DOI QR코드

DOI QR Code

Performance Analysis of Energy-Efficient Secure Transmission for Wireless Powered Cooperative Networks with Imperfect CSI

  • Yajun Zhang (Army Academy of Artillery and Air Defense (Nanjing Campus)) ;
  • Jun Wu (Army Academy of Artillery and Air Defense (Nanjing Campus)) ;
  • Bing Wang (Army Academy of Artillery and Air Defense (Nanjing Campus)) ;
  • Hongkai Wang (Army Academy of Artillery and Air Defense (Nanjing Campus)) ;
  • Xiaohui Shang (361618 Troops of PLA)
  • Received : 2023.05.10
  • Accepted : 2023.08.22
  • Published : 2023.09.30

Abstract

The paper focuses on investigating secure transmission in wireless powered communication networks (WPCN) that involve multiple energy-constrained relays and one energy-constrained source. The energy is harvested from a power beacon (PB) while operating in the presence of a passive eavesdropper. The study primarily aims to achieve energy-efficient secure communications by examining the impact of channel estimation on the secrecy performance of WPCN under both perfect and imperfect CSI scenarios. To obtain practical insights on improving security and energy efficiency, we propose closed-form expressions for secrecy outage probability (SOP) under the linear energy harvesting (LEH) model of WPCN. Furthermore, we suggest a search method to optimize the secure energy efficiency (SEE) with limited power from PB. The research emphasizes the significance of channel estimation in maintaining the desired performance levels in WPCN in real-world applications. The theoretical results are validated through simulations to ensure their accuracy and reliability.

Keywords

1. Introduction

The advent of fifth-generation (5G) mobile communications has paved the way for the Internet of Things (IoT), which has a broad range of potential applications such as industrial control, remote health monitoring, and traffic control [1]. However, IoT devices typically have limited resources in terms of energy and computing power. Thus, energy efficiency is a critical factor in IoT systems [2], particularly since many IoT devices are designed to operate for extended periods of time. Wireless powered communication networks (WPCN) are a practical solution for maintaining the long-term operation of IoT devices. WPCNs consist of both wireless information transfer (WIT) and wireless power transfer (WPT) methods [3, 4].

Compared to traditional charging methods, WPCNs can be powered by batteries or RF signals from the environment. This allows the wireless system to stay connected at all times, effectively extending its lifespan and significantly improving network throughput and reliability [5]. Although WPCNs have these advantages, security remains a concern due to potential eavesdropping threats[6, 7]. To enhance security in WPCNs, Physical Layer Security (PLS) methods use the unique characteristics of wireless channels for secure transmission [8-13]. It is worth noting that, unlike literature [13], which is key based, we mainly focus on how to improve physical layer security derectly.

Secrecy Outage Probability (SOP) is often used to measure the performance of PLS in wireless physical layer secure transmission. SOP represents the probability that the achievable secrecy rate falls below the target secrecy rate [14]. In recent years, numerous studies have investigated the SOP of WPCNs [11-15]. In [15], the authors consider three relay selection schemes that select the best Power Beacon (PB) by source, namely Best Relay by Source (BRS), Best Relay Randomly (BRR), and Best Relay by Best PB (BRBP), respectively. Another study analyzed the outage probability of SWIPT-WPCN networks with nonlinear EH models by using time-switched receiver architecture for information decoding and EH [16]. In [17], an EH jammer was employed to minimize the SOP in wiretap WPCN systems. Literature [18, 19] analyzed the SOP under imperfect Channel State Information (CSI) using Transmit Antenna Selection (TAS).

The above results consider all the scenarios under perfect CSI. However, it is worth noting that obtaining ideal CSI is difficult in practice due to the incomplete feedback and influence of channel estimation error. Recently, several works have investigated the scenarios under imperfect CSI. In [20], both SOP and connection outage probability (COP) are investigated under partial CSI. In [21], the authors obtained an analytical expression for SOP under the imperfect CSI in the wireless-powered multi-antenna relaying system. In [22], the authors examined the design of a power-splitting with relay selection scheme, and derived optimal power splitting ratios under both imperfect and perfect CSI. In [23], the problem of secure energy-efficient transmission was investigated in an artificial-noise (AN)-aided SWIPT system with imperfect CSI.

