Physical layer security with RF energy harvesting in AF multi-antenna relaying networks

Abdelhamid Salem, Khairi Ashour Hamdi, Khaled M. Rabie

Research output: Contribution to journalArticlepeer-review

126 Citations (Scopus)

Abstract

In this paper, we analyze the secrecy capacity of a half-duplex energy harvesting (EH)-based multi-antenna amplify-and-forward relay network in the presence of a passive eavesdropper. During the first phase, while the source is in the transmission mode, the legitimate destination transmits an auxiliary artificial noise (AN) signal which has two distinct purposes: 1) to transfer power to the relay and 2) to improve system security. Since the AN is known at the legitimate destination, it is easily cancelled at the intended destination, which is not the case at the eavesdropper. In this respect, we derive new exact analytical expressions for the ergodic secrecy capacity for various well-known EH relaying protocols, namely, time switching relaying (TSR), power splitting relaying (PSR), and ideal relaying receiver (IRR). Monte Carlo simulations are also provided throughout our investigations to validate the analysis. The impacts of some important system parameters, such as EH time, power splitting ratio, relay location, AN power, EH efficiency, and the number of relay antennas, on the system performance are investigated. The results reveal that the PSR protocol generally outperforms the TSR approach in terms of the secrecy capacity.

Original languageEnglish
Article number7480414
Pages (from-to)3025-3038
Number of pages14
JournalIEEE Transactions on Communications
Volume64
Issue number7
DOIs
Publication statusPublished - Jul 2016
Externally publishedYes

Keywords

  • Amplify-and-forward relays
  • cooperative communications
  • energy harvesting
  • secrecy capacity
  • wireless power transfer

ASJC Scopus subject areas

  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Physical layer security with RF energy harvesting in AF multi-antenna relaying networks'. Together they form a unique fingerprint.

Cite this