Enhancing Physical Layer Security in Wireless Powered Communication Networks

  • Abbas Jamalipour
  • Ying Bi


This chapter starts with investigating the problem of secure transmission between a wireless-powered transmitter and a receiver in the presence of multiple eavesdroppers. To counteract eavesdropping, a transmission protocol named accumulate-then-transmit (ATT) is proposed. Specifically, the proposed protocol employs a multi-antenna power beacon (PB) to assist the transmitter with secure transmission. First, the PB transfers wireless power to charge the transmitter’s battery. After accumulating enough energy, the transmitter sends confidential information to the receiver, and simultaneously, the PB emits jamming signals (i.e., artificial noise) to interfere with the eavesdroppers. A key element of the protocol is the perfect CSI, with which the jamming signals can be deliberately designed to avoid disturbing the intended receiver. Based on the assumption that the eavesdroppers do not collude, the secrecy performance of the proposed protocol is evaluated in terms of secrecy outage probability and secrecy throughput. This study reveals that CJ is a critical enabler of PLS in WPCNs. After investigating the use of a multi-antenna PB with perfect CSI, we exploit the employment of a wireless-powered FD jammer to enhance the secrecy in the presence of CSI errors. Noteworthy, due to imperfect CSI, the jamming signals transmitted by the jammer yield undesired interference at the receiver. This study analyzes the impact of channel estimation error on the secrecy performance. Besides, due to the FD capability, the jammer is able to perform simultaneous jamming and energy harvesting. It hence makes the energy storage of the jammer experience concurrent charging and discharging. A hybrid energy storage system with finite capacity is adopted, and its long-term stationary distribution of the energy state is characterized through a finite-state Markov Chain. The secrecy performance of the proposed accumulate-and-jam (AnJ) protocol is evaluated to reveal its merits. Moreover, an alternative energy storage model with infinite capacity and the use of a wireless-powered HD jammer are also exploited to serve as benchmarks.


  1. 1.
    L. Tang and Q. Li, “Wireless Power Transfer and Cooperative Jamming for Secrecy Throughput Maximization,” IEEE Wireless Commun. Lett., vol. PP, no. 99, pp. 1–1, 2016.Google Scholar
  2. 2.
    X. Jiang, C. Zhong, Z. Zhang, and G. K. Karagiannidis, “Power Beacon Assisted Wiretap Channels With Jamming,” IEEE Trans. Wireless Commun., vol. 15, no. 12, pp. 8353–8367, Dec. 2016.CrossRefGoogle Scholar
  3. 3.
    A. Wyner, “The wire-tap channel,” Bell Sys. Tech. J., vol. 54, no. 8, pp. 1355–1387, Oct. 1975.MathSciNetCrossRefGoogle Scholar
  4. 4.
    J. Barros and M. Rodrigues, “Secrecy Capacity of Wireless Channels,” in Proc. IEEE Int. Symp. Inf. Theory, Seattle, WA, USA, 2006, pp. 356–360.Google Scholar
  5. 5.
    R. Negi and S. Goel, “Secret communication using artificial noise,” in in Proc. IEEE VTC, Dallas, TX, USA, 2005, pp. 1906–1910.Google Scholar
  6. 6.
    X. Zhou and M. McKay, “Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation,” IEEE Trans. Veh. Technol., vol. 59, no. 8, pp. 3831–3842, Oct. 2010.CrossRefGoogle Scholar
  7. 7.
    S. Goel and R. Negi, “Guaranteeing Secrecy using Artificial Noise,” IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180–2189, Jun. 2008.CrossRefGoogle Scholar
  8. 8.
    W. Mou, Y. Cai, W. Yang, W. Yang, X. Xu, and J. Hu, “Exploiting full Duplex techniques for secure communication in SWIPT system,” in Proc. WCSP, Nanjing, China, Oct. 2015, pp. 1–6.Google Scholar
  9. 9.
    W. Liu, X. Zhou, S. Durrani, and P. Popovski, “Secure Communication with a Wireless-Powered Friendly Jammer,” IEEE Trans. Wireless Commun., vol. 15, no. 1, pp. 401–415, Jan. 2016.CrossRefGoogle Scholar
  10. 10.
    X. Jiang, C. Zhong, X. Chen, T. Q. Duong, T. A. Tsiftsis, and Z. Zhang, “Secrecy Performance of Wirelessly Powered Wiretap Channels,” IEEE Trans. Commun., vol. 64, no. 9, pp. 3858–3871, Sep. 2016.CrossRefGoogle Scholar
  11. 11.
