources and intermediate nodes have a limited power supply; thus, they must harvest energy from RF signal radiated by a set of M power beacons, i.e., = {| m = 1, 2, ..., M}. We assume that the power beacons have the same structure and transmit the power at the same level, i.e., = P [19]. Moreover, all sensor nodes are equipped with a single antenna and operated in half-duplex mode. We further assume that the direct link from the source node to the destination node is not available due to the limited radio range of each sensor node and deep shadowing [19,25,29].
The main notations used in this paper are summarized in Table 1. Moreover, we assume that all channels exhibit flat and block Rayleigh fading. Let be the channel coefficient from to , where , } and {, , , } with . Thus, the channel gain follows the exponential distribution whose cumulative distribution function (CDF), = 1 , and probability density function (PDF), = , respectively, where indicates the mean of and can be expressed as = , where presents the Euclidean distance between and , and denote the reference distance and path-loss exponent, respectively.
The operation of the considered system can be divided into two consecutive phases including energy harvesting and data transmission which are presented in the next subsection. Additionally, the aims of the power beacons in each phase, called energy harvesting and data transmission phase, can be summarized as follows:
Energy harvesting phase: According to wireless power transfer technique [9], the power beacons support the sensor nodes to harvest energy. Thus, in the energy harvesting phase, sensor nodes can harvest energy from the power beacons.
Data transmission phase: In multi-hop transmission, sensor nodes transmit information by consuming the harvested energy. Thus, the eavesdropper can overhear the legitimate user’s information. In order to enhance the secrecy performance, the power beacons radiate the jamming signal to degrade the received signal-to-noise ratio (SNR) of the eavesdropper.
2.2. Energy Harvesting Phase
Figure 2 illustrates the time block structure of the considered system employing time switching architecture [9], where all sensor nodes simultaneously harvest energy from the M s in duration of while the data transmissions is taken place in K orthogonal sub-time slots. The harvested energy at can be expressed as
(1)
Therefore, the average transmit power of in a sub-time slot can be calculated as
(2)
2.3. Data Transmission Phase
In this phase, the source nodes transmit their data to the destination node via multiple intermediate sensor nodes while the power beacons generate the artificial noise to degrade the wiretapping channel of the eavesdropper. More specifically, as can be seen in Figure 2, k-th hop data transmission slot indicates that the transmission between a sensor node, called i node in (k-1)-th relay cluster, and an other sensor node, named j node in k-th relay cluster. Because each sensor node equips with half-duplex mode, in k-th time slot, the received sensor node in k-th relay cluster can transmit its message to an other sensor node in the next transmission slot. Simultaneously, the power beacon radiates the jamming signal as a role of friendly jammer in data transmission phase. We assume that each legitimate user and PBs cooperate such that the jamming signal can be nulled out at legitimate users [30,31]. Thus, the received signal at can be expressed as
(3)
where the denotes the channel coefficients of link and presents the additive white Gaussian noise (AWGN) at with zero mean and variance . Without loss of generality, we assume that the each node has the same variance of noise, i.e., = . The instantaneous SNR of the main channel at k hop can be expressed as(4)
Meanwhile, the eavesdropper can overhear the information from the legitimate users due to the nature broadcast of the wireless signals. Thus, the wiretapped signals in k-th hop transmission at can be expressed as
(5)
Since the power beacons generate the jamming signals to degrade the decoding ability of the eavesdropper. Thus, the instantaneous signal-to-interference-plus-noise ratio (SINR) of k-th hop at can be expressed as
(6)
In order to facilitate the analysis and highlight the secure performance under different opportunistic scheduling schemes, we assume that the perfect CSI is available at all receivers [24,25,26,32,33] (In [34], the authors proposed the method of the eavesdropper channel estimation without eavesdropper feedback. The other legitimate users, called torch nodes, feedback their channel information instead of the eavesdropper. Since we mainly focus on the impact of the node selection schemes in the considered SOP performance of WPT-based multi-hop transmission. The study of imperfect CSI of eavesdropper link in our system model is indeed an interesting topic and will be considered in our future works).
