检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:Yong Wang Weiwei Yang Tao Zhang Yong Chen Xiaohui Shang Quan Wang
机构地区:[1]College of Communication Engineering,Army Engineering University of PLA,Nanjing 210007,China [2]The 31121 Troops,PLA Stategic Support Force,Nanjing 210042,China [3]The Sixty-third Research Institute,National University of Defense Technology,Nanjing 210007,China
出 处:《China Communications》2021年第3期155-173,共19页中国通信(英文版)
基 金:supported in part by the National Science Foundations of China under Grant 61801496 and 61801497;the Defense Science Foundations of China under Grant 2019-JCJQ-JJ-221;the National University of Defense Technology Youth Innovation Award Research Project under Grant 23200306。
摘 要:This paper investigates secure transmission in a wireless powered communication network(WPCN)with an energy harvesting(EH)source configured with multiple antennas.In the WPCN,the EH source harvests energy from the radio frequency(RF)signals broadcasted by a power beacon(PB),and purely relies on the harvested energy to communicate with the destination in the presence of passive eavesdroppers.It is noteworthy that the RF-EH source is equipped with a finite energy storage to accumulate the harvested energy for the future usage.Moreover,due to energy-constraint and complexitylimitation,the multi-antenna source is only configured with a single RF-chain.To enhance the security for the WPCN,we propose two adaptive transmission schemes,i.e.,energy-aware transmit antenna selection(EATAS)and energy-aware differential spatial modulation(EADSM).According to the energy status and the channel quality,the source adaptively decides whether to transmit confidential information or harvest RF energy.To evaluate the secrecy performance of the proposed schemes,we first study the evolution of the energy storage,and then derive the analytical expressions of connection outage probability(COP),secrecy outage probability(SOP)and efficient secrecy throughput(EST).Numerical results demonstrate that our proposed schemes outperform the existing schemes,i.e.,time-switching based TAS(TS-TAS)Received:May 19,2020 Revised:Sep.13,2020 Editor:Deli Qiao and accumulate-then-transmit(ATT).And,increasing the transmit power of the PB or the capacity of the source’s energy storage is helpful to improve the secrecy performance.Moreover,there exists an optimal transmission rate for each proposed scheme to achieve best secrecy performance.
关 键 词:physical layer security energy harvesting markov chain transmit antenna selection differential spatial modulation
分 类 号:TN929.5[电子电信—通信与信息系统]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.15