z-logo
open-access-imgOpen Access
Security and reliability performance analysis for two‐way wireless energy harvesting based untrusted relaying with cooperative jamming
Author(s) -
Mamaghani Milad Tatar,
Abbas Robert
Publication year - 2019
Publication title -
iet communications
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.355
H-Index - 62
eISSN - 1751-8636
pISSN - 1751-8628
DOI - 10.1049/iet-com.2018.5718
Subject(s) - relay , computer science , jamming , artificial noise , transmission (telecommunications) , wireless , reliability (semiconductor) , computer network , benchmark (surveying) , energy (signal processing) , noise (video) , monte carlo method , noise power , wireless network , electronic engineering , telecommunications , power (physics) , physical layer , engineering , mathematics , statistics , artificial intelligence , physics , quantum mechanics , thermodynamics , image (mathematics) , geodesy , geography
In this study, the authors investigate the security and the reliability performance of a two‐way relay‐based network, where a source–destination pair establishes secured communication through a wireless‐powered untrusted amplify‐and‐forward relay while employing a friendly jammer. The relay utilises the harvested energy from radio‐frequency signals sent by the sources to forward the received data; however, the friendly jammer employs that to generate and transmit noise‐like signals to confuse the curious relay. Two power transmission protocols, namely variable power transmission (VPT) and constant power transmission (CPT) at the jammer and relay are adopted. As a benchmark to highlight the performance advantages of employing a jammer, they also considered the case of zero power transmission (ZPT), where there is no jammer in the network. For the three scenarios, the intercept probability (IP) and the connection outage probability (COP), as well‐known secrecy criteria associated with the successful transmission are mathematically examined. Finally, the derived expressions are confirmed by comparison with Monte–Carlo simulations and furthermore, numerical examples are provided to demonstrate the effects of system parameters on the IP and the COP metrics. Specifically, they find that jammer's artificial noise distribution plays a paramount role in the secrecy performance of the considered system.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here