RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      KCI등재 SCIE SCOPUS

      Physical Layer Security for Two-Way Relay NOMA Systems with Energy Harvesting

      한글로보기

      https://www.riss.kr/link?id=A108176678

      • 0

        상세조회
      • 0

        다운로드
      서지정보 열기
      • 내보내기
      • 내책장담기
      • 공유하기
      • 오류접수

      부가정보

      다국어 초록 (Multilingual Abstract)

      Due to the wide application of fifth generation communication, wireless sensor networks have become an indispensable part in our daily life. In this paper, we analyze physical layer security for two-way relay with energy harvesting (EH), where power s...

      Due to the wide application of fifth generation communication, wireless sensor networks have become an indispensable part in our daily life. In this paper, we analyze physical layer security for two-way relay with energy harvesting (EH), where power splitter is considered at relay. And two kinds of combined methods, i.e., selection combining (SC) and maximum ratio combining (MRC) schemes, are employed at eavesdropper. What’s more, the closed-form expressions for security performance are derived. For comparison purposes, this security behaviors for orthogonal multiple access (OMA) networks are also investigated. To gain deeper insights, the end-to-end throughput and approximate derivations of secrecy outage probability (SOP) under the high signal-to-noise ratio (SNR) regime are studied. Practical Monte-Carlo simulative results verify the numerical analysis and indicate that: i) The secure performance of SC scheme is superior to MRC scheme because of being applied on eavesdropper; ii) The secure behaviors can be affected by various parameters like power allocation coefficients, transmission rate, etc; iii) In the low and medium SNR region, the security and channel capacity are higher for cooperative non-orthogonal multiple access (NOMA) systems in contrast with OMA systems; iv) The systematic throughput can be improved by changing the energy conversion efficiency and power splitting factor. The purpose of this study is to provide theoretical direction and design of secure communication.

      더보기

      참고문헌 (Reference)

      1 K. Lee, "Wireless-Powered Two-Way Relaying Protocols for Optimizing Physical Layer Security" 14 (14): 162-174, 2019

      2 D. -T. Do, "User Grouping and Energy Harvesting in UAV-NOMA System With AF/DF Relaying" 70 (70): 11855-11868, 2021

      3 Y. Liu, "Two-way relaying networks with wireless power transfer: Policies design and throughput analysis" 4030-4035, 2014

      4 E. Soleimani-Nasab, "Two-Way AF Relaying in the Presence of Co-Channel Interference" 61 (61): 3156-3169, 2013

      5 W. Zhang, "Transmit Beamforming for Layered Physical Layer Security" 68 (68): 9747-9760, 2019

      6 Y. Zhong, "TradeoffBetween Delay and Physical Layer Security in Wireless Networks" 36 (36): 1635-1647, 2018

      7 D. Do, "Throughput Analysis of Multipair Two-Way Replaying Networks With NOMA and Imperfect CSI" 8 : 128942-128953, 2020

      8 N. T. P. Van, "Three-Step Two-Way Decode and Forward Relay With Energy Harvesting" 21 (21): 857-860, 2017

      9 I. S. Gradshteyn, "Table of Integrals, Series, and Products" Elsevier 2007

      10 L. Shi, "System Outage Performance for Three-Step Two-Way Energy Harvesting DF Relaying" 68 (68): 3600-3612, 2019

      1 K. Lee, "Wireless-Powered Two-Way Relaying Protocols for Optimizing Physical Layer Security" 14 (14): 162-174, 2019

      2 D. -T. Do, "User Grouping and Energy Harvesting in UAV-NOMA System With AF/DF Relaying" 70 (70): 11855-11868, 2021

      3 Y. Liu, "Two-way relaying networks with wireless power transfer: Policies design and throughput analysis" 4030-4035, 2014

      4 E. Soleimani-Nasab, "Two-Way AF Relaying in the Presence of Co-Channel Interference" 61 (61): 3156-3169, 2013

      5 W. Zhang, "Transmit Beamforming for Layered Physical Layer Security" 68 (68): 9747-9760, 2019

      6 Y. Zhong, "TradeoffBetween Delay and Physical Layer Security in Wireless Networks" 36 (36): 1635-1647, 2018

      7 D. Do, "Throughput Analysis of Multipair Two-Way Replaying Networks With NOMA and Imperfect CSI" 8 : 128942-128953, 2020

      8 N. T. P. Van, "Three-Step Two-Way Decode and Forward Relay With Energy Harvesting" 21 (21): 857-860, 2017

      9 I. S. Gradshteyn, "Table of Integrals, Series, and Products" Elsevier 2007

      10 L. Shi, "System Outage Performance for Three-Step Two-Way Energy Harvesting DF Relaying" 68 (68): 3600-3612, 2019

      11 B. Li, "Security-Reliability TradeoffAnalysis for Cooperative NOMA in Cognitive Radio Networks" 67 (67): 83-96, 2019

      12 B. Zheng, "Secure NOMA Based Two-Way Relay Networks Using Artificial Noise and Full Duplex" 36 (36): 1426-1440, 2018

      13 F. Jameel, "Secure Communications in Three-Step Two-Way Energy Harvesting DF Relaying" 22 (22): 308-311, 2018

      14 M. K. Shukla, "Secrecy Performance Analysis of Two-Way Relay Non-Orthogonal Multiple Access Systems" 8 : 39502-39512, 2020

