Deep Learning-based Secure Transmission for SWIPT System with Power-Splitting Scheme

Author(s):  
Huynh Thanh Thien ◽  
Pham-Viet Tuan ◽  
Insoo Koo
Electronics ◽  
2019 ◽  
Vol 8 (12) ◽  
pp. 1525
Author(s):  
Yeonggyu Shim ◽  
Wonjae Shin

This paper considers simultaneous wireless information and power transfer (SWIPT) systems in the two-user Gaussian multiple access channel (G-MAC). In SWIPT systems, for a transmit signal each transmitter consists of an information-carrying signal and energy-carrying signal. By controlling a different set of the power for the information transmission and power for the energy transmission under a total power constraint, the information sum-rate and energy transmission rate can be achieved. As the information carrying-to-transmit power ratio at transmitters and the information sum-rate increases, however, the energy transmission rate decreases. In other words, there is a fundamental trade-off between the information sum-rate and the energy transmission rate according to the power-splitting ratio at each transmitter. Motivated by this, this paper proposes an optimal power-splitting scheme that maximizes the energy transmission rate subject to a minimum sum-rate constraint. In particular, a closed-form expression of the power-splitting coefficient is presented for the two-user G-MAC under a minimum sum-rate constraint. Numerical results show that the energy rate of the proposed optimal power-splitting scheme is greater than that of the fixed power-splitting scheme.


2019 ◽  
Vol 55 (25) ◽  
pp. 1340-1343 ◽  
Author(s):  
Yingting Liu ◽  
Yinghui Ye ◽  
Haiyang Ding

2018 ◽  
Vol 25 (7) ◽  
pp. 1014-1018 ◽  
Author(s):  
Yinghui Ye ◽  
Yongzhao Li ◽  
Zhaorui Wang ◽  
Xiaoli Chu ◽  
Hailin Zhang

Author(s):  
Miao Zhang ◽  
Kanapathippillai Cumanan ◽  
Jeyarajan Thiyagalingam ◽  
Yanqun Tang ◽  
Wei Wang ◽  
...  

2020 ◽  
Vol 10 (10) ◽  
pp. 3634
Author(s):  
Huynh Thanh Thien ◽  
Pham-Viet Tuan ◽  
Insoo Koo

Recently, simultaneous wireless information and power transfer (SWIPT) systems, which can supply efficiently throughput and energy, have emerged as a potential research area in fifth-generation (5G) system. In this paper, we study SWIPT with multi-user, single-input single-output (SISO) system. First, we solve the transmit power optimization problem, which provides the optimal strategy for getting minimum power while satisfying sufficient signal-to-noise ratio (SINR) and harvested energy requirements to ensure receiver circuits work in SWIPT systems where receivers are equipped with a power-splitting structure. Although optimization algorithms are able to achieve relatively high performance, they often entail a significant number of iterations, which raises many issues in computation costs and time for real-time applications. Therefore, we aim at providing a deep learning-based approach, which is a promising solution to address this challenging issue. Deep learning architectures used in this paper include a type of Deep Neural Network (DNN): the Feed-Forward Neural Network (FFNN) and three types of Recurrent Neural Network (RNN): the Layer Recurrent Network (LRN), the Nonlinear AutoRegressive network with eXogenous inputs (NARX), and Long Short-Term Memory (LSTM). Through simulations, we show that the deep learning approaches can approximate a complex optimization algorithm that optimizes transmit power in SWIPT systems with much less computation time.


Electronics ◽  
2020 ◽  
Vol 9 (2) ◽  
pp. 294
Author(s):  
Zhixiang Deng ◽  
Qian Sang

Given the vulnerability of deep neural network to adversarial attacks, the application of deep learning in the wireless physical layer arouses comprehensive security concerns. In this paper, we consider an autoencoder-based communication system with a full-duplex (FD) legitimate receiver and an external eavesdropper. It is assumed that the system is trained from end-to-end based on the concepts of autoencoder. The FD legitimate receiver transmits a well-designed adversary perturbation signal to jam the eavesdropper while receiving information simultaneously. To defend the self-perturbation from the loop-back channel, the legitimate receiver is re-trained with the adversarial training method. The simulation results show that with the scheme proposed in this paper, the block-error-rate (BLER) of the legitimate receiver almost remains unaffected while the BLER of the eavesdropper is increased by orders of magnitude. This ensures reliable and secure transmission between the transmitter and the legitimate receiver.


Author(s):  
Stellan Ohlsson
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document