Secrecy analysis for IoT relaying networks deploying NOMA with energy harvesting

被引:4
|
作者
Zhang, Jiliang [1 ]
Han, Mengdie [1 ]
机构
[1] Southwest Univ, Key Lab Networks & Cloud Comp Secur Univ Chongqin, Sch Elect & Informat Engn, Chongqing 400715, Peoples R China
关键词
COGNITIVE RADIO NETWORKS; PERFORMANCE ANALYSIS; RESOURCE-ALLOCATION; SELECTION; SECURITY; INTERNET; SYSTEMS;
D O I
10.1016/j.jfranklin.2021.10.009
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we investigate the physical-layer security for an Internet of Things (IoT) relaying network employing non-orthogonal multiple access (NOMA) in the context of non-linear energy harvesting. In particular, a power-constrained source transmits its confidential information to a destination via an IoT device, which first decodes the received signal and then forwards the decoded data together with its own information using the NOMA technique to their respective destinations, while an eavesdropper is overhearing this transmission. Considering the scenario that both the power-constrained source and the IoT device are assumed to work under non-linear energy harvesting modes, and are capable of harvesting energy from a power beacon with a time switching protocol, both analytical and asymptotic expressions for secrecy outage probability as well as the analytical expression for the probability of strictly positive secrecy capacity are derived. In addition, those expressions are also verified with (c) 2021 The Franklin Institute. Published by Elsevier Ltd. All rights reserved.
引用
收藏
页码:10232 / 10249
页数:18
相关论文
共 50 条
  • [21] Enhancing the performance of downlink NOMA relaying networks by RF energy harvesting and data buffering at relay
    Tran Manh Hoang
    Nguyen Nhu Thang
    Ba Cao Nguyen
    Phuong T. Tran
    Wireless Networks, 2022, 28 : 1857 - 1877
  • [22] Enhancing the performance of downlink NOMA relaying networks by RF energy harvesting and data buffering at relay
    Tran Manh Hoang
    Nguyen Nhu Thang
    Ba Cao Nguyen
    Tran, Phuong T.
    WIRELESS NETWORKS, 2022, 28 (05) : 1857 - 1877
  • [23] Secrecy capacity analysis of untrusted relaying energy-harvesting systems with hardware impairments
    Van Phu Tuan
    Hyung Yun Kong
    Annals of Telecommunications, 2020, 75 : 397 - 405
  • [24] Enhancing secrecy performance of energy harvesting NOMA systems using IoT user scheduling under untrusted users
    Largani, Noushin Khosravi
    Akhbari, Bahareh
    IET COMMUNICATIONS, 2022, 16 (18) : 2208 - 2218
  • [25] Secrecy capacity analysis of untrusted relaying energy-harvesting systems with hardware impairments
    Tuan, Van Phu
    Kong, Hyung Yun
    ANNALS OF TELECOMMUNICATIONS, 2020, 75 (7-8) : 397 - 405
  • [26] Secrecy Enhancement of Cooperative NOMA Networks With Two-Way Untrusted Relaying
    Awad, Mona
    Ibraheem, Shady M.
    Napoleon, Sameh A.
    Saad, Waleed
    Shokair, Mona
    Nasr, Mohamed E.
    IEEE ACCESS, 2020, 8 (08): : 216349 - 216364
  • [27] Two Energy Harvesting Protocols for SWIPT at UAVs in Cooperative Relaying Networks of IoT Systems
    Tran, Huu Q.
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 122 (04) : 3719 - 3740
  • [28] Two Energy Harvesting Protocols for SWIPT at UAVs in Cooperative Relaying Networks of IoT Systems
    Huu Q. Tran
    Wireless Personal Communications, 2022, 122 : 3719 - 3740
  • [29] Exploiting Uplink NOMA to Improve Sum Secrecy Throughput in IoT Networks
    Xiang, Zhongwu
    Yang, Weiwei
    Cai, Yueming
    Cheng, Yunpeng
    Wu, Heng
    Wang, Meng
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
  • [30] Cognitive IoT relaying NOMA networks with user clustering and imperfect SIC
    Anh-Tu Le
    Dinh-Thuan Do
    Wen-Thong Chang
    Chien-Thang Vu
    Peer-to-Peer Networking and Applications, 2021, 14 : 3170 - 3180