2.4. Opportunistic Scheduling Scheme
In this subsection, we explain the proposed opportunistic scheduling schemes for multi-hop transmission in WSNs. In order to analyze the impacts of scheduling schemes on the secure performance, we assume that various techniques, e.g., clustering protocols [35,36], eavesdropper channel estimation [34], distributed coordination function (DCF) in IEEE 802.11 [37,38], etc., perfectly support the proposed node selection schemes as in [24,26,32,33].
2.4.1. Random Node Selection Scheme
We consider the random node selection scheme as a baseline scheme for comparison purpose. In particular, the RNS scheme randomly selects a relay in each cluster for multi-hop transmission [19]. Thus, the instantaneous SNRs of main channel and eavesdropper channel can be expressed, respectively, as
(7)
(8)
2.4.2. Minimum Node Selection Scheme
In MNS scheme, the selected node is the least vulnerable node among the nodes in each cluster, which minimizes the channel capacity of eavesdropper channel in each cluster. Thus, MNS scheme can be mathematically described as
(9)
The instantaneous SNRs of main channel and eavesdropper channel can be expressed, respectively, as
(10)
(11)
where and indicate the average transmit power and channel gain of the selected sensor node in k-th cluster through the MNS scheme, respectively.2.4.3. Optimal Node Selection Scheme
In this scheme, the main and eavesdropper channels are jointly considered, thus, ONS scheme can achieve the most robust performance [33,39]. Since the ONS scheme utilizes both the main and eavesdropper channel to enhance secrecy performance, the selection criteria can be mathematically described as
(12)
where indicates the selected node which has already chosen in the previous hop.3. Outage Performance Analysis
In this section, we analyze the effects of each scheduling scheme on the secrecy performance of the considered system setup. We evaluate the secrecy outage probability which is defined as [23,33,40]
(13)
where ∈ {, , } and (bps/Hz) indicate the secrecy target data rate of each node selection scheme. For the sake of notational convenience, ≜, ≜, ≜, ≜, ≜, ≜, ≜, and ≜, respectively.3.1. Exact Closed-Form Expression for SOP Analysis
3.1.1. RNS Scheme
The exact closed-form expression for the SOP of RNS scheme can be derived as
(14)
where , = ()/ , is the modified Bessel function of the second kind with order ν ([41], eq. 8.342.6), is the Gamma function ([41], 8.310.1), and is the upper incomplete Gamma function ([41], eq. 8.350.2), respectively.See Appendix A. □
3.1.2. MNS Scheme
The exact closed-form expression for the SOP of MNS scheme can be derived as
(15)
where and = ( )/ .See Appendix B. □
3.1.3. ONS Scheme
The exact closed-form expression for the SOP of ONS scheme can be derived as
(16)
where , = / and presents the Whittaker function ([41], eq. 9.220.4).See Appendix C. □
3.2. Asymptotic SOP Analysis
In this subsection, we consider the asymptotic expressions of SOP with both schemes in order to insights when →∞. In order to obtain asymptotic SOP, we apply the following approximation for small as [18]
(17)
3.2.1. RNS Scheme
The asymptotic SOP of RNS scheme can be derived as
(18)
where(19)
From (14), we apply (17), can be further written as
(20)
where is defined as in (19). The proof of Corollary 1 is concluded. □3.2.2. MNS Scheme
The asymptotic SOP of MNS scheme can be derived as
(21)
where the following notation is adopted(22)
Similar to Corollary 1, the asymptotic SOP of MNS scheme can easily obtained as (21). The proof of Corollary 2 is concluded. □
3.2.3. ONS Scheme
The asymptotic SOP of ONS scheme can be derived as
(23)
where Ψ is defined as in (A50).Similar to Corollary 1, the asymptotic SOP of ONS scheme can easily obtained as (23). The proof of Corollary 3 is concluded. □
4. Numerical Results
In this section, we present representative numerical results to illustrate the achieve secrecy outage performance of the proposed schemes. Unless otherwise stated, the simulation parameters are presented in Table 2 [19,20].
