Secure Information Transmissions in Wireless-Powered Cognitive Radio Networks for Internet of Medical Things

被引:0
|
作者
Tang, Kun [1 ,2 ]
Tang, Wenjuan [3 ]
Luo, Entao [2 ]
Tan, Zhiyuan [4 ]
Meng, Weizhi [5 ]
Qi, Lianyong [6 ]
机构
[1] Guangdong Provincial Key Laboratory of Millimeter-Wave and Terahertz, School of Electronic and Information Engineering, South China University of Technology, Guangzhou,510641, China
[2] School of Electronics and Information Engineering, Hunan University of Science and Engineering, Yongzhou,425000, China
[3] College of Computer Science and Electronic Engineering, Hunan University, Changsha,410082, China
[4] School of Computing, Edinburgh Napier University, Edinburgh,EH11 4BN, United Kingdom
[5] Department of Applied Mathematics and Computer Science, Technical University of Denmark, Kongens Lyngby, Lyngby,2800, Denmark
[6] School of Information Science and Engineering, Qufu Normal University, Rizhao,276826, China
基金
中国博士后科学基金;
关键词
Secure communication - Convex optimization - Cognitive radio - Medical information systems - Antennas - Network security - Radio transmission - Transmitters - Beamforming;
D O I
暂无
中图分类号
学科分类号
摘要
In this paper, we consider the issue of the secure transmissions for the cognitive radio-based Internet of Medical Things (IoMT) with wireless energy harvesting. In these systems, a primary transmitter (PT) will transmit its sensitive medical information to a primary receiver (PR) by a multi-antenna-based secondary transmitter (ST), where we consider that a potential eavesdropper may listen to the PT's sensitive information. Meanwhile, the ST also transmits its own information concurrently by utilizing spectrum sharing. We aim to propose a novel scheme for jointly designing the optimal parameters, i.e., energy harvesting (EH) time ratio and secure beamforming vectors, for maximizing the primary secrecy transmission rate while guaranteeing secondary transmission requirement. For solving the nonconvex optimization problem, we transfer the problem into convex optimization form by adopting the semidefinite relaxation (SDR) method and Charnes-Cooper transformation technique. Then, the optimal secure beamforming vectors and energy harvesting duration can be obtained easily by utilizing the CVX tools. According to the simulation results of secrecy transmission rate, i.e., secrecy capacity, we can observe that the proposed protocol for the considered system model can effectively promote the primary secrecy transmission rate when compared with traditional zero-forcing (ZF) scheme, while ensuring the transmission rate of the secondary system. © 2020 Kun Tang et al.
引用
收藏
相关论文
共 50 条
  • [21] Cognitive Packet Networks for the Secure Internet of Things
    Nowak, Mateusz
    Nowak, Slawomir
    Domanska, Joanna
    Czachorski, Tadeusz
    2019 GLOBAL IOT SUMMIT (GIOTS), 2019,
  • [22] On Maximizing Max-Min Source Rate in Wireless-Powered Internet of Things
    He, Tengjiao
    Chin, Kwan-Wu
    Soh, Sieteng
    Yang, Changlin
    Wen, Jinming
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (11) : 11276 - 11289
  • [23] Distributed DDPG-Based Resource Allocation for Age of Information Minimization in Mobile Wireless-Powered Internet of Things
    Zheng, Kechen
    Luo, Rongwei
    Liu, Xiaoying
    Qiu, Jiefan
    Liu, Jia
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (17): : 29102 - 29115
  • [24] Secure Communication With a Wireless-Powered Friendly Jammer
    Liu, Wanchun
    Zhou, Xiangyun
    Durrani, Salman
    Popovski, Petar
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (01) : 401 - 415
  • [25] Robust Transmissions in Wireless-Powered Multi-Relay Networks With Chance Interference Constraints
    Xu, Jing
    Zou, Yuze
    Gong, Shimin
    Gao, Lin
    Niyato, Dusit
    Cheng, Wenqing
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2019, 67 (02) : 973 - 987
  • [26] Optimal Resource Allocation for Multiuser Internet of Things Network With Single Wireless-Powered Relay
    Ramezani, Parisa
    Zeng, Yong
    Jamalipour, Abbas
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02) : 3132 - 3142
  • [27] Competitive Data Trading in Wireless-Powered Internet of Things (IoT) Crowdsensing Systems with Blockchain
    Feng, Shaohan
    Wang, Wenbo
    Niyato, Dusit
    Kim, Dong In
    Wang, Ping
    PROCEEDINGS OF 2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS (ICCS 2018), 2018, : 389 - 394
  • [28] Multi-IRS Assisted Wireless-Powered Mobile Edge Computing for Internet of Things
    Chen, Pengcheng
    Lyu, Bin
    Liu, Yan
    Guo, Haiyan
    Yang, Zhen
    IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING, 2023, 7 (01): : 130 - 144
  • [29] Resource Allocation in Wireless-Powered Mobile Edge Computing Systems for Internet of Things Applications
    Liu, Bingjie
    Xu, Haitao
    Zhou, Xianwei
    ELECTRONICS, 2019, 8 (02)
  • [30] Resource Allocation in Unmanned Aerial Vehicle (UAV)-Assisted Wireless-Powered Internet of Things
    Liu, Bingjie
    Xu, Haitao
    Zhou, Xianwei
    SENSORS, 2019, 19 (08)