Physical-Layer Security for Energy-Harvesting Multiuser Systems Under Hardware Impairments and Channel Estimation Errors

IF 5.3 2区 计算机科学 Q1 TELECOMMUNICATIONS
Peishun Yan;Xiaodong Ji;Yulong Zou;Bin Li
{"title":"Physical-Layer Security for Energy-Harvesting Multiuser Systems Under Hardware Impairments and Channel Estimation Errors","authors":"Peishun Yan;Xiaodong Ji;Yulong Zou;Bin Li","doi":"10.1109/TGCN.2023.3336423","DOIUrl":null,"url":null,"abstract":"This paper considers a typical system composed of multiple energy-constraint users, a destination, and a passive eavesdropper who may intercept confidential information. Each communication time frame is divided into two phases. The first phase is that the energy-constraint users harvest energy from a power beacon. To safeguard the legitimate transmissions, we propose two multiuser scheduling schemes, namely selection combining scheduling (SCS) scheme and switch-and-examine combining scheduling with post-selection (SECSPS) scheme, which only depend on the channel state information of main links spanning from energy-constraint users to the destination. We derive the closed-form expressions of outage probability, intercept probability, and effective secrecy throughput under hardware impairments and channel estimation errors for the SCS and SECSPS schemes. As a baseline, we exploit the system performance for the round-robin scheduling (RRS) scheme. The numerical results verify the correctness of our derivations, demonstrating that the proposed SCS scheme achieves the best performance while the RRS scheme performs the worst in terms of system performance. Furthermore, our proposed SECSPS scheme consumes less computation overhead than the SCS scheme if a suitable threshold is adopted and it requires more computation overhead than the RRS scheme regardless of the threshold.","PeriodicalId":13052,"journal":{"name":"IEEE Transactions on Green Communications and Networking","volume":null,"pages":null},"PeriodicalIF":5.3000,"publicationDate":"2023-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Green Communications and Networking","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10330653/","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
引用次数: 0

Abstract

This paper considers a typical system composed of multiple energy-constraint users, a destination, and a passive eavesdropper who may intercept confidential information. Each communication time frame is divided into two phases. The first phase is that the energy-constraint users harvest energy from a power beacon. To safeguard the legitimate transmissions, we propose two multiuser scheduling schemes, namely selection combining scheduling (SCS) scheme and switch-and-examine combining scheduling with post-selection (SECSPS) scheme, which only depend on the channel state information of main links spanning from energy-constraint users to the destination. We derive the closed-form expressions of outage probability, intercept probability, and effective secrecy throughput under hardware impairments and channel estimation errors for the SCS and SECSPS schemes. As a baseline, we exploit the system performance for the round-robin scheduling (RRS) scheme. The numerical results verify the correctness of our derivations, demonstrating that the proposed SCS scheme achieves the best performance while the RRS scheme performs the worst in terms of system performance. Furthermore, our proposed SECSPS scheme consumes less computation overhead than the SCS scheme if a suitable threshold is adopted and it requires more computation overhead than the RRS scheme regardless of the threshold.
硬件损伤和信道估计错误条件下能量收集多用户系统的物理层安全性
本文考虑的是一个由多个能量受限用户、一个目的地和一个可能截获机密信息的被动窃听者组成的典型系统。每个通信时间段分为两个阶段。第一阶段是能量受限用户从功率信标中获取能量。为了保护合法传输,我们提出了两种多用户调度方案,即选择组合调度(SCS)方案和带后选择的切换-检查组合调度(SECSPS)方案,这两种方案只依赖于从能量受限用户到目的地的主链路的信道状态信息。我们推导出了 SCS 和 SECSPS 方案在硬件损伤和信道估计误差条件下的中断概率、截获概率和有效保密吞吐量的闭式表达式。作为基线,我们利用了轮循调度(RRS)方案的系统性能。数值结果验证了我们推导的正确性,表明所提出的 SCS 方案性能最佳,而 RRS 方案的系统性能最差。此外,如果采用合适的阈值,我们提出的 SECSPS 方案比 SCS 方案消耗更少的计算开销,而无论采用何种阈值,它都比 RRS 方案需要更多的计算开销。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
IEEE Transactions on Green Communications and Networking
IEEE Transactions on Green Communications and Networking Computer Science-Computer Networks and Communications
CiteScore
9.30
自引率
6.20%
发文量
181
文献相关原料
公司名称 产品信息 采购帮参考价格
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信