NEWS

SECURING WIRELESS COMMUNICATIONS WITH ENERGY HARVESTING AND MULTI-ANTENNA DIVERSITY


(Received: 29-Nov.-2024, Revised: 19-Jan.-2025 , Accepted: 10-Feb.-2025)
This paper presents a secure wireless communication system that integrates Physical Layer Security (PLS) with Energy Harvesting (EH) to enhance both data confidentiality and network sustainability. The proposed system uniquely employs Maximal Ratio Combining (MRC) and Selection Combining (SC) techniques at the multi-antenna destination node D, which is a novel approach in EH-driven PLS systems. The system model features a source node S, powered by energy harvested from spatially distributed power stations, a multi-antenna destination node D and an eavesdropper node E within the communication range. A time-switching protocol allows the source node S to alternate between energy harvesting and secure data transmission. To improve signal quality and security, the destination node D employs Maximal Ratio Combining (MRC) and Selection Combining (SC) techniques to mitigate fading and eavesdropping risks. Analytical expressions for the Signal-to-Noise Ratios (SNRs) at the destination and eavesdropper are derived, along with the Probability Density Function (PDF) and Cumulative Distribution Function (CDF) of these SNRs under block Rayleigh fading. We also provide an exact formulation for Secrecy Outage Probability (SOP), quantifying the likelihood of information leakage under different system configurations. The model is validated through Monte Carlo simulations, confirming the accuracy of the theoretical analysis. Simulation results highlight the impact of key parameters—energy harvesting efficiency η, time- switching parameter α, number of antennas M , number of beacon nodes N and the power of beacon nodes—on Secrecy Outage Probability (SOP), offering valuable insights for optimizing secure and energy- efficient communication in wireless networks. An asymptotic analysis is also provided to characterize system performance at high SNR.

[1] D. Grenar, J. Frolka, K. Slavicek, O. Dostal and M. Kyselak, "Network Physical Layer Attack in theVery High Capacity Networks," Advances in Electrical and Electronic Eng., vol. 21, no. 1, pp. 37-47, Mar. 2023.

[2] W. Guo, C. Song, X. Xia, F. Hu, H. Zhao, S. Shao and Y. Tang, "Analysis of Cooperative JammingCancellation with Imperfect Time Synchronization in Physical Layer Security," IEEE Wireless Communications Letters, vol. 10, no. 2, pp. 335-338, Feb. 2021.

[3] Z. Al-qudah and K. A. Darabkh, "A Simple Encoding Scheme to Achieve the Capacity of Half-duplexRelay Channel," Advances in Electrical and Electronic Eng., vol. 20, no. 1, pp. 33-42, Mar. 2022.

[4] T. N. Nguyen, P. T. Tran, T. H. Q. Minh, M. Voznak and L. Sevcik, "Two-way Half Duplex Decodeand Forward Relaying Network with Hardware Impairment over Rician Fading Channel: System Performance Analysis," ELEKTRONIKA IR ELEKTROTECHNIKA, vol. 24, no. 2, pp. 74-78, 2018.

[5] T. N. Nguyen, M. Tran, T.-L. Nguyen and M. Voznak, "Adaptive Relaying Protocol for Decode andForward Full-duplex System over Rician Fading Channel: System Performance Analysis," China Communications, vol. 16, no. 3, pp. 92-102, Mar. 2019.

[6] P. T. Tin, N. T. Luan, T. N. Nguyen, M. Tran and T. T. Duy, "Throughput Enhancement for Multi-hopDecode-and-Forward Protocol Using Interference Cancellation with Hardware Imperfection," Alexandria Engineering Journal, vol. 61, no. 8, pp. 5837-5849, Aug. 2022.

[7] T. N. Nguyen, L.-T. Tu, D.-H. Tran, V.-D. Phan, M. Voznak and S. Chatzinotas, "Outage Performanceof Satellite Terrestrial Full-duplex Relaying Networks with Co-channel Interference," IEEE Wireless Communications Letters, vol. 11, no. 7, pp. 1478-1482, Jul. 2022.