Many works has focused on the research of secure energy efficiency (SEE), [24] examined the SEE in a multirelay DF scenario. Another study, [25], investigated how resources could best be allocated to optimize SEE in a scenario with multiple antennas at the legitimate transmitter. The study considered various CSI assumptions. Afterwards, in [26], the authors aimed to maximize SEE in cooperative networks with partial secrecy requirements. Furthermore, in [15], the SEE was sought to be maximized under a constraint on transmit power by optimizing the transmit power in power beacons (PBs) and the time-switching factor for WPCN.

Our paper builds on these studies by focusing on the impact of imperfect CSI on Physical Layer Security (PLS) for Wireless Powered Communication Networks (WPCN). Specifically, our work takes into account imperfections present in practical communication environments, making it more closely aligned with practical scenarios. Additionally, we examine the impact of imperfect CSI on the secure performance of WPCN, which complements existing work that has largely focused on perfect CSI [15]. As such, the main contributions of our work are as follows:

• For the multiple relays-assisted WPCN, by means of the best relay selection strategy, the influence of channel estimation on the secure transmission has been explored, in which the scenario including perfect CSI and the imperfect CSI has been discussed, respectively.

• We infer the closed-form expressions of SOP for perfect CSI and imperfect CSI under the linear EH model of WPCN. Moreover, in order to provide more practical guidance, the search method is used for solving the problem of maximizing SEE under the limited power of PB.

• The correctness of our derivation is verified by simulation results. The dominating role of the channel estimation on secure WPCN has been revealed with the help of analyzing the effects of relevant parameters including the time-switching factor, the energy conversion efficiency, and channel correlation coefficient on secrecy performance. It is worth noting that the dominating role should be paid much attention in practice.

The rest of this paper is arranged as follows: Section II introduces the system model, followed by Section III, which derives explicit expressions of SOP and SEE. Then, Section IV presents numerical results. Finally, we conclude in Section V.

2. System Model

Fig. 1 illustrates a communication scenario where a source sensor S sends confidential information to the base station D with the help of several relay sensors Rn, n ∈ {1, 2, ⋯, N} . A passive eavesdropper E , with no restrictions on its ability to eavesdrop, and commonly assumed for information-theoretic security, is also present in the communication channel. Due to serious fading between S and D , there is no direct link from S to D [27, 28]. To overcome this limitation, both S and D obtain energy support from multiple power beacons via wireless power transfer (WPT) for wireless information transfer (WIT). All nodes in the system have a single antenna, and the wireless channels are assumed to be independently Rayleigh-distributed [2].

E1KOBZ_2023_v17n9_2399_f0001.png 이미지

Fig. 1. System model

The power gain of each channel is exponentially distributed with parameter λXY , where Y ∈ {S, D, E, Rn} and X ∈ {B, S, Rn} . Gaussian white noise is added to the channels at Rn and D with variance N0 and zero mean. Similarly, the AWGN at E has variance NE and zero mean. For the sake of mathematical modeling simplicity, B → S , S → Rn , B → Rn , S → E , Rn → D , and Rn → E are denoted as hxy .This assumption is commonly used in wireless-powered communication networks (WPCNs) due to the complexity and variability of the wireless communication environment (e.g. [29-31]). Although exact channel estimation on practical channels can be difficult, our assumption can simplify the analysis and lead to more intuitive conclusions, making it a suitable foundation for investigating real-world complex communication problems.

1) As shown in Fig. 2, the time for WPT is αT and the time for WIT is (1 − α) T , where α is the time-switching factor and α ∈ (0,1) . The energy harvested at sensors is fully consumed to send information in the WIT process [32]. Therefore, the energy harvested at Rn and S can be shown as:

E1KOBZ_2023_v17n9_2399_f0002.png 이미지

Fig. 2. Time-switching relay protocol

ERn = ηPBαT|hBRn|2,       (1)

ES = ηPBαT|hBS|2,       (2)

where η is the energy efficiency coefficient and 10% < η < 80% [33], PB is the transmission power at PB, |hBS|2 and |hBRn|2 are power gains of the channels form PB to Rn and to S , respectively. Then, the received energy is used to transmit information in the rest time. As in [34], the harvested energy from noise is negligible. The reason is that the received power at sources contributed by PB is far more than the received noisy power.

