Physical-Layer Security for Energy-Harvesting Multiuser Systems Under Hardware Impairments and Channel Estimation Errors

IF 5.3 2区 计算机科学 Q1 TELECOMMUNICATIONS IEEE Transactions on Green Communications and Networking Pub Date : 2023-11-28 DOI:10.1109/TGCN.2023.3336423
Peishun Yan;Xiaodong Ji;Yulong Zou;Bin Li
{"title":"Physical-Layer Security for Energy-Harvesting Multiuser Systems Under Hardware Impairments and Channel Estimation Errors","authors":"Peishun Yan;Xiaodong Ji;Yulong Zou;Bin Li","doi":"10.1109/TGCN.2023.3336423","DOIUrl":null,"url":null,"abstract":"This paper considers a typical system composed of multiple energy-constraint users, a destination, and a passive eavesdropper who may intercept confidential information. Each communication time frame is divided into two phases. The first phase is that the energy-constraint users harvest energy from a power beacon. To safeguard the legitimate transmissions, we propose two multiuser scheduling schemes, namely selection combining scheduling (SCS) scheme and switch-and-examine combining scheduling with post-selection (SECSPS) scheme, which only depend on the channel state information of main links spanning from energy-constraint users to the destination. We derive the closed-form expressions of outage probability, intercept probability, and effective secrecy throughput under hardware impairments and channel estimation errors for the SCS and SECSPS schemes. As a baseline, we exploit the system performance for the round-robin scheduling (RRS) scheme. The numerical results verify the correctness of our derivations, demonstrating that the proposed SCS scheme achieves the best performance while the RRS scheme performs the worst in terms of system performance. Furthermore, our proposed SECSPS scheme consumes less computation overhead than the SCS scheme if a suitable threshold is adopted and it requires more computation overhead than the RRS scheme regardless of the threshold.","PeriodicalId":13052,"journal":{"name":"IEEE Transactions on Green Communications and Networking","volume":null,"pages":null},"PeriodicalIF":5.3000,"publicationDate":"2023-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Green Communications and Networking","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10330653/","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
引用次数: 0

Abstract

This paper considers a typical system composed of multiple energy-constraint users, a destination, and a passive eavesdropper who may intercept confidential information. Each communication time frame is divided into two phases. The first phase is that the energy-constraint users harvest energy from a power beacon. To safeguard the legitimate transmissions, we propose two multiuser scheduling schemes, namely selection combining scheduling (SCS) scheme and switch-and-examine combining scheduling with post-selection (SECSPS) scheme, which only depend on the channel state information of main links spanning from energy-constraint users to the destination. We derive the closed-form expressions of outage probability, intercept probability, and effective secrecy throughput under hardware impairments and channel estimation errors for the SCS and SECSPS schemes. As a baseline, we exploit the system performance for the round-robin scheduling (RRS) scheme. The numerical results verify the correctness of our derivations, demonstrating that the proposed SCS scheme achieves the best performance while the RRS scheme performs the worst in terms of system performance. Furthermore, our proposed SECSPS scheme consumes less computation overhead than the SCS scheme if a suitable threshold is adopted and it requires more computation overhead than the RRS scheme regardless of the threshold.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
硬件损伤和信道估计错误条件下能量收集多用户系统的物理层安全性
本文考虑的是一个由多个能量受限用户、一个目的地和一个可能截获机密信息的被动窃听者组成的典型系统。每个通信时间段分为两个阶段。第一阶段是能量受限用户从功率信标中获取能量。为了保护合法传输,我们提出了两种多用户调度方案,即选择组合调度(SCS)方案和带后选择的切换-检查组合调度(SECSPS)方案,这两种方案只依赖于从能量受限用户到目的地的主链路的信道状态信息。我们推导出了 SCS 和 SECSPS 方案在硬件损伤和信道估计误差条件下的中断概率、截获概率和有效保密吞吐量的闭式表达式。作为基线,我们利用了轮循调度(RRS)方案的系统性能。数值结果验证了我们推导的正确性,表明所提出的 SCS 方案性能最佳,而 RRS 方案的系统性能最差。此外,如果采用合适的阈值,我们提出的 SECSPS 方案比 SCS 方案消耗更少的计算开销,而无论采用何种阈值,它都比 RRS 方案需要更多的计算开销。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
IEEE Transactions on Green Communications and Networking
IEEE Transactions on Green Communications and Networking Computer Science-Computer Networks and Communications
CiteScore
9.30
自引率
6.20%
发文量
181
期刊最新文献
Table of Contents Guest Editorial Special Issue on Green Open Radio Access Networks: Architecture, Challenges, Opportunities, and Use Cases IEEE Transactions on Green Communications and Networking IEEE Communications Society Information HSADR: A New Highly Secure Aggregation and Dropout-Resilient Federated Learning Scheme for Radio Access Networks With Edge Computing Systems
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1