[8] T. N. Nguyen, T. T. Duy, P. T. Tran, M. Voznak, X. Li and H. V. Poor, "Partial and Full RelaySelection Algorithms for AF Multi-relay Full-duplex Networks With Self-energy Recycling in Non- identically Distributed Fading Channels," IEEE Transactions on Vehicular Technology, vol. 71, no. 6, pp. 6173-6188, Mar. 2022.

[9] Y. Lee, "End-to-end Error-rate Based Incremental Relaying for AF Cooperative Communications,"IEEE Communications Letters, vol. 17, no. 9, pp. 1806-1809, Sep. 2013.

[10] W. Su and X. Liu, "On Optimum Selection Relaying Protocols in Cooperative Wireless Networks,"IEEE Transactions on Communications, vol. 58, no. 1, pp. 52-57, Jan. 2010.

[11] R. Saini, D. Mishra and S. De, "OFDMA-based DF Secure Cooperative Communication with UntrustedUsers," IEEE Communications Letters, vol. 20, no. 4, pp. 716-719, Apr. 2016.

[12] J. Mo, M. Tao and Y. Liu, "Relay Placement for Physical Layer Security: A Secure ConnectionPerspective," IEEE Communications Letters, vol. 16, no. 6, pp. 878-881, Jun. 2012.

[13] R. Bassily and S. Ulukus, "Secure Communication in Multiple Relay Networks through Decode-and-Forward Strategies," Journal of Communications and Network, vol. 14, no. 4, pp. 352-363, Aug. 2012.

[14] H.-M.Wang, M. Luo, X.-G. Xia and Q. Yin, "Joint Cooperative Beamforming and Jamming to SecureAF Relay Systems with Individual Power Constraint and No Eavesdropper’s CSI," IEEE Signal Processing Letters, vol. 20, no. 1, pp. 39-42, Jan. 2013.

[15] C. Jeong, I.-M. Kim and D. I. Kim, "Joint Secure Beamforming Design at the Source and the Relay foran Amplify-and-Forward MIMO Untrusted Relay System," IEEE Transactions on Signal Processing, vol. 60, no. 1, pp. 310-325, Jan. 2012.

[16] S. Q. Nguyen and H. Y. Kong, "Improving Secrecy Outage and Throughput Performance in Two-wayEnergy-Constrained Relaying Networks under Physical Layer Security," Wireless Personal Communications, vol. 96, pp. 6425-6457, May 2017.

[17] S. Q. Nguyen and H. Y. Kong, "Combining Binary Jamming and Network Coding to Improve OutagePerformance in Two-way Relaying Networks under Physical Layer Security," Wireless Personal Communications, vol. 85, pp. 2431-2446, July 2015.

[18] L. Liang, X. Li, H. Huang, Z. Yin, N. Zhang and D. Zhang, "Securing Multi-destination Transmissionswith Relay and Friendly Interference Collaboration," IEEE Internet of Things Journal, vol. 11, no. 10, pp. 18782-18795, May 2024.

[19] X. Zhou, R. Zhang and C. K. Ho, "Wireless Information and Power Transfer: A Dynamic PowerSplitting Approach," IEEE Transactions on Communications, vol. 61, no. 9, pp. 3991-4003, Sep. 2013.

[20] R. Jiang, K. Xiong, P. Fan, Y. Zhang and Z. Zhong, "Power Minimization in SWIPT Networks with Coexisting Power-Splitting and Time-switching Users under Non-linear EH Model," IEEE Internet of Things Journal, vol. 6, no. 5, pp. 8853-8869, DOI: 10.1109/JIOT.2019.2923977, Oct. 2019.