2) In the second duration of (1 − α)T / 2 , the relays Rn get the information from the source. In this time, the channel fading coefficients remain constant [35]. Thus, the transmit power of S can be given by

\(\begin{aligned}P_{S}=\frac{2 \eta \alpha}{1-\alpha} P_{B}\left|h_{B S}\right|^{2}\end{aligned}\)       (3)

3) In the last duration of (1 − α)T / 2 , the destination D receive information from the relays Rn . Similarly, the transmit power of Rn is

\(\begin{aligned}P_{R_{n}}=\frac{2 \eta \alpha}{1-\alpha} P_{B}\left|h_{B R_{n}}\right|^{2}\end{aligned}\)       (4)

Form (3) and (4), we can get SNR of R and E in the second hop and SNR of D and E in the last hop e.g., γSRn , γSE , γRnD and γRnE as

\(\begin{aligned} \gamma_{S R_{n}} & =\frac{P_{S}\left|h_{S R_{n}}\right|^{2}}{N_{0}}=\frac{2 \eta \alpha}{N_{0}(1-\alpha)} P_{B}\left|h_{B S}\right|^{2}\left|h_{S R_{n}}\right|^{2} \\ & =\gamma_{B} \xi_{0}\left|h_{B S}\right|^{2}\left|h_{S R_{n}}\right|^{2}\end{aligned}\)       (5)

where \(\begin{aligned}\gamma_{B}=\frac{P_{B}}{N_{0}}\end{aligned}\), \(\begin{aligned}\xi_{0}=\frac{2 \eta \alpha}{1-\alpha}\end{aligned}\).

So the other SNRs can expressed as the same:

γSE = γEξ0|hBS|2|hSE|2       (6)

γRnD = γBξ0|hBRn|2|hRnD|2       (7)

γRnE = γEξ0|hBRn|2|hRnE|2       (8)

Lemma 1: If Xk , k ∈ {1⋯K} , is a random variable that follows an independent and identically distributed exponential distribution, the probability density function (PDF) and the cumulative distribution function (CDF) of \(\begin{aligned}X=\max _{k \in\{1 \cdots K\}}\left\{X_{k}\right\}\end{aligned}\) can be shown as [34]

fX(x) = KλXe−λXx(1 - e−λXx)K - 1       (9)

FX(x) = (1 - eXx)K       (10)

Here, using BRS scheme, the selected relay R*n is shown as:

\(\begin{aligned}R_{n}^{*}=\arg \max _{R_{n} \in\left(R_{1} \cdots R_{N}\right)}\left\{\left|h_{S R_{n}}\right|^{2}\right\}\end{aligned}\)       (11)

Hence, the |hSR*n|2 , |hR*nE|2 , |hR*nD|2 are exponentially distributed with parameters λSR , λRE , λRD , respectively. From Lemma 1, the PDF of |hSR*n|2 can be derived as

f|hSR*n|2(x) = NλSReSRx(1 - eSRx)N - 1       (12)

It is worth noting that there is an inverse relationship between the exponential distribution parameter and the mean channel gain.

Obtaining accurate channel estimation is challenging due to the complex channel environments. Previous research [36, 37] has highlighted that there are bound to be errors between the estimated and actual channel values. To account for this, we can use the following mathematical model,

\(\begin{aligned}\bar{h}_{S R_{n}}=\sqrt{\varepsilon} h_{S R_{n}}+\sqrt{1-\varepsilon} \Delta h_{S R_{n}}\end{aligned}\)       (13)

where ε ∈ [0,1] represents the correlation coefficient between the actual channel value hSRn and the estimated channel value \(\begin{aligned}\bar{h}_{S R_{n}}\end{aligned}\), ∆hSRn is a Gaussian random complex variable with the same distribution as hSRn . It is worth noting that a lower value of ε indicates a greater error in CSI estimation. Conversely, a value of ε = 1 corresponds to perfect CSI.

