Secrecy Performance Analysis of SWIPT System Based on OFDM Assisted Interference

  • Mei QinEmail author
  • Weidang Lu
  • Hong Peng
  • Zhijiang Xu
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 251)


In this paper, we consider the security communications in an OFDM - based SWIPT system by adding a full-duplex, friendly jammer with wireless powered equipment between a transmitter (Tx) and an information receiver (IR) and an energy receiver (ER) which called (regarded as) a potential eavesdropper. We propose a scheme that under friendly jammer protection TX sends source messages to IR and jammer, the jammer sends jammer signal to ER and IR while receiving information from Tx to confound potential eavesdroppers but can be eliminated at IR. Our goal is to maximize the sum secrecy information rate by jointly optimizing the power allocation at the Tx and jammers while satisfying the energy harvesting at the ER.


OFDM SWIPT Cooperative jamming (CJ) Resource allocation 


  1. 1.
    Chen, X., Ng, D.W.K., Chen, H.H.: Secrecy wireless information and power transfer: challenges and opportunities[M]. IEEE Press (2016)Google Scholar
  2. 2.
    Varshney, L.R.: Transporting information and energy simultaneously. In: Proceedings of IEEE International Symposium on Information Theory (ISIT), pp. 1612–1616, Toronto, ON, CA, July 2008Google Scholar
  3. 3.
    Grover, P., Sahai, A.: Shannon meets Tesla: wireless information and power transfer. In: Proceedings of IEEE International Symposium on Information Theory (ISIT), Austin, TX, USA, pp. 2363–2367, June 2010Google Scholar
  4. 4.
    Xing, H., Wong, K.K., Chu, Z., et al.: To harvest and jam: a paradigm of self-sustaining friendly jammers for secure AF relaying. IEEE Trans. Signal Process. 63(24), 6616–6631 (2015)MathSciNetCrossRefGoogle Scholar
  5. 5.
    Goel, S., Negi, R.: Guaranteeing secrecy using artificial noise. IEEE Trans. Wirel. Commun. 7(6), 2180–2189 (2008)CrossRefGoogle Scholar
  6. 6.
    Zhang, M., Liu, Y., Zhang, R.: Artificial noise aided secrecy information and power transfer in OFDMA systems. IEEE Trans. Wirel. Commun. 15(4), 3085–3096 (2016)CrossRefGoogle Scholar
  7. 7.
    Dong, L., Han, Z., Petropulu, A.P., Poor, H.V.: Improving wireless physical layer security via cooperating relays. IEEE Trans. Signal Process. 58(3), 1875–1888 (2010)MathSciNetCrossRefGoogle Scholar
  8. 8.
    Vo, V.N., Nguyen, T.G., So-In, C., et al.: Secrecy performance analysis of energy harvesting wireless sensor networks with a friendly jammer. IEEE Access PP(99), 1 (2017)Google Scholar
  9. 9.
    Bi, Y., Chen, H.: Accumulate and jam: towards secure communication via a wireless-powered full-duplex jammer[J]. IEEE J. Sel. Top. Signal Process. 10(8), 1538–1550 (2016)CrossRefGoogle Scholar
  10. 10.
    Liu, W., Zhou, X., Durrani, S., et al.: Secure communication with a wireless-powered friendly jammer. IEEE Trans. Wirel. Commun. 15(1), 401–415 (2016)CrossRefGoogle Scholar
  11. 11.
    Simeone, O., Popovski, P.: Secure communications via cooperating base stations. IEEE Commun. Lett. 12, 188–190 (2008)CrossRefGoogle Scholar
  12. 12.
    Popovski, P., Simeone, O.: Wireless secrecy in cellular systems with infrastructure-aided cooperation. Trans. Inf. Forensics Secur. 4, 242–256 (2009)CrossRefGoogle Scholar
  13. 13.
    Tekin, E., Yener, A.: The general Gaussian multiple access and two-way wire-tap channels: achievable rates and cooperative jamming. IEEE Trans. Inf. Theory 54, 2735–2751 (2008)CrossRefGoogle Scholar
  14. 14.
    Krikidis, I., Thompson, J.S., Mclaughlin, S.: Relay selection for secure cooperative networks with jamming. IEEE Trans. Wirel. Commun. 8(10), 5003–5011 (2009)CrossRefGoogle Scholar
  15. 15.
    Liu, M., Liu, Y.: Power allocation for secure SWIPT systems with wireless-powered cooperative jamming. IEEE Commun. Lett. PP(99), 1 (2017)Google Scholar

Copyright information

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2018

Authors and Affiliations

  1. 1.College of Information EngineeringZhejiang University of TechnologyHangzhouChina

Personalised recommendations