[21] X. Zhou, R. Zhang and C. K. Ho, "Wireless Information and Power Transfer in Multi-user OFDMSystems," IEEE Transactions on Wireless Communications, vol. 13, no. 4, pp. 2282-2294, Apr. 2014.

[22] F. K. Ojo and M. F. M. Salleh, "Throughput Analysis of a Hybridized Power-Time Splitting BasedRelaying Protocol for Wireless Information and Power Transfer in Cooperative Networks," IEEE Access, vol. 6, pp. 24137-24147, DOI: 10.1109/ACCESS.2018.2828121, Apr. 2018.

[23] R. Tao, A. Salem and K. A. Hamdi, "Adaptive Relaying Protocol for Wireless Power Transfer andInformation Processing," IEEE Communications Letters, vol. 20, no. 10, pp. 2027-2030, Oct. 2016.

[24] P. S. Lakshmi and M. G. Jibukumar, "A Hybrid Protocol for SWIPT in Cooperative Networks,"Advances in Electrical and Electronic Eng., vol. 19, No. 1, pp. 28-41, Mar. 2021.

[25] T. N. Nguyen, M. Tran, T.-L. Nguyen, D.-H. Ha and M. Voznak, "Performance Analysis of a UserSelection Protocol in Cooperative Networks with Power Splitting Protocol-based Energy Harvesting over Nakagami-m/Rayleigh Channels," Electronics, vol. 8, no. 4, 2019.

[26] M.-S. V. Nguyen and H.-P. Dang, "Exploiting Performance of Ambient Backscatter Systems inPresence of Hardware Impairment," Advances in Electrical and Electronic Eng., vol. 19, no. 4, pp. 314-321, 2021.

[27] B. C. Nguyen et al., "Cooperative Communications for Improving the Performance of BidirectionalFull-duplex System with Multiple Reconfigurable Intelligent Surfaces", IEEE Access, vol. 9, pp. 134733 - 134742, Nov. 2021.

[28] K. Lee, J.-P. Hong, H.-H. Choi and T. Q. S. Quek, "Wireless-powered Two-way Relaying Protocols forOptimizing Physical Layer Security," IEEE Transactions on Information Forensics and Security, vol. 14, no. 1, pp. 162-174, Jan. 2019.

[29] B. V. Minh et al., "Self-energy Recycling in DF Full-duplex Relay Network: Security-ReliabilityAnalysis," Advances in Electrical and Electronic Eng., vol. 22, no. 2, pp. 85-95, 2024.

[30] T. N. Nguyen, D.-H. Tran, T. V. Chien, V.-D. Phan, M. Voznak, adn P. T. Tin, "Security–ReliabilityTrade-off Analysis for SWIPT- and AF-based IoT Networks with Friendly Jammers," IEEE Internet of Things Journal, vol. 9, no. 21, pp. 21662-21675, June 2022.

[31] V-. D. Pham et al., "A Study of Physical Layer Security in SWIPT-based Decode-and-Forward RelayNetworks with Dynamic Power Splitting," Sensors, vol. 21, no. 7, Aug. 2021.

[32] T. N. Nguyen et al., "Physical Layer Security in AF-based Cooperative SWIPT Sensor Networks,"IEEE Sensors Journal, vol. 23, no. 1, pp. 689-705, Jan. 2023.

[33] V. D. Phan, T. L. Nguyen, T. T. Phu and V. V. Nguyen, "Reliability-Security in Wireless-poweredCooperative Network with Friendly Jammer," Advances in Electrical and Electronic Engineering Journal, vol. 20, no. 4, pp. 584-591, Jan. 2022.

[34] W. Zeng, J. Zhang, D. W. K. Ng, B. Ai and Z. Zhong, "Two-way Hybrid Terrestrial-satellite RelayingSystems: Performance Analysis and Relay Selection," IEEE Transactions on Vehicular Technology, vol. 68, no. 7, pp. 7011-7023, Jul. 2019.

