Advertisement

An RF Energy Harvesting Approach for Secure Wireless Communication in IoT

  • Cheng YinEmail author
  • Emiliano Garcia-Palacios
  • Hien M. Nguyen
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 924)

Abstract

Mobile terminals and base stations are being deployed globally resulting in an increase in carbon emissions. Energy harvesting is attracting considerable attention and an environment- friendly communication system is desirable. In this paper, we demonstrate such a system. A power beacon provides energy for a transmitting source and for a relay using time switching radio frequency energy harvesting technique. We demonstrate that when an eavesdropper tries to wiretap the signals transmitted from the source and the relay the system remains secure. The closed-form expression for secrecy outage probability is derived. Our results show how the performance varies with the SNR of the power beacon and the distance from the relay and the source to the power beacon. In addition, we show that the duration of energy harvesting process in relation to the time used for transmitting information has a significant impact on the system security.

Notes

Acknowledgement

This work was supported by a Research Environment Links grant, ID 339568416, under the Newton Programme Vietnam partnership. The grant is funded by the UK Department of Business, Energy and Industrial Strategy (BEIS) and delivered by the British Council. For further information, please visit www.newtonfund.ac.uk.

References

  1. 1.
    Akhtar, F., Rehmani, M.H.: Energy replenishment using renewable and traditional energy resources for sustainable wireless sensor networks: a review. Renew. Sustain. Energy Rev. 45, 769–784 (2015)CrossRefGoogle Scholar
  2. 2.
    Benedict, F.P., Maji, P., Roy, S.D., Kundu, S.: Secrecy analysis of a cognitive radio network with an energy harvesting AF relay. In: 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), pp. 1358–1363. IEEE (2017)Google Scholar
  3. 3.
    Bloch, M., Barros, J., Rodrigues, M.R., McLaughlin, S.W.: Wireless information-theoretic security. IEEE Trans. Inf. Theory 54(6), 2515–2534 (2008)MathSciNetCrossRefGoogle Scholar
  4. 4.
    Tran, L.G., Cha, H.K., Park, W.T.: RF power harvesting: a review on designing methodologies and applications. Micro Nano Syst. Lett. 5(1), 14 (2017)CrossRefGoogle Scholar
  5. 5.
    Vullers, R., van Schaijk, R., Doms, I., Van Hoof, C., Mertens, R.: Micropower energy harvesting. Solid-State Electron. 53(7), 684–693 (2009)CrossRefGoogle Scholar
  6. 6.
    Yin, C., Nguyen, H.T., Kundu, C., Kaleem, Z., Garcia-Palacios, E., Duong, T.Q.: Secure energy harvesting relay networks with unreliable backhaul connections. IEEE Access 6, 12074–12084 (2018)CrossRefGoogle Scholar
  7. 7.
    Yin, C., Nguyen, N.P., Garcia-Palacios, E., Tran, X.N., Le-Tien, T.: Secure energy harvesting communications with relay selection over nakagami-m fading channels. Mob. Netw. Appl. 1–8 (2017)Google Scholar
  8. 8.
    Zhang, J., Nguyen, N.P., Zhang, J., Garcia-Palacios, E., Le, N.P.: Impact of primary networks on the performance of energy harvesting cognitive radio networks. IET Commun. 10(18), 2559–2566 (2016)CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  • Cheng Yin
    • 1
    Email author
  • Emiliano Garcia-Palacios
    • 1
  • Hien M. Nguyen
    • 2
  1. 1.Queen’s University BelfastBelfastUK
  2. 2.Duy Tan UniversityDa NangVietnam

Personalised recommendations