首页 | 本学科首页   官方微博 | 高级检索  
     检索      


Secrecy analysis for IoT relaying networks deploying NOMA with energy harvesting
Institution:1. Department of Mathematics, Fuyang Normal University, Fuyang 236037, China;2. Department of Mathematics, Yangzhou University, Yangzhou 225002, China;3. Department of Information Technology, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 21589, Saudi Arabia;1. Department of Control Science and Engineering, Harbin Institute of Technology, Harbin, 150006, PR China;2. Coordinated Science Laboratory, University of Illinois at Urbana-Champaign, Urbana, IL 61801 USA;1. School of Electrical Engineering and Automation, Hefei University of Technology, Hefei, China;2. Engineering Technology Research Center of Industrial Automation, Hefei, China;3. China Energy Engineering Group Anhui Electric Power Design Institute Co., Ltd., Hefei, China;1. Institute of Complexity Science, School of Automation, Qingdao University, Qingdao 266071, PR China;2. Shandong Key Laboratory of Industrial Control Technology, Qingdao 266071, PR China;3. School of Automation, Southeast University, Nanjing 210096, PR China;4. Key Laboratory of Measurement and Control of CSE, Ministry of Education, PR China;1. LSC, NCMIS, Academy of Mathematics and Systems Science, Chinese Academy of Sciences, Beijing, 100190, PR China;2. School of Mathematical Sciences, University of Chinese Academy of Sciences, Beijing, 100049, PR China
Abstract:In this paper, we investigate the physical-layer security for an Internet of Things (IoT) relaying network employing non-orthogonal multiple access (NOMA) in the context of non-linear energy harvesting. In particular, a power-constrained source transmits its confidential information to a destination via an IoT device, which first decodes the received signal and then forwards the decoded data together with its own information using the NOMA technique to their respective destinations, while an eavesdropper is overhearing this transmission. Considering the scenario that both the power-constrained source and the IoT device are assumed to work under non-linear energy harvesting modes, and are capable of harvesting energy from a power beacon with a time switching protocol, both analytical and asymptotic expressions for secrecy outage probability as well as the analytical expression for the probability of strictly positive secrecy capacity are derived. In addition, those expressions are also verified with Monte-Carlo simulations.
Keywords:
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号