{"title":"硬件损伤和信道估计错误条件下能量收集多用户系统的物理层安全性","authors":"Peishun Yan;Xiaodong Ji;Yulong Zou;Bin Li","doi":"10.1109/TGCN.2023.3336423","DOIUrl":null,"url":null,"abstract":"This paper considers a typical system composed of multiple energy-constraint users, a destination, and a passive eavesdropper who may intercept confidential information. Each communication time frame is divided into two phases. The first phase is that the energy-constraint users harvest energy from a power beacon. To safeguard the legitimate transmissions, we propose two multiuser scheduling schemes, namely selection combining scheduling (SCS) scheme and switch-and-examine combining scheduling with post-selection (SECSPS) scheme, which only depend on the channel state information of main links spanning from energy-constraint users to the destination. We derive the closed-form expressions of outage probability, intercept probability, and effective secrecy throughput under hardware impairments and channel estimation errors for the SCS and SECSPS schemes. As a baseline, we exploit the system performance for the round-robin scheduling (RRS) scheme. The numerical results verify the correctness of our derivations, demonstrating that the proposed SCS scheme achieves the best performance while the RRS scheme performs the worst in terms of system performance. Furthermore, our proposed SECSPS scheme consumes less computation overhead than the SCS scheme if a suitable threshold is adopted and it requires more computation overhead than the RRS scheme regardless of the threshold.","PeriodicalId":13052,"journal":{"name":"IEEE Transactions on Green Communications and Networking","volume":null,"pages":null},"PeriodicalIF":5.3000,"publicationDate":"2023-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Physical-Layer Security for Energy-Harvesting Multiuser Systems Under Hardware Impairments and Channel Estimation Errors\",\"authors\":\"Peishun Yan;Xiaodong Ji;Yulong Zou;Bin Li\",\"doi\":\"10.1109/TGCN.2023.3336423\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper considers a typical system composed of multiple energy-constraint users, a destination, and a passive eavesdropper who may intercept confidential information. Each communication time frame is divided into two phases. The first phase is that the energy-constraint users harvest energy from a power beacon. To safeguard the legitimate transmissions, we propose two multiuser scheduling schemes, namely selection combining scheduling (SCS) scheme and switch-and-examine combining scheduling with post-selection (SECSPS) scheme, which only depend on the channel state information of main links spanning from energy-constraint users to the destination. We derive the closed-form expressions of outage probability, intercept probability, and effective secrecy throughput under hardware impairments and channel estimation errors for the SCS and SECSPS schemes. As a baseline, we exploit the system performance for the round-robin scheduling (RRS) scheme. The numerical results verify the correctness of our derivations, demonstrating that the proposed SCS scheme achieves the best performance while the RRS scheme performs the worst in terms of system performance. Furthermore, our proposed SECSPS scheme consumes less computation overhead than the SCS scheme if a suitable threshold is adopted and it requires more computation overhead than the RRS scheme regardless of the threshold.\",\"PeriodicalId\":13052,\"journal\":{\"name\":\"IEEE Transactions on Green Communications and Networking\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":5.3000,\"publicationDate\":\"2023-11-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Transactions on Green Communications and Networking\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10330653/\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"TELECOMMUNICATIONS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Green Communications and Networking","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10330653/","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
Physical-Layer Security for Energy-Harvesting Multiuser Systems Under Hardware Impairments and Channel Estimation Errors
This paper considers a typical system composed of multiple energy-constraint users, a destination, and a passive eavesdropper who may intercept confidential information. Each communication time frame is divided into two phases. The first phase is that the energy-constraint users harvest energy from a power beacon. To safeguard the legitimate transmissions, we propose two multiuser scheduling schemes, namely selection combining scheduling (SCS) scheme and switch-and-examine combining scheduling with post-selection (SECSPS) scheme, which only depend on the channel state information of main links spanning from energy-constraint users to the destination. We derive the closed-form expressions of outage probability, intercept probability, and effective secrecy throughput under hardware impairments and channel estimation errors for the SCS and SECSPS schemes. As a baseline, we exploit the system performance for the round-robin scheduling (RRS) scheme. The numerical results verify the correctness of our derivations, demonstrating that the proposed SCS scheme achieves the best performance while the RRS scheme performs the worst in terms of system performance. Furthermore, our proposed SECSPS scheme consumes less computation overhead than the SCS scheme if a suitable threshold is adopted and it requires more computation overhead than the RRS scheme regardless of the threshold.