Remark 1: In reality, each communication channel has a situation where the CSI estimation is imperfect. In particular, we focus on the simple scenario of whether the estimation of the link relay selection is ideal or not. Despite its simplicity, this simplified scenario makes it easy to draw more obvious conclusions.

3. Secure Performance Analysis

The comprehensive secure performance analysis of WPCN with the perfect and imperfect CSI is provided in the section.

3.1 Secrecy Outage Probability

As shown in [38], the achievable secrecy rate of the dual-hop system in WIT is indicated as

RS = min(RS1, RS2)       (14)

where RS1 and RS2 are the achievable secrecy rate of the second and the last hoop. Here, (1− α)T / 2 is the transmission duration of WIT, so RS1 and RS2 can be expressed as follows:

\(\begin{aligned}R_{S_{1}}=\frac{1-\alpha}{2}\left[\log _{2}\left(\frac{1+\gamma_{S R_{n}^{*}}}{1+\gamma_{S E}}\right)\right]^{+}\end{aligned}\)       (15)

\(\begin{aligned}R_{S_{2}}=\frac{1-\alpha}{2}\left[\log _{2}\left(\frac{1+\gamma_{R_{n}^{*} D}}{1+\gamma_{R_{n}^{*} E}}\right)\right]^{+}\end{aligned}\)       (16)

where [x]+= max(x,0) , then the achievable secrecy rate of RS can be indicated as

\(\begin{aligned}R_{S}=\frac{1-\alpha}{2} \log _{2}\left(\min \left(\frac{1+\gamma_{S R_{n}^{*}}}{1+\gamma_{S E}}, \frac{1+\gamma_{R_{n}^{*} D}}{1+\gamma_{R_{n}^{*} E}}\right)\right)\end{aligned}\)       (17)

As an important indicator for measuring the performance of secrecy, SOP is regarded as a kind of probability which the achievable security rate RS is lower than the predetermined security rate threshold Rth .So the SOP under each scenario PSout(sch) can be express as

\(\begin{aligned} P_{S_{\text {out }}}^{\text {(sch) }} & =\operatorname{Pr}\left\{R_{S}<R_{\text {th }}\right\} \\ & =\operatorname{Pr}\left\{\frac{1-\alpha}{2} \log _{2}\left(\min \left(\frac{1+\gamma_{S R_{n}^{*}}}{1+\gamma_{S E}}, \frac{1+\gamma_{R_{n}^{*} D}}{1+\gamma_{R_{n}^{*} E}}\right)\right)<R_{t h}\right\}\end{aligned}\)       (18)

where sch ∈ (p,ip) , and p denotes the perfect CSI estimation, ip means the imperfect CSI estimation.

1) SOP under perfect CSI

According to (18), the exact SOP in the considered WPCN under perfect CSI can be formulated as

\(\begin{aligned} P_{S_{\text {out }}}^{\mathrm{p}}=1 & -\sum_{n=0}^{N-1}\left(\begin{array}{c}N-1 \\ n\end{array}\right)(-1)^{n} \frac{N \xi \lambda_{S R} \bar{\lambda}_{S E}}{\gamma_{B}\left(\lambda_{S R}(n+1)+\bar{\lambda}_{S E}\right)} \frac{\lambda_{R D} \bar{\lambda}_{R E}}{\lambda_{R D}+\bar{\lambda}_{R E}} 4 \sqrt{\frac{\lambda_{B S} \lambda_{B R}}{\lambda_{S R}(n+1) \lambda_{R D}}} \\ & \times K_{1}\left(2 \sqrt{\frac{\lambda_{B S} \xi}{\gamma_{B}} \lambda_{S R}(n+1)}\right) K_{1}\left(2 \sqrt{\frac{\lambda_{B R} \xi}{\gamma_{B}} \lambda_{R D}}\right)\end{aligned}\)       (19)

where PpSout is the SOP when the WIT operate in the perfect CSI, K1(⋅) is the modified Bessel function of second kind [39], \(\begin{aligned}\beta=2^{\frac{2 R_{\text {sh }}}{1-\alpha}}\end{aligned}\), \(\begin{aligned}\xi=\frac{(\beta-1)(1-\alpha)}{2 \eta \alpha}=\frac{(\beta-1)}{\xi_{0}}\end{aligned}\), \(\begin{aligned}\gamma_{B}=\frac{P_{B}}{N_{0}}\end{aligned}\), \(\begin{aligned}\bar{\lambda}_{S E}=\frac{\lambda_{S E}}{\beta}\end{aligned}\)\(\begin{aligned}\bar{\lambda}_{R E}=\frac{\lambda_{R E}}{\beta}\end{aligned}\).

