Blog
About

  • Record: found
  • Abstract: found
  • Article: found
Is Open Access

Secrecy Wireless Information and Power Transfer: Challenges and Opportunities

Preprint

Read this article at

Bookmark
      There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

      Abstract

      Wireless information and power transfer (WIPT) enables more sustainable and resilient communications owing to the fact that it avoids frequent battery charging and replacement. However, it also suffers from possible information interception due to the open nature of wireless channels. Compared to traditional secure communications, secrecy wireless information and power transfer (SWIPT) carries several distinct characteristics. On one hand, wireless power transfer may increase the vulnerability of eavesdropping, since a power receiver, as a potential eavesdropper, usually has a shorter access distance than an information receiver. On the other hand, wireless power transfer can be exploited to enhance wireless security. This article reviews the security issues in various SWIPT scenarios, with an emphasis on revealing the corresponding challenges and opportunities for implementing SWIPT. Furthermore, we provide a survey on a variety of physical layer security techniques to improve secrecy performance. In particular, we propose to use massive multiple-input multiple-output (MIMO) techniques to enhance power transfer efficiency and secure information transmission simultaneously. Finally, we discuss several potential research directions to further enhance the security in SWIPT systems.

      Related collections

      Most cited references 11

      • Record: found
      • Abstract: not found
      • Article: not found

      Noncooperative Cellular Wireless with Unlimited Numbers of Base Station Antennas

        Bookmark
        • Record: found
        • Abstract: not found
        • Article: not found

        On the Secrecy Capacity of Fading Channels

          Bookmark
          • Record: found
          • Abstract: found
          • Article: found
          Is Open Access

          Robust Beamforming for Secure Communication in Systems with Wireless Information and Power Transfer

           ,  ,   (2014)
          This paper considers a multiuser multiple-input single-output (MISO) downlink system with simultaneous wireless information and power transfer. In particular, we focus on secure communication in the presence of passive eavesdroppers and potential eavesdroppers (idle legitimate receivers). We study the design of a resource allocation algorithm minimizing the total transmit power for the case when the legitimate receivers are able to harvest energy from radio frequency signals. Our design advocates the dual use of both artificial noise and energy signals in providing secure communication and facilitating efficient wireless energy transfer. The algorithm design is formulated as a non-convex optimization problem. The problem formulation takes into account artificial noise and energy signal generation for protecting the transmitted information against both considered types of eavesdroppers when imperfect channel state information (CSI) of the potential eavesdroppers and no CSI of the passive eavesdroppers are available at the transmitter. In light of the intractability of the problem, we reformulate the considered problem by replacing a non-convex probabilistic constraint with a convex deterministic constraint. Then, a semi-definite programming (SDP) relaxation approach is adopted to obtain the optimal solution for the reformulated problem. Furthermore, we propose a suboptimal resource allocation scheme with low computational complexity for providing communication secrecy and facilitating efficient energy transfer. Simulation results demonstrate a close-to-optimal performance achieved by the proposed schemes and significant transmit power savings by optimization of the artificial noise and energy signal generation.
            Bookmark

            Author and article information

            Journal
            2015-12-21
            2015-12-22
            1512.06528

            http://arxiv.org/licenses/nonexclusive-distrib/1.0/

            Custom metadata
            19 pages, 6 figures, IEEE Wireless Communications, 2016
            cs.IT math.IT

            Numerical methods, Information systems & theory

            Comments

            Comment on this article