scholarly journals Power Efficient Secure Full-Duplex SWIPT Using NOMA and D2D with Imperfect CSI

Sensors ◽  
2020 ◽  
Vol 20 (18) ◽  
pp. 5395
Author(s):  
Jingpu Wang ◽  
Xin Song ◽  
Yatao Ma ◽  
Zhigang Xie

The secure full-duplex (FD) simultaneous wireless information and power transfer (SWIPT) system and non-orthogonal multiple access (NOMA) have been deemed two promising technologies for the next generation of wireless communication. In this paper, the network is combined with device-to-device (D2D) and a practical bounded channel state information (CSI) estimation scheme. A system total transmit power minimization problem is studied and formulated as a multi-objective optimization (MOO) problem via the weighted Tchebycheff approach. A set of linear matrix inequalities (LMI) is used to transform the non-convex form of constraints into the convex form. Considering the imperfect CSI of the potential eavesdropper for robust power allocation, a bounded transmission beamforming vector design along with artificial noise (AN) is used, while satisfying the requirements from the secrecy rates as well as the energy harvesting (EH) task. Numerical simulation results validate the convergence performance and the trade-off between the uplink (UL) and downlink (DL) data transmit power. It is also shown that by FD and NOMA, the performance of the proposed algorithm is higher than that of half-duplex (HD) and orthogonal multiple access (OMA).

2018 ◽  
Vol 17 (1) ◽  
pp. 506-519 ◽  
Author(s):  
Gang Liu ◽  
Xianhao Chen ◽  
Zhiguo Ding ◽  
Zheng Ma ◽  
F. Richard Yu

2019 ◽  
Vol 8 (2) ◽  
pp. 480-483 ◽  
Author(s):  
Xinyue Hu ◽  
Caihong Kai ◽  
Shengli Zhang ◽  
Zhongyi Guo ◽  
Jun Gao

Electronics ◽  
2020 ◽  
Vol 10 (1) ◽  
pp. 9
Author(s):  
Ying-Jen Lin ◽  
Show-Shiow Tzeng

Multiple access control (MAC) is crucial for devices to send data packets and harvest wireless energy in wireless powered Internet of Things (IoT) networks. A framed slotted ALOHA (FSA) protocol is employed in several practical networks. This paper studies an FSA-based MAC in a centralized wireless powered IoT network, including half-duplex devices and a full-duplex base station transmitting wireless energy in an intended direction. Under such a network, it is possible that a half-duplex device contends for a time slot to transmit a packet while the base station transmits wireless energy to the device in the same time slot, which causes vain charging and wastes the opportunity to charge other devices. To eliminate the vain charging, this paper designs a MAC in which a base station utilizes the information conveyed from devices in advance to arrange the charging order of devices. The novelty is to develop an algorithm to find a charging order of half-duplex devices instead of using full-duplex devices to eliminate the vain charging. Event-driven simulations are conducted to study the performance of the proposed MAC. Simulation results show that the proposed MAC produces better system performances than the system not eliminating the vain charging. In summary, the application of the proposed MAC yields the benefits of higher throughput and lower packet loss.


Sensors ◽  
2019 ◽  
Vol 19 (6) ◽  
pp. 1293 ◽  
Author(s):  
Chi-Bao Le ◽  
Dinh-Thuan Do ◽  
Miroslav Voznak

In this paper, a cooperative non-orthogonal multiple access (NOMA) system is studied for the Internet-of-Things (IoT) in which a master node intends to serve multiple client nodes. The adaptive transmission strategy is proposed at the relay node, i.e., the relay can be half-duplex (HD) and/or full duplex (FD). In practical terms, numerous low-cost devices are deployed in such IoT systems and it exhibits degraded performance due to hardware imperfections. In particular, the effects of hardware impairments in the NOMA users are investigated. Specifically, the closed-form expressions are derived for the outage probability. Moreover, the ergodic capacity is also analysed. This study also comparatively analyzes the orthogonal multiple access (OMA) and NOMA with HD and/or FD relaying. The numerical results are corroborated through Monte Carlo simulations.


Information ◽  
2021 ◽  
Vol 12 (7) ◽  
pp. 279
Author(s):  
Yuan Ren ◽  
Yixuan Tan ◽  
Meruyert Makhanbet ◽  
Xuewei Zhang

Non-orthogonal multiple access (NOMA) and wireless energy harvesting are two promising technologies for improving spectral efficiency and energy efficiency, respectively. In this paper, we study the physical layer security of a wireless-powered full-duplex (FD) relay-aided cooperative NOMA system. In particular, the source is wiretapped by an eavesdropper, and the FD relay assists the transmission from the source to a near user and a far user with self-energy recycling. To enhance the security performance of the system, we propose an artificial noise (AN)-aided cooperative transmission scheme, in which the relay emits a jamming signal to confuse the eavesdropper while receiving the signal from the source. For the proposed scheme, the ergodic secrecy sum rate (ESSR) is derived to characterize the secrecy performance and a lower bound of ESSR is obtained. Finally, numerical results verify the accuracy of the theoretical analysis of the proposed AN-aided secure transmission scheme. The superiority of the proposed scheme is also demonstrated since this scheme can achieve better secrecy performance, compared to the conventional cooperative NOMA scheme.


IEEE Access ◽  
2018 ◽  
Vol 6 ◽  
pp. 44107-44119 ◽  
Author(s):  
Yuanjian Li ◽  
Rui Zhao ◽  
Yi Wang ◽  
Gaofeng Pan ◽  
Chunguo Li

2020 ◽  
Author(s):  
Yong Jin ◽  
Zhentao Hu ◽  
Dongdong Xie ◽  
Guodong Wu ◽  
Lin Zhou

Abstract Physical layer security of non-orthogonal multiple access (NOMA) system which uses simultaneous wireless information and power transfer (SWIPT) technique is deeply dicussed in this paper. Generally, eavesdropper in the downlink of NOMA system may use successive interference cancellation technology (SIC) to obtain the secrecy information of receiver. To tackle this problem, we propose a physical layer security scheme to minimize the transmit power of the base station (BS) while the secrecy rates of receivers are guaranteed. Moreover, semidefinite relaxation (SDR) method and successive convex approximation (SCA) technique are combined to solve above non-convex problem. Simulation results show that in comparison with other methods, our method can effectively reduce the transmit power of the BS.


2011 ◽  
Vol 10 (9) ◽  
pp. 3074-3085 ◽  
Author(s):  
Taneli Riihonen ◽  
Stefan Werner ◽  
Risto Wichman

Sign in / Sign up

Export Citation Format

Share Document