Proof: The proof can be found in Appendix A.

2) SOP under imperfect CSI

Furthermore, according to (19), the exact SOP in the considered WPCN under imperfect CSI can be given as

\(\begin{aligned} P_{S_{\text {out }}}^{(\mathrm{ip})}=1 & -\sum_{n=0}^{N-1}\left(\begin{array}{c}N-1 \\ n\end{array}\right)(-1)^{n} \frac{N \lambda_{S R} \bar{\lambda}_{S E} \xi}{\gamma_{B}\left[\lambda_{S R_{n}^{*}}+\bar{\lambda}_{S E}[1+(1-\varepsilon) n]\right]} \times \frac{\lambda_{R D} \bar{\lambda}_{R E}}{\lambda_{R D}+\bar{\lambda}_{R E}} 4 \sqrt{\frac{\lambda_{B S} \lambda_{B R}[1+(1-\varepsilon) n]}{\lambda_{S R}(n+1) \lambda_{R D}}} \\ & \times K_{1}\left(2 \sqrt{\frac{\lambda_{B S} \xi}{\gamma_{B}} \frac{\lambda_{S R}(n+1)}{[1+(1-\varepsilon) n]}}\right) K_{1}\left(2 \sqrt{\frac{\lambda_{B R} \xi}{\gamma_{B}} \lambda_{R D}}\right)\end{aligned}\)       (20)

where P(ip)Sout is the SOP when the WIT operate in the imperfect CSI, ε ∈ [0,1] is the correlation coefficient between the estimated channel coefficient \(\begin{aligned}\bar{h}_{S R_{n}}\end{aligned}\) and the real one hSRn in (12).

Proof: The proof can be found in Appendix B.

Remark 2: According to (19) and (20), the number of multiple relay sensors and the efficiency factor of EH have a beneficial impact on the SOP of the WPCN for two different channel estimation conditions. Meanwhile, we observe that the precision closed-expressions of SOP under perfect or imperfect CSI are the same. Basically, the single difference point is the correlation coefficient and the secrecy performance of imperfect CSI are superior if the correlation coefficient is higher. These discussion is analyzed and proved in the next subsection.

3.2 Secure Energy Efficiency Maximization

In general, more energy should be consumed to improve the transmission performance. For energy-constrained wireless sensor networks, the excessive pursuit of confidentiality would adversely affect network performance. As in [15], the SEE, which is regarded as a ratio between energy consumption and the secure performance, is used to be an effective way to evaluate the secrecy performance of WPCN. Hence, the SEE can be shown as

\(\begin{aligned}\eta_{s}^{(\mathrm{sch})}=\frac{R_{\text {th }}\left(1-P_{S_{\text {out }}}^{(\mathrm{sch})}\right)}{P_{\text {total }}}\end{aligned}\)       (21)

where Ptotal is is power cost in all at PB and P total = κPB + P0B , κ indicates the power coefficient, which is a ratio of the energy harvested by the source sensor in WIT to the transmission power of PB. PB and P0B represent the transmission power and static power of PB, respectively. It should be emphasized that it makes full use of the energy harvested by the source sensor in WIT, while ignoring the power cost of the circuit [40].

In order to get the best transmission power of PB, the maximum value of the SEE is expressed as

\(\begin{aligned} \max _{P_{B}, \alpha} & \eta_{s}^{(\text {sch })} & =\frac{R_{\text {th }}\left(1-P_{S_{\text {out }}^{(\text {sch })}}\right)}{P_{\text {total }}} \\ \text { s.t. } & 0 & <P_{B} \leq P_{\max }, \\ & & 0<\alpha<1 .\end{aligned}\)       (22)

On the basis of numerical analysis and simulation, the optimal value of PB and α will be obtained by using the search method [15]. For the above optimization problem of the SEE, it can be used as a guide for actual implementation, which may be used in engineering decisions-making.

