TY - JOUR
T1 - Wireless-powered two-way relaying protocols for optimizing physical layer security
AU - Lee, Kisong
AU - Hong, Jun Pyo
AU - Choi, Hyun Ho
AU - Quek, Tony Q.S.
N1 - Funding Information:
Manuscript received November 30, 2017; revised March 12, 2018 and May 4, 2018; accepted May 29, 2018. Date of publication June 14, 2018; date of current version July 23, 2018. This work was supported in part by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science, ICT & Future Planning under Grant NRF-2016R1C1B1016261 and in part by the NRF grant through the Korean Government (MSIT) under Grant 2018R1C1B6003297. The associate editor coordinating the review of this manuscript and approving it for publication was Prof. Georges Kaddoum. (Corresponding author: Hyun-Ho Choi.) K. Lee is with the School of Information and Communication Engineering, Chungbuk National University, Cheongju 28644, South Korea (e-mail: kslee851105@gmail.com).
Publisher Copyright:
© 2005-2012 IEEE.
PY - 2019/1
Y1 - 2019/1
N2 - This paper considers a two-way relay network, in which two sources exchange data through a relay and a cooperative jammer transmits an artificial noise (AN) while a number of nearby eavesdroppers overhear to recover data from both sources. The relay harvests energy from the two source signals and the AN, and then, uses this harvested energy to forward the received signals to the two sources. Each source eliminates its own signal from the relaying signal by self-cancellation and then decodes the data signal received from the other source. For this wireless-powered two-way relay system, we propose two secure relay protocols based on power splitting and time switching techniques. The two protocols are power splitting-based two-way relaying (PS-TWR) and time switching-based two-way relaying (TS-TWR), in which the relay, respectively, controls the power splitting ratio ( ρ ) and time switching ratio ( α ), in order to achieve a balance between the data receiving and the energy harvesting. The optimal values of ρ and α for each protocol are found analytically to maximize the minimum guaranteed secrecy capacity (CS-min) considering multiple eavesdroppers in high signal-to-noise ratio environments. Numerical results show that both the PS-TWR and TS-TWR protocols using the optimized values of ρ and α achieve the near-optimal CS -min no matter how many eavesdroppers exist anywhere. Comparisons of the two protocols in various scenarios also show that PS-TWR achieves better CS -min than TS-TWR because PS-TWR inherently has a shorter vulnerable time for eavesdropping than TS-TWR.
AB - This paper considers a two-way relay network, in which two sources exchange data through a relay and a cooperative jammer transmits an artificial noise (AN) while a number of nearby eavesdroppers overhear to recover data from both sources. The relay harvests energy from the two source signals and the AN, and then, uses this harvested energy to forward the received signals to the two sources. Each source eliminates its own signal from the relaying signal by self-cancellation and then decodes the data signal received from the other source. For this wireless-powered two-way relay system, we propose two secure relay protocols based on power splitting and time switching techniques. The two protocols are power splitting-based two-way relaying (PS-TWR) and time switching-based two-way relaying (TS-TWR), in which the relay, respectively, controls the power splitting ratio ( ρ ) and time switching ratio ( α ), in order to achieve a balance between the data receiving and the energy harvesting. The optimal values of ρ and α for each protocol are found analytically to maximize the minimum guaranteed secrecy capacity (CS-min) considering multiple eavesdroppers in high signal-to-noise ratio environments. Numerical results show that both the PS-TWR and TS-TWR protocols using the optimized values of ρ and α achieve the near-optimal CS -min no matter how many eavesdroppers exist anywhere. Comparisons of the two protocols in various scenarios also show that PS-TWR achieves better CS -min than TS-TWR because PS-TWR inherently has a shorter vulnerable time for eavesdropping than TS-TWR.
UR - http://www.scopus.com/inward/record.url?scp=85048578030&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85048578030&partnerID=8YFLogxK
U2 - 10.1109/TIFS.2018.2847452
DO - 10.1109/TIFS.2018.2847452
M3 - Article
AN - SCOPUS:85048578030
VL - 14
SP - 162
EP - 174
JO - IEEE Transactions on Information Forensics and Security
JF - IEEE Transactions on Information Forensics and Security
SN - 1556-6013
IS - 1
ER -