We gratefully acknowledge support from
the Simons Foundation and member institutions.
Full-text links:

Download:

Current browse context:

cs.IT

Change to browse by:

References & Citations

DBLP - CS Bibliography

Bookmark

(what is this?)
CiteULike logo BibSonomy logo Mendeley logo del.icio.us logo Digg logo Reddit logo ScienceWISE logo

Computer Science > Information Theory

Title: On Secure Communication using RF Energy Harvesting Two-Way Untrusted Relay

Abstract: We focus on a scenario where two wireless source nodes wish to exchange confidential information via an RF energy harvesting untrusted two-way relay. Despite its cooperation in forwarding the information, the relay is considered untrusted out of the concern that it might attempt to decode the confidential information that is being relayed. To discourage the eavesdropping intention of the relay, we use a friendly jammer. Under the total power constraint, to maximize the sum-secrecy rate, we allocate the power among the sources and the jammer optimally and calculate the optimal power splitting ratio to balance between the energy harvesting and the information processing at the relay. We further examine the effect of imperfect channel state information at both sources on the sum-secrecy rate. Numerical results highlight the role of the jammer in achieving the secure communication under channel estimation errors. We have shown that, as the channel estimation error on any of the channels increases, the power allocated to the jammer decreases to abate the interference caused to the confidential information reception due to the imperfect cancellation of jammer's signal.
Comments: Accepted in 2017 IEEE Global Communications Conference, Singapore
Subjects: Information Theory (cs.IT); Networking and Internet Architecture (cs.NI)
Cite as: arXiv:1708.07989 [cs.IT]
  (or arXiv:1708.07989v1 [cs.IT] for this version)

Submission history

From: Sanket Kalamkar [view email]
[v1] Sat, 26 Aug 2017 15:59:10 GMT (453kb)

Link back to: arXiv, form interface, contact.