Remark 3: From (19) and (20), we find that the higher transmission power in PB, the better the performance of secrecy in the system. However, according to (22), the increased transmission power has an adverse effect on the SEE. In addition, the raised factor of time-switching can improve the SOP while lowering the performance of communication in system due to the fewer time of WIT. Therefore, it is more practical for the WPCN by optimizing the time-switching factor and transmission power in order to maximize the SEE.

4. Simulation Results

This section will verify our theoretical results via Monte Carlo simulations, and the discussions about the SOP and SEE of WPCN are provided. Specifically, both scenarios including perfect CSI and the imperfect CSI are considered for linear energy harvesting (LEH). The simulation parameters are set as follows: N = 3 , Rth = 0.1 bits/s/Hz, η = 0.8 , ε = 0.8 , γB = 30 dB. Meanwhile, λBS = λBR = λSR = λSD = 1 . Furthermore, λSE = λSRI , λRE = λRDI , the value of I is considered from -10dB to 50dB in this section. As in [15], we use τ = λSESD to express the ratio of the primary channel to the eavesdropping channel. Obviously, It is evident from the following figures that the theoretical curves align closely with the simulation results, providing confirmation of our analysis.

Fig. 3 shows that the higher value of τ , the better performance of SOP. The reasons are as follows: with the increase of capacity difference between the main channel and eavesdropping channel, the secrecy capacity of system is enhanced. Additionally, we observe that the correlation coefficient ε has a positive impact on the SOP performance, where a higher value of ε corresponds to better SOP, because of the larger value of ε means that the imperfect channel is much more closer to the perfect channel, which brings less influence to the secrecy performance of WPCN. Therefore, it can be found that imperfect CSI has great influence on the security of WPCN.

E1KOBZ_2023_v17n9_2399_f0003.png 이미지

Fig. 3. SOP versus τ for various ε

Fig. 4 plots the SOP performance with different various γB under perfect and imperfect CSI. We can see that the enhancement of SOP is attributed to the power of the PB, as higher power results in larger secrecy capacity. It is evident that perfect CSI outperforms imperfect CSI in terms of secure performance across the entire range of γB . In fact, ε = 0.8 means the channel estimation is not ideal, which reflects the gap of secrecy performance.

E1KOBZ_2023_v17n9_2399_f0004.png 이미지

Fig. 4. SOP versus γB , where ε = 0.8

Fig. 5 shows the impact of the time-switching factor on SOP for different CSI. It can be observed that with the increasing of α , SOP decreases first and increases then. Specifically, when α = αoptimal , WPCN has the best security property (αoptimal ≈ 0.75 here). This is because when α < αoptimal , WPT dominates the secrecy performance of WPCN; by contrast, when α < αoptimal , which means the duration of WIT is shorter, the communication interruption probability will be increase. Meanwhile, the simulation results clearly show that the secrecy performance of the WPCN is better under full CSI than under imperfect CSI.

E1KOBZ_2023_v17n9_2399_f0005.png 이미지

Fig. 5. SOP versus α​​​​​​​

Fig. 6 shows the impact of τ on the optimization of SEE by the exhaustive search method. First, SEE improves with the increase of τ and then it tends to be stable. This is because, when τ reaches a certain value, SEE is limited by other system parameters, like the transmit power of BP. Moreover, it can be easily observed that the better channel estimation, the better security performance of WPCN.

E1KOBZ_2023_v17n9_2399_f0006.png 이미지

Fig. 6. SEE versus τ for various ε​​​​​​​

Fig. 7 shows the impact of the relays’ number N on the SEE with τ = 20dB . We can see that SEE improves with the increase of N . This is because, the larger number of relays, the higher secure performance can be obtained. Moreover, it can be easily observed that the better channel estimation, the better SEE performance of WPCN.

