Exploiting Interference for Secrecy Wireless Information and Power Transfer

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Simultaneous Wireless Information and Power Transfer for MIMO Interference Channel Networks Based on Interference Alignment

This paper considers power splitting (PS)-based simultaneous wireless information and power transfer (SWIPT) for multiple-input multiple-output (MIMO) interference channel networks where multiple transceiver pairs share the same frequency spectrum. As the PS model is adopted, an individual receiver splits the received signal into two parts for information decoding (ID) and energy harvesting (EH...

متن کامل

Power Allocation for Energy Efficiency and Secrecy of Interference Wireless Networks

Considering a multi-user interference network with an eavesdropper, this paper aims at the power allocation to optimize the worst secrecy throughput among the network links or the secure energy efficiency in terms of achieved secrecy throughput per Joule under link security requirements. Three scenarios for the access of channel state information are considered: the perfect channel state inform...

متن کامل

Exploiting PHY Layer Information to Combat Cross Technology Interference in Low-power Wireless Networks

The proliferation of a wide range of wireless devices operating in the ISM bands is becoming a major challenge for emerging low-power wireless networks in indoor applications. Interference can significantly reduce the overall delivery ratio of such networks, affect their availability and drain their resources. In low-power wireless networks, potential interference can be divided into two broad ...

متن کامل

Information-Theoretic Secrecy for Wireless Networks

The aim of information-theoretic secrecy is to ensure that an eavesdropper who listens to the wireless transmission of a message can only collect an arbitrarily small number of information bits about this message. In contrast to cryptography, there are no assumptions on the computational power of the eavesdropper. Information-theoretically secret communication has been studied for many particul...

متن کامل

On information-theoretic secrecy for wireless networks

In this paper we summarize our recent work on information-theoretically secure wireless relay network communication. In such communication, the goal is to send information between two special nodes (“source” and “destination”) in a (memoryless) network with authenticated relays, where the secrecy is with respect to a class of eavesdroppers. We develop achievable secrecy rates when authenticated...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Wireless Communications

سال: 2018

ISSN: 1536-1284

DOI: 10.1109/mwc.2018.1700146