55
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Secrecy Wireless Information and Power Transfer: Challenges and Opportunities

      Preprint
      , ,

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Wireless information and power transfer (WIPT) enables more sustainable and resilient communications owing to the fact that it avoids frequent battery charging and replacement. However, it also suffers from possible information interception due to the open nature of wireless channels. Compared to traditional secure communications, secrecy wireless information and power transfer (SWIPT) carries several distinct characteristics. On one hand, wireless power transfer may increase the vulnerability of eavesdropping, since a power receiver, as a potential eavesdropper, usually has a shorter access distance than an information receiver. On the other hand, wireless power transfer can be exploited to enhance wireless security. This article reviews the security issues in various SWIPT scenarios, with an emphasis on revealing the corresponding challenges and opportunities for implementing SWIPT. Furthermore, we provide a survey on a variety of physical layer security techniques to improve secrecy performance. In particular, we propose to use massive multiple-input multiple-output (MIMO) techniques to enhance power transfer efficiency and secure information transmission simultaneously. Finally, we discuss several potential research directions to further enhance the security in SWIPT systems.

          Related collections

          Most cited references11

          • Record: found
          • Abstract: not found
          • Article: not found

          Noncooperative Cellular Wireless with Unlimited Numbers of Base Station Antennas

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            On the Secrecy Capacity of Fading Channels

              Bookmark
              • Record: found
              • Abstract: found
              • Article: found
              Is Open Access

              Robust Beamforming for Secure Communication in Systems with Wireless Information and Power Transfer

              , , (2014)
              This paper considers a multiuser multiple-input single-output (MISO) downlink system with simultaneous wireless information and power transfer. In particular, we focus on secure communication in the presence of passive eavesdroppers and potential eavesdroppers (idle legitimate receivers). We study the design of a resource allocation algorithm minimizing the total transmit power for the case when the legitimate receivers are able to harvest energy from radio frequency signals. Our design advocates the dual use of both artificial noise and energy signals in providing secure communication and facilitating efficient wireless energy transfer. The algorithm design is formulated as a non-convex optimization problem. The problem formulation takes into account artificial noise and energy signal generation for protecting the transmitted information against both considered types of eavesdroppers when imperfect channel state information (CSI) of the potential eavesdroppers and no CSI of the passive eavesdroppers are available at the transmitter. In light of the intractability of the problem, we reformulate the considered problem by replacing a non-convex probabilistic constraint with a convex deterministic constraint. Then, a semi-definite programming (SDP) relaxation approach is adopted to obtain the optimal solution for the reformulated problem. Furthermore, we propose a suboptimal resource allocation scheme with low computational complexity for providing communication secrecy and facilitating efficient energy transfer. Simulation results demonstrate a close-to-optimal performance achieved by the proposed schemes and significant transmit power savings by optimization of the artificial noise and energy signal generation.
                Bookmark

                Author and article information

                Journal
                2015-12-21
                2015-12-22
                Article
                10.1109/MWC.2016.7462485
                1512.06528
                4d49ca11-d147-458e-bad5-a0811a983b81

                http://arxiv.org/licenses/nonexclusive-distrib/1.0/

                History
                Custom metadata
                19 pages, 6 figures, IEEE Wireless Communications, 2016
                cs.IT math.IT

                Numerical methods,Information systems & theory
                Numerical methods, Information systems & theory

                Comments

                Comment on this article