First of all, we exploit the impact of the energy parameters, i.e., transmit SNR of power beacons, the number of power beacons, and time switching ratio, to the average harvested energy of sensor node cluster. As can be seen in Figure 3, the average harvested energy of the sensor node cluster increases when the energy parameters is increased. In detail, in Figure 3a, the average harvested energy is linearly increased when transmit SNR of power beacons increases. Different from Figure 3a, when the number of power beacons increases, the slope of the harvested energy of sensor node cluster is decreased as shown in Figure 3b. The slope of the average harvested energy of sensor node cluster is decreased when the time switching ratio increases as shown in Figure 3c. From Figure 3, when transmit SNR of power beacons, the number of power beacons and time switching ratio increases, the sensor node can harvest enough energy to operate the sensor node [42]. It is noted that, as can be seen Table 2, the sensor node cluster is located at the most farthest from the power beacons. Thus, other clusters can naturally harvest more energy from the power beacons to transmit message and sense. Additionally, during the networks planning step, the engineers or administrators can make a network that the sensor nodes can sufficiently harvest the energy to transmit pilot and data messages or other source consumption.
We turn our attention to the impact of the system parameters on the secrecy outage performance. We studied the impact of transmit SNR, , on the SOP of the proposed schemes. As can be observed in Figure 4, the secrecy performances of all schemes were enhanced when the transmit SNR was increased. The reason is that the jamming signals significantly interfere with the eavesdropper channel when the transmit SNR of the power beacons is large. Additionally, the ONS scheme shows the robust performance among the proposed schemes since the ONS scheme required both CSI of the main and eavesdropper channels as in (12). In Figure 4, when the transmit SNR of power beacons was increased, the secrecy outage performance of the considered system model was significantly increased. One of possible reasons is that, in data transmission phase, the power beacons radiate the jamming signal to degrade the received SINR of the eavesdropper links.
Figure 5 illustrates the effect of the time switching ratio, , on the SOP of the proposed schemes. The pattern of SOP presents the convex function that means the proposed scheme makes an adequate time switching ratio to improve system secrecy performance. When the time switching ratio was higher than 0.8, the system performance seemed to be saturated. Finally, the appropriately selected time switching ratio played an important role in network planning to enhance the overall system performance.
The effect of the secrecy target data rate, , on the SOP is presented in Figure 6. A high secrecy target data means that the system requires a high system secrecy level. Thus, the outage event frequently occurs when system requires a high threshold. Furthermore, the SOPs of all schemes are increased when the secrecy target data rate increases. Different from the RNS and MNS schemes, the ONS scheme significantly enhances the system performance under the same channel settings. The reason is that the ONS scheme requires both main and eavesdropper channel information to select the node in each cluster to perform multi-hop transmission. Moreover, the results from Figure 4 to Figure 6 show that the theoretical results are in good agreement with the simulation ones validating the correctness of our derivation approaches.
Now, we turn our attention to the effects of the number of hops, number of nodes in each cluster and number of power beacons on the system secrecy performance. Figure 7 plots the SOPs as a function of the number of hops. As can be observed, ONS scheme showed better secrecy performance than that of MNS and RNS schemes. The reason is that the RNS scheme does not consider the channel information to select the sensor node in each hop while MNS scheme only considers the eavesdropper channel. Differently, ONS scheme considers both main and eavesdropper channel information to select the best sensor node in each hop to perform the multi-hop transmission. Thus, the secrecy performance of ONS scheme outperforms the other proposed schemes in the same system setup. Similar to the time switching ratio, the number of hops shows the convex patterns in all node selection schemes; thus, appropriately selecting the number of hops plays an important role in network planning to enhance the system secrecy performance.