[35] T. N. Nguyen et al., "Performance Enhancement for Energy Harvesting Based Two-way RelayProtocols in Wireless Ad-Hoc Networks with Partial and Full Relay Selection Methods," Ad Hoc Networks, vol. 81, pp. 178-187, Mar. 2019.

[36] P. T. Tin, T. N. Nguyen, M. Tran, T. T. Trang and L. Sevcik, "Exploiting Direct Link in Two-way Half-duplex Sensor Network over Block Rayleigh Fading Channel: Upper Bound Ergodic Capacity and Exact SER Analysis," Sensors, vol. 20, no. 4, Feb. 2019.

[37] T. N. Nguyen, T. H. Q. Minh, P. T. Tran and M. Voznak, "Energy Harvesting over Rician FadingChannel: A Performance Analysis for Half-duplex Bidirectional Sensor Networks under Hardware Impairments," Sensors, vol. 81, no. 6, 2018.

[38] C. T. Dung, T. M. Hoang, N. N. Thang, M. Tran and T. T. Phuong, "Secrecy Performance of Multi-userMulti-hop Cluster-based Network with Joint Relay and Jammer Selection under Imperfect Channel State Information," Performance Evaluation, vol. 147, p. 102193, 2021.

[39] P. T. Tin, D. T. Hung, T. N. Nguyen, T. T. Duy and M. Voznak, "Secrecy Performance Enhancementfor Underlay Cognitive Radio Networks Employing Cooperative Multi-hop Transmission with and without Presence of Hardware Impairments," Entropy, vol. 21, no. 2, 2019.

[40] B. V. Minh, T. H. Q. Minh, V. D. Phan and H. T. Nguyen, "D2D Communication Network with theAssistance of Power Beacon under the Impact of Co-channel Interferences and Eavesdropper: Performance Analysis," Advances in Electrical and Electronic Eng., vol. 21, no. 4, pp. 351-359, 2023.

[41] M. Tran et al., "Security and Reliability Analysis of the Power Splitting-based Relaying in WirelessSensors Network," Sensors, vol. 24, no. 4, Feb. 2024.

[42] T. M. Hoang, X. N. Tran, B. C. Nguyen and L. T. Dung, "On the Performance of MIMO Full-DuplexRelaying System with SWIPT under Outdated CSI," IEEE Transactions on Vehicular Technology, vol. 69, no. 12, pp. 15580-15593, Dec. 2020.

[43] L. Liang, X. Li, H. Huang, Z. Yin, N. Zhang and D. Zhang, "Securing Multi-destination Transmissions with Relay and Friendly Interference Collaboration," IEEE Internet of Things Journal, vol. 11, no. 10, pp. 18782-18795, Mar. 2024.

[44] H. D.-Hung, T. N. Nguyen, M. Tran, X. Li, P. T. Tran and M. Voznak, "Security Analysis of a Two-way Half-duplex Wireless Relaying Network Using Partial Relay Selection and Hybrid TPSR Energy Harvesting at Relay Nodes," IEEE Access, vol. 8, pp. 187165-187181, Oct. 2020.

[45] I. S. Gradshteyn and I. M. Ryzhik, Table of Integrals, Series and Products, 7th Edn, ISBN: 978-0-12-373637-6, Editor: A. Jeffrey, Burlington, MA: Academic Press, 2007.

[46] D. Zhang, X. Hao, D. Wang, C. Qin, B. Zhao, L. Liang and W. Liu, "An Efficient LightweightConvolutional Neural Network for Industrial Surface Defect Detection," Artificial Intelligence Review, vol. 56, pp. 10651-10677, March 2023.

[47] Z. Dehua, H. Xinyuan, L. Linlin, L. Wei and Q. Chunbin, "A Novel Deep Convolutional NeuralNetwork Algorithm for Surface Defect Detection," Journal of Computational Design and Engineering, vol. 9, no. 5, pp. 1616-1632, 2022.