TY - GEN
T1 - Joint Wireless Power and Information Transfer for Primary Secure Transmission
AU - Song, Rui
AU - Tang, Xiao
AU - Wang, Dawei
AU - Zhai, Daosen
AU - Xu, Woping
AU - Li, Bin
N1 - Publisher Copyright:
© 2019 IEEE.
PY - 2019/10
Y1 - 2019/10
N2 - For the sake of supplying information privacy to the primary network and supporting the secondary quality-of-service (QoS) requirement, we design a cooperative primary preserving strategy which simultaneously transfers power and information in cognitive radio networks. In this strategy, the secondary network offers information security to the primary information in three phases and obtains needed licensed spectrum for the secondary transmission. Specifically, in the first phase, a small part of the primary transmitter's power is allocated for the primary privacy transmission, meanwhile, the remaining power is utilized to beamform the energy signal for energy harvesting. After receiving the privacy signal, two secondary users cooperatively forward the privacy information under jamming protection. In the last phase, SR will occupy the licensed spectrum for the secondary information. For our proposed scheme, we research the transmission reliability and secrecy performances of the primary network and derive their closed -form expressions. Numerical results display the performance improvement of our scheme about the secondary average rate under the primary performance requirements.
AB - For the sake of supplying information privacy to the primary network and supporting the secondary quality-of-service (QoS) requirement, we design a cooperative primary preserving strategy which simultaneously transfers power and information in cognitive radio networks. In this strategy, the secondary network offers information security to the primary information in three phases and obtains needed licensed spectrum for the secondary transmission. Specifically, in the first phase, a small part of the primary transmitter's power is allocated for the primary privacy transmission, meanwhile, the remaining power is utilized to beamform the energy signal for energy harvesting. After receiving the privacy signal, two secondary users cooperatively forward the privacy information under jamming protection. In the last phase, SR will occupy the licensed spectrum for the secondary information. For our proposed scheme, we research the transmission reliability and secrecy performances of the primary network and derive their closed -form expressions. Numerical results display the performance improvement of our scheme about the secondary average rate under the primary performance requirements.
KW - Information and power transfer
KW - security
UR - http://www.scopus.com/inward/record.url?scp=85077776064&partnerID=8YFLogxK
U2 - 10.1109/WCSP.2019.8928093
DO - 10.1109/WCSP.2019.8928093
M3 - 会议稿件
AN - SCOPUS:85077776064
T3 - 2019 11th International Conference on Wireless Communications and Signal Processing, WCSP 2019
BT - 2019 11th International Conference on Wireless Communications and Signal Processing, WCSP 2019
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 11th International Conference on Wireless Communications and Signal Processing, WCSP 2019
Y2 - 23 October 2019 through 25 October 2019
ER -