Secrecy Performance of Wirelessly Powered Wiretap Channels

Xin Jiang, Caijun Zhong, Xiaoming Chen, Trung Q. Duong, Theodoros A. Tsiftsis, Zhaoyang Zhang

Research output: Contribution to journalArticlepeer-review

36 Citations (Scopus)

Abstract

This paper considers a wirelessly powered wiretap channel, where an energy constrained multi-antenna information source, powered by a dedicated power beacon, communicates with a legitimate user in the presence of a passive eavesdropper. Based on a simple time-switching protocol, where power transfer and information transmission are separated in time, we investigate two popular multi-antenna transmission schemes at the information source, namely, maximum ratio transmission and transmit antenna selection. Closed-form expressions are derived for the achievable secrecy outage probability and average secrecy rate for both schemes. In addition, simple approximations are obtained at the high signal-to-noise ratio (SNR) regime. Our results demonstrate that by exploiting the full knowledge of channel state information (CSI), we can achieve a better secrecy performance, e.g., with full CSI of the main channel, the system can achieve substantial secrecy diversity gain. On the other hand, without the CSI of the main channel, no diversity gain can be attained. Moreover, we show that the additional level of randomness induced by wireless power transfer does not affect the secrecy performance in the high SNR regime. Finally, our theoretical claims are validated by the numerical results.

Original languageEnglish
Article number7515157
Pages (from-to)3858-3871
Number of pages14
JournalIEEE Transactions on Communications
Volume64
Issue number9
DOIs
Publication statusPublished - Sep 2016

Keywords

  • Physical layer security
  • average secrecy rate
  • secrecy outage probability
  • wireless power transfer

ASJC Scopus subject areas

  • Electrical and Electronic Engineering

Fingerprint Dive into the research topics of 'Secrecy Performance of Wirelessly Powered Wiretap Channels'. Together they form a unique fingerprint.

Cite this