When Friendly Jamming Meets Wireless Energy Transfer

Qi SUN, Hong Ning DAI, Qiu WANG, Xuran LI, Hao WANG

Research output: Book Chapters | Papers in Conference ProceedingsConference paper (refereed)Researchpeer-review

1 Citation (Scopus)

Abstract

Friendly-jamming schemes can effectively reduce the eavesdropping risk in wireless networks by generating sufficient interference to prevent eavesdroppers from snooping confidential communications. However, this type of anti-eavesdropping schemes can also affect the normal communications due to the interference to legitimate users. On the other hand, Wireless Energy Transfer (WET) technology has received much attention recently since WET allows a node to obtain the energy from electromagnetic radiation. In this paper, we integrate the friendly-jamming scheme with WET. We call this scheme as Wireless-Jamming-Energy-Transfer (WJET). This scheme can translate the harmful interference radiated from jammers into the energy harvested by legitimate transmitters. In order to evaluate the effectiveness of this scheme, we establish an analytical model to analyze the transmission probability and the eavesdropping probability. Simulations verify that WJET scheme can simultaneously decrease the eavesdropping probability of eavesdroppers and increase the transmission probability of legitimate users. In addition, we investigate the density of jammers to achieve the optimal transmission probability according to various channel conditions, the density of transmitters and the transmission power of jammers.

Original languageEnglish
Title of host publicationProceedings - IEEE 2018 International Congress on Cybermatics
Subtitle of host publication2018 IEEE Conferences on Internet of Things, Green Computing and Communications, Cyber, Physical and Social Computing, Smart Data, Blockchain, Computer and Information Technology, iThings/GreenCom/CPSCom/SmartData/Blockchain/CIT 2018
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages320-325
Number of pages6
ISBN (Electronic)9781538679753
DOIs
Publication statusPublished - Jul 2018
Externally publishedYes
Event11th IEEE International Congress on Conferences on Internet of Things, 14th IEEE International Conference on Green Computing and Communications, 11th IEEE International Conference on Cyber, Physical and Social Computing, 4th IEEE International Conference on Smart Data, 1st IEEE International Conference on Blockchain and 18th IEEE International Conference on Computer and Information Technology, iThings/GreenCom/CPSCom/SmartData/Blockchain/CIT 2018 - Halifax, Canada
Duration: 30 Jul 20183 Aug 2018

Publication series

NameProceedings - IEEE 2018 International Congress on Cybermatics: 2018 IEEE Conferences on Internet of Things, Green Computing and Communications, Cyber, Physical and Social Computing, Smart Data, Blockchain, Computer and Information Technology, iThings/GreenCom/CPSCom/SmartData/Blockchain/CIT 2018

Conference

Conference11th IEEE International Congress on Conferences on Internet of Things, 14th IEEE International Conference on Green Computing and Communications, 11th IEEE International Conference on Cyber, Physical and Social Computing, 4th IEEE International Conference on Smart Data, 1st IEEE International Conference on Blockchain and 18th IEEE International Conference on Computer and Information Technology, iThings/GreenCom/CPSCom/SmartData/Blockchain/CIT 2018
Country/TerritoryCanada
CityHalifax
Period30/07/183/08/18

Bibliographical note

Funding Information:
ACKNOWLEDGEMENT The work described in this paper was supported by Macao Science and Technology Development Fund under Grant No. 0026/2018/A1, the Science and Technology Planning Project of Guangdong Province (No. 2017A050501035) and the National Natural Science Foundation of China under Grant 6167050421. The authors would like to express their appreciation for Gordon K.-T. Hon for his thoughtful discussions.

Publisher Copyright:
© 2018 IEEE.

Fingerprint

Dive into the research topics of 'When Friendly Jamming Meets Wireless Energy Transfer'. Together they form a unique fingerprint.

Cite this