      15 H. Li, "Secrecy Outage Probability of Relay Selection Based Cooperative NOMA for IoT Networks" 9 : 1655-1665, 2020

      16 B. Li, "Secrecy Outage Probability Analysis of Friendly Jammer Selection Aided Multiuser Scheduling for Wireless Networks" 67 (67): 3482-3495, 2019

      17 M. Alageli, "SWIPT Massive MIMO Systems With Active Eavesdropping" 37 (37): 233-247, 2019

      18 H. Shi, "Physical Layer Security in the Untrusted EH Relay Networks with the Cooperative Jammer" 899-903, 2020

      19 R. Chopra, "Physical Layer Security in Wireless Sensor Networks Using Distributed Co-Phasing" 14 (14): 2662-2675, 2019

      20 S. Jia, "Performance analysis of physical layer security over---fading channels" 15 (15): 138-148, 2018

      21 D.-T. Do, "Performance Analysis of Clustering Car-Following V2X System with Wireless Power Transfer and Massive Connections" 1-18, 2021

      22 C. K. Singh, "Overlay Cognitive IoT-Based Full-Duplex Relaying NOMA Systems with Hardware Imperfections" 9 (9): 6578-6596, 2022

      23 P. V. Tuan, "Optimizing Efficient Energy Transmission on a SWIPT Interference Channel Under Linear/Nonlinear EH Models" 14 (14): 457-468, 2020

      24 A. Rauniyar, "On the Performance of Bidirectional NOMA-SWIPT Enabled IoT Relay Networks" 21 (21): 2299-2315, 2021

      25 H. H. Jang, "Novel Frequency-Splitting SWIPT for Overcoming Amplifier Nonlinearity" 9 (9): 826-829, 2020

      26 Z. Fang, "New NOMA-Based Two-Way Relay Networks" 69 (69): 15314-15324, 2020

      27 X. Yue, "Modeling and Analysis of Two-Way Relay Non-Orthogonal Multiple Access Systems" 66 (66): 3784-3796, 2018

      28 R. Zhang, "MIMO Broadcasting for Simultaneous Wireless Information and Power Transfer" 12 (12): 1989-2001, 2013

      29 H. Lee, "Joint Transceiver Optimization for MISO SWIPT Systems with Time Switching" 17 (17): 3298-3312, 2018

      30 X. Li, "I/Q Imbalance Aware Nonlinear Wireless-Powered Relaying of B5G Networks : Security and Reliability Analysis" 8 (8): 2995-3008, 2021

      31 X. Li, "Hardware Impaired Ambient Backscatter NOMA Systems : Reliability and Security" 69 (69): 2723-2736, 2021

      32 M. -S. Van Nguyen, "Exploiting Impacts of Antenna Selection and Energy Harvesting for Massive Network Connectivity" 69 (69): 7587-7602, 2021

      33 C. K. Singh, "Energy Harvesting in Overlay Cognitive NOMA Systems With Hardware Impairments" 16 (16): 2648-2659, 2022

      34 J. G. Proakis, "Digital Communications" McGraw-Hill 2001

      35 S. P. Ngoc, "Cooperative communication with energy-harvesting relays under physical layer security" 9 (9): 2131-2139, 2015

      36 Z. Deng, "Beamforming Design for Physical Layer Security in a Two-Way Cognitive Radio IoT Network With SWIPT" 6 (6): 10 786-10 798, 2019

      37 Z. Deng, "Beamforming Design for Physical Layer Security in a Two-Way Cognitive Radio IoT Network With SWIPT" 6 (6): 10786-10798, 2019

      38 Z. Ding, "Application of smart antenna technologies in simultaneous wireless information and power transfer" 53 (53): 86-93, 2015

      39 H. Hui, "A novel secure data transmission scheme in industrial internet of things" 17 (17): 73-88, 2020

      더보기

      동일학술지(권/호) 다른 논문

      동일학술지 더보기

      더보기

      분석정보

      View

      상세정보조회

      0

      Usage

      원문다운로드

      0

      대출신청

      0

      복사신청

      0

      EDDS신청

      0

      동일 주제 내 활용도 TOP

      더보기

      주제

      연도별 연구동향

      연도별 활용동향

      연관논문

      연구자 네트워크맵

      공동연구자 (7)

      유사연구자 (20) 활용도상위20명

      인용정보 인용지수 설명보기

      학술지 이력

      학술지 이력
      연월일 이력구분 이력상세 등재구분
      학술지등록 한글명 : KSII Transactions on Internet and Information Systems
      외국어명 : KSII Transactions on Internet and Information Systems
      2023 평가예정 해외DB학술지평가 신청대상 (해외등재 학술지 평가)
      2020-01-01 평가 등재학술지 유지 (해외등재 학술지 평가) KCI등재
      2013-10-01 평가 등재학술지 선정 (기타) KCI등재
      2011-01-01 평가 등재후보학술지 유지 (기타) KCI등재후보
      2009-01-01 평가 SCOPUS 등재 (신규평가) KCI등재후보
      더보기

      학술지 인용정보

      학술지 인용정보
      기준연도 WOS-KCI 통합IF(2년) KCIF(2년) KCIF(3년)
      2016 0.45 0.21 0.37
      KCIF(4년) KCIF(5년) 중심성지수(3년) 즉시성지수
      0.32 0.29 0.244 0.03
      더보기

      이 자료와 함께 이용한 RISS 자료

      나만을 위한 추천자료

      해외이동버튼