Secure Information Transmissions in Wireless-Powered Cognitive Radio Networks for Internet of Medical Things

被引:0
|
作者
Tang, Kun [1 ,2 ]
Tang, Wenjuan [3 ]
Luo, Entao [2 ]
Tan, Zhiyuan [4 ]
Meng, Weizhi [5 ]
Qi, Lianyong [6 ]
机构
[1] Guangdong Provincial Key Laboratory of Millimeter-Wave and Terahertz, School of Electronic and Information Engineering, South China University of Technology, Guangzhou,510641, China
[2] School of Electronics and Information Engineering, Hunan University of Science and Engineering, Yongzhou,425000, China
[3] College of Computer Science and Electronic Engineering, Hunan University, Changsha,410082, China
[4] School of Computing, Edinburgh Napier University, Edinburgh,EH11 4BN, United Kingdom
[5] Department of Applied Mathematics and Computer Science, Technical University of Denmark, Kongens Lyngby, Lyngby,2800, Denmark
[6] School of Information Science and Engineering, Qufu Normal University, Rizhao,276826, China
基金
中国博士后科学基金;
关键词
Secure communication - Convex optimization - Cognitive radio - Medical information systems - Antennas - Network security - Radio transmission - Transmitters - Beamforming;
D O I
暂无
中图分类号
学科分类号
摘要
In this paper, we consider the issue of the secure transmissions for the cognitive radio-based Internet of Medical Things (IoMT) with wireless energy harvesting. In these systems, a primary transmitter (PT) will transmit its sensitive medical information to a primary receiver (PR) by a multi-antenna-based secondary transmitter (ST), where we consider that a potential eavesdropper may listen to the PT's sensitive information. Meanwhile, the ST also transmits its own information concurrently by utilizing spectrum sharing. We aim to propose a novel scheme for jointly designing the optimal parameters, i.e., energy harvesting (EH) time ratio and secure beamforming vectors, for maximizing the primary secrecy transmission rate while guaranteeing secondary transmission requirement. For solving the nonconvex optimization problem, we transfer the problem into convex optimization form by adopting the semidefinite relaxation (SDR) method and Charnes-Cooper transformation technique. Then, the optimal secure beamforming vectors and energy harvesting duration can be obtained easily by utilizing the CVX tools. According to the simulation results of secrecy transmission rate, i.e., secrecy capacity, we can observe that the proposed protocol for the considered system model can effectively promote the primary secrecy transmission rate when compared with traditional zero-forcing (ZF) scheme, while ensuring the transmission rate of the secondary system. © 2020 Kun Tang et al.
引用
收藏
相关论文
共 50 条
  • [31] Optimal Beamforming in Cooperative Cognitive Backscatter Networks for Wireless-Powered IoT
    Yang, Gang
    Zhang, Jiapeng
    Liang, Ying-Chang
    PROCEEDINGS OF 2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS (ICCS 2018), 2018, : 56 - 61
  • [32] On Opportunistic Energy Harvesting and Information Relaying in Wireless-Powered Communication Networks
    Huang, Gaofei
    Tu, Wanqing
    IEEE ACCESS, 2018, 6 : 55220 - 55233
  • [33] Latency Guarantee for Task Computation in Wireless-Powered Cloud Radio Access Networks
    Zhang, Hong
    Wang, Hui
    Li, Zhidu
    Wu, Dapeng
    Wang, Ruyan
    Hu, Yu
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (21) : 19199 - 19207
  • [34] Performance Analysis of Wireless Powered Cognitive Radio Networks
    Thanh-Duc Le
    Hong-Nhu Nguyen
    Si-Phu Le
    Dinh-Thuan Do
    Zdralek, Jaroslav
    Voznak, Miroslav
    INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING, IMIS-2017, 2018, 612 : 554 - 562
  • [35] Adaptive and Extensible Energy Supply Mechanism for UAVs-Aided Wireless-Powered Internet of Things
    Wu, Pengfei
    Xiao, Fu
    Huang, Haiping
    Sha, Chao
    Yu, Shui
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (09): : 9201 - 9213
  • [36] Passive Relaying Game for Wireless Powered Internet of Things in Backscatter-Aided Hybrid Radio Networks
    Xu, Jing
    Li, Jiachen
    Gong, Shimin
    Zhu, Kun
    Niyato, Dusit
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05): : 8933 - 8944
  • [37] Joint Power Splitting and Secure Beamforming Design in the Wireless-powered Untrusted Relay Networks
    Zhao, Mingxiong
    Feng, Suili
    Wang, Xiangfeng
    Zhang, Meng
    Liu, Yuan
    Fu, Hao
    2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2015,
  • [38] Full-Duplex Machine-to-Machine Communication for Wireless-Powered Internet-of-Things
    Xiao, Yong
    Xiong, Zixiang
    Niyato, Dusit
    Han, Zhu
    DaSilva, Luiz A.
    2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016,
  • [39] Charge-Then-Cooperate: Secure Resource Allocation for Wireless-Powered Relay Networks With Wireless Energy Transfer
    Wu, Mengru
    Song, Qingyang
    Guo, Lei
    Jamalipour, Abbas
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 70 (05) : 5088 - 5093
  • [40] Transmit Power Control for Secure Wireless-Powered Sensor Networks With Malicious Energy Harvester
    Lee, Kisong
    Choi, Hyun-Ho
    IEEE ACCESS, 2023, 11 : 103146 - 103153