Figure 8 presents the SOPs as a function of the number of sensor node in each cluster. As can be observed, when the number of nodes in each cluster was increased, the SOPs of ONS and MNS schemes were increased, while the SOP of RNS scheme was still unchanged. The reason is that RNS scheme randomly selects a node in each cluster for multi-hop transmission. More specifically, the MNS scheme requires the eavesdropper channel information to select the sensor node in each hop. Thus, the SOP of MNS scheme shows better performance than that of RNS scheme. Different from other schemes, since ONS scheme utilizes both main and eavesdropper channel information to select the node, ONS scheme dramatically enhances the secrecy performance compared to that of the other schemes when the number of node in each cluster increases.
Figure 9 illustrates the SOP as a function of the number of power beacons. The SOPs of the proposed schemes were enhanced when the number of power beacons was increased. The reason is that the SINR of eavesdropper channel degrades when the number of power beacons increases in (6). As can be observed, the SOPs of MNS and ONS schemes are significantly improved compared to that of RNS scheme. The reason is that MNS scheme consider the CSI of eavesdropper channel to select the sensor node in a each cluster while the ONS scheme utilizes both the CSI of main channel and eavesdropper channels to select the best sensor node in a each cluster. Thus, the secrecy performance is significantly enhanced under the same system setup. In Figure 8 and Figure 9, when the number of sensor nodes in each cluster and the number of power beacons is increased, the system secrecy performance is increased excepted the RNS scheme. It is noted that increasing the number of sensor nodes in each cluster significantly enhances the secrecy performance compared to that of increasing the number of power beacons in the same network settings.
Finally, we exploit the complexity order of each node selection scheme as in Table 3. Complexity order represents the required channel estimation to select the node and transmit information [43,44]. As can be seen in Table 3, the amount of channel information of the RNS scheme was the smallest among the proposed scheduling schemes. The reason is that the RNS scheme does not require the channel information to select the node. Thus, the total required channel information is K. Differently, MNS scheme needs to estimate the channel information to select the best node. Thus, the total complexity order is . Optimally, ONS scheme utilizes both main and eavesdropper channels information to select the best node. Since the nodes are sequentially selected from the destination node, the amount of the required channel information at a certain hop transmission is , and the amount of the required channel information for K hops transmission is . Through Table 3, each scheme has a specific advantage and drawback. Thus, in network planning perspective, each scheme can be cleverly applied in the practice to achieve a good trade-off between secrecy performance and complexity.
5. Conclusions
This paper proposed the system model and the scheduling scheme to enhance the secrecy performance for WPT-based multi-hop transmission in WSNs. More specifically, the power beacon served as a friendly jammer to reduce the CSI of eavesdropper as well as the radiation energy to harvest the sensor node. We proposed two kinds of node selection schemes, called as MNS and ONS schemes, to improve the secrecy performance. The MNS scheme selected the sensor node to minimize the eavesdropper channel information in each cluster while ONS schemes utilized both main and eavesdropper channel information to select the best cooperative node in each cluster. We derived the exact closed-form expression for SOP of the proposed schemes. In addition, to provide more insights into the proposed schemes, we derived asymptotic SOP. From the numerical results, the secrecy performance of the ONS scheme outperformed compared to that of MNS scheme under the same system setup. However, through the complexity order analysis, the ONS scheme showed the more required channel information to select the sensor node and transmit information than that of MNS scheme.
Author Contributions
The main contributions of K.S. were to create the main ideas and execute performance evaluations by theoretical analysis and simulation. T.-V.N. worked on the related works to review the idea, supporting the theoretical analysis, and improved the writing of the paper. B.A. worked as the advisor of K.S. and T.-V.N. to discuss, create and advise the main ideas and performance evaluations together.
Funding
This work was supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (Grant no. 2016R1D1A1B03934898) and by the National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIT) (No. 2019R1A2C1083996).
Conflicts of Interest
The authors declare no conflict of interest.
