JOURNAL ARTICLE

Secure Transmission in Wireless Powered Communication Networks with Full-Duplex Receivers

Qun LiDing Xu

Year: 2019 Journal:   IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences Vol: E102.A (5)Pages: 750-754   Publisher: Institute of Electronics, Information and Communication Engineers

Abstract

This letter studies secure communication in a wireless powered communication network with a full-duplex destination node, who applies either power splitting (PS) or time switching (TS) to coordinate energy harvesting and information decoding of received signals and transmits jamming signals to the eavesdropper using the harvested energy. The secrecy rate is maximized by optimizing PS or TS ratio and power allocation. We propose iterative algorithms with power allocation optimized by the successive convex approximation method. Simulation results demonstrate that the proposed algorithms are superior to other benchmark algorithms.

Keywords:
Computer science Jamming Wireless Decoding methods Benchmark (surveying) Secrecy Node (physics) Secure transmission Transmission (telecommunications) Computer network Energy (signal processing) Artificial noise Convex optimization Power (physics) Algorithm Telecommunications Regular polygon Mathematics Engineering Computer security

Metrics

2
Cited By
0.23
FWCI (Field Weighted Citation Impact)
16
Refs
0.53
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Wireless Communication Security Techniques
Physical Sciences →  Engineering →  Electrical and Electronic Engineering
Energy Harvesting in Wireless Networks
Physical Sciences →  Engineering →  Electrical and Electronic Engineering
Wireless Body Area Networks
Physical Sciences →  Engineering →  Biomedical Engineering
© 2026 ScienceGate Book Chapters — All rights reserved.