{"title":"Physical-Layer Security for Energy-Harvesting Multiuser Systems Under Hardware Impairments and Channel Estimation Errors","authors":"Peishun Yan;Xiaodong Ji;Yulong Zou;Bin Li","doi":"10.1109/TGCN.2023.3336423","DOIUrl":null,"url":null,"abstract":"This paper considers a typical system composed of multiple energy-constraint users, a destination, and a passive eavesdropper who may intercept confidential information. Each communication time frame is divided into two phases. The first phase is that the energy-constraint users harvest energy from a power beacon. To safeguard the legitimate transmissions, we propose two multiuser scheduling schemes, namely selection combining scheduling (SCS) scheme and switch-and-examine combining scheduling with post-selection (SECSPS) scheme, which only depend on the channel state information of main links spanning from energy-constraint users to the destination. We derive the closed-form expressions of outage probability, intercept probability, and effective secrecy throughput under hardware impairments and channel estimation errors for the SCS and SECSPS schemes. As a baseline, we exploit the system performance for the round-robin scheduling (RRS) scheme. The numerical results verify the correctness of our derivations, demonstrating that the proposed SCS scheme achieves the best performance while the RRS scheme performs the worst in terms of system performance. Furthermore, our proposed SECSPS scheme consumes less computation overhead than the SCS scheme if a suitable threshold is adopted and it requires more computation overhead than the RRS scheme regardless of the threshold.","PeriodicalId":13052,"journal":{"name":"IEEE Transactions on Green Communications and Networking","volume":"8 2","pages":"656-671"},"PeriodicalIF":5.3000,"publicationDate":"2023-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Green Communications and Networking","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10330653/","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
引用次数: 0
Abstract
This paper considers a typical system composed of multiple energy-constraint users, a destination, and a passive eavesdropper who may intercept confidential information. Each communication time frame is divided into two phases. The first phase is that the energy-constraint users harvest energy from a power beacon. To safeguard the legitimate transmissions, we propose two multiuser scheduling schemes, namely selection combining scheduling (SCS) scheme and switch-and-examine combining scheduling with post-selection (SECSPS) scheme, which only depend on the channel state information of main links spanning from energy-constraint users to the destination. We derive the closed-form expressions of outage probability, intercept probability, and effective secrecy throughput under hardware impairments and channel estimation errors for the SCS and SECSPS schemes. As a baseline, we exploit the system performance for the round-robin scheduling (RRS) scheme. The numerical results verify the correctness of our derivations, demonstrating that the proposed SCS scheme achieves the best performance while the RRS scheme performs the worst in terms of system performance. Furthermore, our proposed SECSPS scheme consumes less computation overhead than the SCS scheme if a suitable threshold is adopted and it requires more computation overhead than the RRS scheme regardless of the threshold.