JOURNAL ARTICLE

Time Allocation Methods for Secure Wireless Powered Communication Networks

Abstract

In this work, we investigate a wireless powered communication network (WPCN) where multiple eavesdroppers attempt to intercept the information between a hybrid access-point (H-AP) and an energy harvesting (EH) user. During the first energy transfer (ET) phase, the EH user and an EH cooperative jammer harvest energy from the transmitted signals of the H- AP. Then, in the next information transfer (IT) phase, the user sends confidential information to the H-AP while the jammer broadcasts artificial noises to the eavesdroppers by utilizing their previously harvested energy. We particularly consider optimization of the time allocation between the ET and the IT phases by which the secrecy rate is maximized. To cut down a computational burden, a low-complexity closed-form solution of the time allocation factor with some interesting behaviors will be proposed by a worst-case approximation. Through simulation results, we evaluate the performance of our proposed scheme and show that a performance gain compared to conventional schemes becomes clearer with the increased number of eavesdroppers.

Keywords:
Computer science Secrecy Wireless Computer network Jamming Energy (signal processing) Artificial noise Information transfer Energy harvesting Wireless network Confidentiality Telecommunications Computer security Mathematics

Metrics

0
Cited By
0.00
FWCI (Field Weighted Citation Impact)
25
Refs
0.19
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Topics

Energy Harvesting in Wireless Networks
Physical Sciences →  Engineering →  Electrical and Electronic Engineering
Wireless Communication Security Techniques
Physical Sciences →  Engineering →  Electrical and Electronic Engineering
Advanced MIMO Systems Optimization
Physical Sciences →  Engineering →  Electrical and Electronic Engineering
© 2026 ScienceGate Book Chapters — All rights reserved.