Loading...

Secure Transmission Strategies in Relay Simultaneous Wireless Information and Power Transfer

Soleimani Baghshsh, Ali | 2017

497 Viewed
  1. Type of Document: M.Sc. Thesis
  2. Language: Farsi
  3. Document No: 50192 (05)
  4. University: Sharif University of Technology
  5. Department: Electrical Engineering
  6. Advisor(s): Aref, Mohammad Reza; Mirmohseni, Mahtab
  7. Abstract:
  8. In this thesis, we investigate the achievable secrecy rate in a relay channel where the source and the destination wish to keep the information confidential from an untrusted relay (potential eavesdropper). The relay has no energy supply, and harvests its required energy for relaying from its received signals. For radio-frequency (RF) Energy Harvesting (EH) at the relay,we adopt power splitting (PS) and time switching (TS) approach. We study the problem of achieving positive secrecy rates between the transmitter and the receiver while making use of an untrusted relay. Energy limitation at the relay makes the problem more interesting. Because,the relay must choose either to eavesdrop the signal to be able to decode or to harvest energy (from the information signal) to be able to forward the message. Our scheme to guarantee the secrecy uses cooperative jamming by either the destination or an extra jammer node. We derive the achievable secrecy rates for the compress-and-forward (CF) and amplify-and-forward (AF) relays for two different scenarios. First, we assume the destination and the jammer are two separate nodes. Then, we consider destination-assisted jamming. In addition, we let the relay to use both the source’s and the jammer’s transmitted signals to harvest energy. Our numerical results show that our proposed schemes guarantee a positive secrecy rate by properly locating the jammer and allocating enough cooperative jamming power. However, for a given power budget (i.e., fixed total transmission and cooperative jamming power) there is an optimum amount for the cooperative jamming power
  9. Keywords:
  10. Energy Harvesting ; Amplify-and-Forward ; Compress-and-Forward ; Physical Layer ; Security ; Physical Layer Security ; Untrusted Relay

 Digital Object List

 Bookmark

No TOC