Appendix A. The Proof of Theorem 1
From (13), the SOP of RNS scheme, , can be expressed as
(A1)
From (7) and (8), in (A1) can be rewritten as
(A2)
We then calculate in (A2) as
(A3)
Next, can be calculated as
(A4)
With the help of ([41], eq.(3.310)), we obtain as
(A5)
Substituting (A5) into (A3), can be expressed as
(A6)
Since is the summation of M exponential random variables, follows the Gamma distribution [14,19]. Hence, the CDF and PDF of can be expressed as
(A7)
(A8)
Plugging the PDF of into (A6), along with the helps of ([41], eq. (3.351.3)) and ([41], eq. (3.471.9)), in (A6) can be obtained as
(A9)
Next, substituting (A9) into (A6) and applying ([41], eq. 3.351.3), can be expressed as
(A10)
Relying on ([41], eq. 3.351.3) and ([41], eq. 3.383.10), in (A10) can be obtained as
(A11)
Plugging (A11) into (A10) and after some mathematical manipulations, we can obtain (14). The proof of Theorem 1 is concluded.
Appendix B. The Proof of Theorem 2
From (13), the SOP of the MNS scheme, , can be rewritten as
(A12)
Similar to RNS scheme, in (A12) can be rewritten as
(A13)
As can be observed, the events of the probability (A13) are not mutually exclusive since they include the same components [33,45]. Thus, by conditioning = z, can be further rewritten as
(A14)
Based on the total probability [46], can be calculated as
(A15)
The following lemmas will help to calculate (A15). First, Lemma A1 helps to obtain the probability of a certain node based on the criterion (9).
Lemma A1.
in (A15) can be written as
(A16)
Proof.
The proof can be found in [33]. □
Next, the CDF and PDF of can be obtained by the following lemma.
Lemma A2.
The CDF and PDF of can be, respectively, derived as
(A17)
(A18)
Proof.
From the node selection criterion (9), the CDF of can be expressed as
(A19)
Next, in (A19) can be written as
(A20)
By conditioning = y, can be rewritten as
(A21)
Plugging (A21) into (A19) and after some careful manipulations, we can easily obtain the (A17) and (A18). This proof of Lemma A2 is concluded. □
Next, the CDF and PDF of can be obtained by the following lemma.
Lemma A3.
The CDF and PDF of the can be, respectively, derived as
(A22)
(A23)
Proof.
From the (9), the CDF of can be rewritten as
(A24)
After some manipulations, (A24) can be further expressed as
(A25)
Applying ([41], eq. 3.310), the CDF and PDF of can be obtained as in (A22) and (A23), respectively. The proof of Lemma A3 is concluded. □
Next, plugging (A16), (A17) and (A23) into (A15), in (A15) can be expressed as
(A26)
Applying ([41], eq. 3.310), can be obtained as
(A27)
By substituting (A27) into (A15), can be rewritten as
(A28)
From (A28), can be further expressed as
(A29)
In order to further calculate (A29), we apply ([41], eq. 3.351.3) and ([41], eq. 3.471.9) for and , respectively. We can obtain the results as
(A30)
By plugging (A30) into (A29), along with the help of ([41], eq. 3.351.3), can be calculated as
(A31)
In order to further calculate the integration in (A31), can be calculated as
(A32)
where is defined as (15). Similar to (A11) in RNS scheme, we utilize ([41], eq. 3.351.3) and ([41], 3.383.10) to obtain as(A33)
Plugging (A33) into (A31) and after some careful manipulations, the exact closed-form expression for the SOP of MNS scheme can be obtained as (15). The proof of Theorem 2 is concluded.