    H. Xing, K.-K. Wong, Z. Chu, and A. Nallanathan, “To Harvest and Jam: A Paradigm of Self-Sustaining Friendly Jammers for Secure AF Relaying,” IEEE Trans. Signal Process., vol. 63, no. 24, pp. 6616–6631, Dec. 2015.MathSciNetCrossRefGoogle Scholar
  12. 12.
    I. Krikidis, S. Timotheou, and S. Sasaki, “RF Energy Transfer for Cooperative Networks: Data Relaying or Energy Harvesting?” IEEE Commun. Lett., vol. 16, no. 11, pp. 1772–1775, Nov. 2012.CrossRefGoogle Scholar
  13. 13.
    M. Haenggi, Stochastic Geometry for Wireless Networks. Cambridge University Press, Oct. 2012.CrossRefGoogle Scholar
  14. 14.
    Z. Ding and H. V. Poor, “Cooperative Energy Harvesting Networks With Spatially Random Users,” IEEE Signal Process. Lett., vol. 20, no. 12, pp. 1211–1214, Dec. 2013.CrossRefGoogle Scholar
  15. 15.
    P. Liu, S. Gazor, I. M. Kim, and D. I. Kim, “Noncoherent Relaying in Energy Harvesting Communication Systems,” IEEE Trans. Wireless Commun., vol. 14, no. 12, pp. 6940–6954, Dec. 2015.CrossRefGoogle Scholar
  16. 16.
    I. Krikidis, “SWIPT in 3-D Bipolar Ad Hoc Networks With Sectorized Antennas,” IEEE Commun. Lett., vol. 20, no. 6, pp. 1267–1270, Jun. 2016.CrossRefGoogle Scholar
  17. 17.
    S. Luo, J. Li, and A. Petropulu, “Uncoordinated cooperative jamming for secret communications,” IEEE Trans. Inf. Forensics Security, vol. 8, no. 7, pp. 1081–1090, July 2013.CrossRefGoogle Scholar
  18. 18.
    A. Thangaraj, S. Dihidar, A. R. Calderbank, S. W. McLaughlin, and J. M. Merolla, “Applications of LDPC Codes to the Wiretap Channel,” IEEE Trans. Inf. Theory, vol. 53, no. 8, pp. 2933–2945, Aug. 2007.MathSciNetCrossRefGoogle Scholar
  19. 19.
    J. Xu and R. Zhang, “Energy Beamforming With One-Bit Feedback,” IEEE Trans. Signal Process., vol. 62, no. 20, pp. 5370–5381, Oct. 2014.MathSciNetCrossRefGoogle Scholar
  20. 20.
    H. J. Visser and R. J. M. Vullers, “RF Energy Harvesting and Transport for Wireless Sensor Network Applications: Principles and Requirements,” vol. 101, no. 6, pp. 1410–1423, Jun. 2013.Google Scholar
  21. 21.
    A. Khaligh and Z. Li, “Battery, Ultracapacitor, Fuel Cell, and Hybrid Energy Storage Systems for Electric, Hybrid Electric, Fuel Cell, and Plug-In Hybrid Electric Vehicles: State of the Art,” IEEE Trans. Veh. Technol., vol. 59, no. 6, pp. 2806–2814, Jul. 2010.CrossRefGoogle Scholar
  22. 22.
    X. Lu, P. Wang, D. Niyato, D. I. Kim, and Z. Han, “Wireless Networks With RF Energy Harvesting: A Contemporary Survey,” IEEE Commun. Surveys Tuts., vol. 17, no. 2, pp. 757–789, 2015.CrossRefGoogle Scholar
  23. 23.
    M. Maso, C. F. Liu, C. H. Lee, T. Q. S. Quek, and L. S. Cardoso, “Energy-Recycling Full-Duplex Radios for Next-Generation Networks,” IEEE J. Sel. Areas Commun., vol. 33, no. 12, pp. 2948–2962, Dec. 2015.CrossRefGoogle Scholar
  24. 24.
    J. Agust, G. Abadal, and J. Alda, “Electromagnetic radiation energy investing — the rectenna based approach,” in ICT — Energy-Concepts Towards Zero-Power Information and Communication Technology, InTech, Feb. 2014. [Online]. Available:
  25. 25.
    Y. Zeng and R. Zhang, “Full-Duplex Wireless-Powered Relay With Self-Energy Recycling,” IEEE Wireless Commun. Lett., vol. 4, no. 2, pp. 201–204, Apr. 2015.CrossRefGoogle Scholar
  26. 26.
