{"title":"认知蜂窝网络中基于能量采集的D2D通信安全性研究","authors":"Koduru Sree Venkateswara Rao, Ashutosh Kumar Singh","doi":"10.1109/ICOIN56518.2023.10048923","DOIUrl":null,"url":null,"abstract":"This paper underpins the secrecy performance analysis of an energy harvesting-based device-to-device (D2D) communication in a cognitive cellular network. The energy constrained D2D transmitter (Alice) harvests energy from multi-antenna-based power beacons (PBs). The D2D communication system employs underlay scheme of dynamic spectrum access while Alice communicates with the D2D receiver (Bob) in the presence of Eavesdropper (Eve). In this network, we assume that the communication happens in a time frame that is compartmentalized into two-time slots. The energy harvesting is carried out in the first time slot, and the information signal is processed in the later time slot. An analytical expression for the secrecy outage probability is derived, and some useful insights are obtained from it.","PeriodicalId":285763,"journal":{"name":"2023 International Conference on Information Networking (ICOIN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Security of Energy Harvesting Based D2D Communications in Cognitive Cellular Network\",\"authors\":\"Koduru Sree Venkateswara Rao, Ashutosh Kumar Singh\",\"doi\":\"10.1109/ICOIN56518.2023.10048923\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper underpins the secrecy performance analysis of an energy harvesting-based device-to-device (D2D) communication in a cognitive cellular network. The energy constrained D2D transmitter (Alice) harvests energy from multi-antenna-based power beacons (PBs). The D2D communication system employs underlay scheme of dynamic spectrum access while Alice communicates with the D2D receiver (Bob) in the presence of Eavesdropper (Eve). In this network, we assume that the communication happens in a time frame that is compartmentalized into two-time slots. The energy harvesting is carried out in the first time slot, and the information signal is processed in the later time slot. An analytical expression for the secrecy outage probability is derived, and some useful insights are obtained from it.\",\"PeriodicalId\":285763,\"journal\":{\"name\":\"2023 International Conference on Information Networking (ICOIN)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-01-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 International Conference on Information Networking (ICOIN)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICOIN56518.2023.10048923\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Information Networking (ICOIN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICOIN56518.2023.10048923","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security of Energy Harvesting Based D2D Communications in Cognitive Cellular Network
This paper underpins the secrecy performance analysis of an energy harvesting-based device-to-device (D2D) communication in a cognitive cellular network. The energy constrained D2D transmitter (Alice) harvests energy from multi-antenna-based power beacons (PBs). The D2D communication system employs underlay scheme of dynamic spectrum access while Alice communicates with the D2D receiver (Bob) in the presence of Eavesdropper (Eve). In this network, we assume that the communication happens in a time frame that is compartmentalized into two-time slots. The energy harvesting is carried out in the first time slot, and the information signal is processed in the later time slot. An analytical expression for the secrecy outage probability is derived, and some useful insights are obtained from it.