Appendix C. The Proof of Theorem 3
From (13), the SOP of ONS scheme can be expressed as
(A34)
Similar to the MNS scheme, in (A34) can be further rewritten as
(A35)
As can be seen, the events of the probability in (A35) are not mutually exclusive since they include the same components [33,45]. By conditioning on = t, can be further expressed as
(A36)
Based on the criterion in (12), (A36) can be expressed as
(A37)
In order to further calculate the integration in (A37), can be rewritten as
(A38)
Recalling Lemma A2, in (A38) can be calculated as
(A39)
Applying ([41], 3.310), we can obtain as
(A40)
By substituting (A40) into (A38), can be further written as
(A41)
By applying ([41], 3.351.3) and ([41], 3.471.9) for and , respectively, we can obtain as
(A42)
Consequently, can be obtained as
(A43)
By plugging (A43) into (A37) and after some mathematical steps, can be written as
(A44)
Based on the binomial theorem, (A44) can be further expressed as
(A45)
Again, utilizing the binomial theorem, in (A45) can be further expressed as
(A46)
where is defined as (16) and by plugging (A46) into (A45), can be written as(A47)
In order to calculate the integration in (A47), we change the variable as u = + v; can be rewritten as
(A48)
Making use of ([41], 3.383.4), can be calculated as
(A49)
where is defined as (16). By plugging (A49) into (A47), can be obtained as(A50)
By plugging (A50) into (A34), the exact closed-form expression of ONS scheme can be obtained as (16). The proof of Theorem 3 is concluded.
Figures and Tables
Figure 1. Illustration of the proposed multi-hop transmissions in wireless sensor network.
Figure 2. The transmission time block structure of the wireless power transfer (WPT)-based multi-hop transmissions in wireless sensor network for energy harvesting and data transmission.
Figure 3. The impact of energy parameters on the average harvested energy of the cluster of sensor nodes with M = 4, Nk = 2, K = 3, η = 0.7, α = 0.15, γ = 10 dB and Rth = 1 bps/Hz. (a) Energy harvesting (EH) versus γ; (b) EH versus M; (c) EH versus α.
Figure 4. The illustration of the effect of γ on the secrecy outage probability (SOP) with M = 4 and K = 3.
Summary of main notations.
Symbol | Definition |
---|---|
Power beacons m with m ∈ {1, 2, ..., M}. | |
Source node in the first cluster, where i ∈ {1, ...,}. | |
Destination node. | |
The number of relay in the k-th cluster, k ∈ {0,1,..., K-1} and ≥ 1. | |
The i-th sensor node in the k-th cluster., ≡ and ≡ with k ∈ {0, ..., K }. | |
The eavesdropper node. | |
The channel gain of link → . | |
The channel gain of link → . | |
The channel gain of link → . | |
The channel gain of link → . | |
, , and | Mean of , , and , respectively. |
with | Time switching ratio. |
with | The energy conversion efficiency. |
Summary of simulation parameters.
Parameters | Value |
---|---|
The distance between and , | 10 m |
The reference distance, | 1 m |
The position of | (0, 0) |
The position of | ( k/K, 0) |
The position of | (10, 0) |
The position of | (, ) |
The position of | (, 5) |
The number of relays in each cluster, | 2 |
The secrecy target data rate, | 1 bps/Hz |
Pathloss exponent, | |
Pathloss at reference distance, at | dB |
Energy conversion efficiency, | |
Time switching ratio, |
The comparison of complexity order in the proposed schemes.
Scheme | RNS | MNS | ONS |
---|---|---|---|
Complexity Order | K |
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
© 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Abstract
This paper studies the secrecy performance of wireless power transfer (WPT)-based multi-hop transmissions in wireless sensors networks (WSNs), where legitimate nodes harvest energy from multiple power beacons (PBs) to support the multi-hop secure data transmission to a destination in the presence of an eavesdropper. Specifically, the PBs not only transfer radio frequency energy to the legitimate nodes but also act as friendly jammers to protect data transmission. To improve secrecy performance, we propose two secure scheduling schemes, named minimum node selection (MNS) scheme and optimal node selection (ONS) scheme. We then evaluate the performance of the proposed schemes in terms of the exact closed-form for secrecy outage probability (SOP) and asymptotic SOP. The developed analyses are verified by Monte-Carlo simulations. The numerical results show that the ONS scheme outperforms the MNS scheme emerging as an effective protocol for secure multi-hop transmission in WSNs. Furthermore, the effects of the number of PBs, number of hops, time switching ratio, and the secure target data rate on the system performance are also investigated.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Details



1 Department of Electronics and Computer Engineering, Hongik University, Sejong City 30016, Korea;
2 Department of Software and Communications Engineering, Hongik University, Sejong City 30016, Korea