    C. Zhong, H. Suraweera, G. Zheng, I. Krikidis, and Z. Zhang, “Wireless Information and Power Transfer With Full Duplex Relaying,” IEEE Trans. Commun., vol. 62, no. 10, pp. 3447–3461, Oct. 2014.CrossRefGoogle Scholar
  27. 27.
    Y. Che, J. Xu, L. Duan, and R. Zhang, “Multiantenna Wireless Powered Communication With Cochannel Energy and Information Transfer,” IEEE Commun. Lett., vol. 19, no. 12, pp. 2266–2269, Dec. 2015.CrossRefGoogle Scholar
  28. 28.
    J. Xu, S. Bi, and R. Zhang, “Multiuser MIMO Wireless Energy Transfer With Coexisting Opportunistic Communication,” IEEE Wireless Commun. Lett., vol. 4, no. 3, pp. 273–276, Jun. 2015.CrossRefGoogle Scholar
  29. 29.
    Y. Zeng and R. Zhang, “Optimized Training Design for Wireless Energy Transfer,” IEEE Trans. Commun., vol. 63, no. 2, pp. 536–550, Feb. 2015.CrossRefGoogle Scholar
  30. 30.
    W. Feng, Y. Wang, N. Ge, J. Lu and J. Zhang, “Virtual MIMO in Multi-Cell Distributed Antenna Systems: Coordinated Transmissions with Large-Scale CSIT,” IEEE J. Sel. Areas Commun., vol. 31, no. 10, pp. 2067–2081, Oct 2013.CrossRefGoogle Scholar
  31. 31.
    W. Feng, Y. Wang, D. Lin, N. Ge, J. Lu and S. Li, “When mmWave Communications Meet Network Densification: A Scalable Interference Coordination Perspective,” IEEE J. Sel. Areas Commun., vol. 35, no. 7, pp. 1459–1471, Jul 2017.CrossRefGoogle Scholar
  32. 32.
    X. Chen, J. Chen, H. Zhang, Y. Zhang, and C. Yuen, “On Secrecy Performance of A Multi-Antenna Jammer Aided Secure Communications with Imperfect CSI,” IEEE Trans. Veh. Technol., vol. PP, no. 99, pp. 1–1, 2015.Google Scholar
  33. 33.
    D. S. Michalopoulos, H. A. Suraweera, G. K. Karagiannidis, and R. Schober, “Amplify-and-Forward Relay Selection with Outdated Channel Estimates,” IEEE Trans. Commun., vol. 60, no. 5, pp. 1278–1290, May 2012.CrossRefGoogle Scholar
  34. 34.
    Q. Shi, C. Peng, W. Xu, M. Hong, and Y. Cai, “Energy Efficiency Optimization for MISO SWIPT Systems With Zero-Forcing Beamforming,” IEEE Trans. Signal Process., vol. 64, no. 4, pp. 842–854, Feb. 2016.MathSciNetCrossRefGoogle Scholar
  35. 35.
    S. Cui, A. J. Goldsmith, and A. Bahai, “Energy-efficiency of MIMO and cooperative MIMO techniques in sensor networks,” IEEE J. Sel. Areas Commun., vol. 22, no. 6, pp. 1089–1098, Aug. 2004.CrossRefGoogle Scholar
  36. 36.
    W.-J. Huang, Y.-W. Hong, and C.-C. Kuo, “Lifetime maximization for amplify-and-forward cooperative networks,” IEEE Trans. Wireless Commun., vol. 7, no. 5, pp. 1800–1805, May 2008.CrossRefGoogle Scholar
  37. 37.
    Y.-c. Ko, A. Abdi, M.-S. Alouini, and M. Kaveh, “Average outage duration of diversity systems over generalized fading channels,” in Proc. IEEE WCNC, Chicago, Il, USA, 2000, pp. 216–221.Google Scholar
  38. 38.
    I. S. Gradshteyn and I. M. Ryzhik, Table of integrals, series, and products, 7th ed. New York: Academic Press, 2007.zbMATHGoogle Scholar
  39. 39.
    I. Krikidis, T. Charalambous, and J. Thompson, “Buffer-Aided Relay Selection for Cooperative Diversity Systems without Delay Constraints,” IEEE Trans. Wireless Commun., vol. 11, no. 5, pp. 1957–1967, May 2012.CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Abbas Jamalipour
    • 1
  • Ying Bi
    • 1
  1. 1.The University of SydneySydneyAustralia

Personalised recommendations