E1KOBZ_2023_v17n9_2399_f0007.png 이미지

Fig. 7. SEE versus N for various ε

5. Conclusion

In this study, we investigate the performance of Physical Layer Security (PLS) for Wireless Powered Communication Networks (WPCN) under the linear Energy Harvesting (EH) model and imperfect Channel State Information (CSI). Specifically, we derive closed-form expressions of Secrecy Outage Probability (SOP) in the presence of passive eavesdroppers. Additionally, we solve the optimization problem of Secure Energy Efficiency (SEE) by utilizing a search algorithm while taking into account the constrained transmission power of Power Beacon (PB). Simulation results are provided to validate the accuracy of our derivations across all regions. Our findings demonstrate that imperfect CSI significantly impacts the PLS performance of WPCNs. In future work, we plan to analyze the impact of imperfect CSI under the nonlinear EH model.

Appendix A. Derivation of Eq. (19)

From(18), the PpSout can be shown as

PpSout = 1 – Pr{CpS1 > Rth}Pr{CpS2 > Rth}       (23)

With the help of (4), (5), (6), the expansion can be derived as

\(\begin{aligned} \operatorname{Pr}\left\{C_{S_{1}}^{\mathrm{p}}>R_{t h}\right\} & =\operatorname{Pr}\left\{\frac{1-\alpha}{2} \log _{2} \frac{1+\gamma_{S R_{n^{*}}}}{1+\gamma_{S E}}>R_{t h}\right\} \\ & =\operatorname{Pr}\left\{\gamma_{S R_{n^{*}}}>\beta \gamma_{S E}+\beta-1\right\} \\ & =\operatorname{Pr}\left\{\frac{P_{S}\left|h_{S R_{n^{*}}}\right|^{2}}{N_{0}}>\beta \frac{P_{S}\left|h_{S E}\right|^{2}}{N_{0}}+(\beta-1)\right\} \\ & =\operatorname{Pr}\left\{\frac{2 \eta \alpha}{1-\alpha} \frac{P_{B}\left|h_{B S}\right|^{2}}{N_{0}}\left(\left|h_{S R_{n^{*}}}\right|^{2}-\beta\left|h_{S E}\right|^{2}>(\beta-1)\right)\right\} \\ & =\operatorname{Pr}\left\{\left|h_{B S}\right|^{2}>\frac{\xi}{z \gamma_{B}}\right\}=\int_{0}^{+\infty} \exp \left\{-\frac{\lambda_{B S} \xi}{\gamma_{B}} / z\right\} f_{z}(z) d z\end{aligned}\)       (24)

where z = |hSRn*|2 - β|hSE|2, \(\begin{aligned}\xi=\frac{(\beta-1)(1-\alpha)}{2 \eta \alpha}\end{aligned}\)\(\begin{aligned}\gamma_{B}=\frac{P_{B}}{N_{0}}\end{aligned}\).

As result in [32, eq.(39)] and use (12), the PDF of z is further shown as

\(\begin{aligned} f_{z}(z) & =\int_{0}^{+\infty} f_{\left|h_{S R_{n}}\right|^{2}}(z+y) \frac{1}{\beta} f_{\left|h_{S E}\right|^{2}}\left(\frac{y}{\beta}\right) d y \\ & =\int_{0}^{+\infty} N \lambda_{S R} e^{-\lambda_{S R}(z+y)}\left(1-e^{-\lambda_{S R}(z+y)}\right)^{N-1} \frac{1}{\beta}\left(1-e^{-\lambda_{S E} \frac{y}{\beta}}\right) d y \\ & =\sum_{n=0}^{N-1}\left(\begin{array}{c}N-1 \\ n\end{array}\right)(-1)^{n} \frac{N \lambda_{S R} \bar{\lambda}_{S E}}{\lambda_{S R}(n+1)+\bar{\lambda}_{S E}} \exp \left(-\lambda_{S R}(n+1) z\right)\end{aligned}\)       (25)

where \(\begin{aligned}\bar{\lambda}_{S E}=\frac{\lambda_{S E}}{\beta}\end{aligned}\). Then replacing (25) with (24) and in the use of (3.324.1) in [39], we can get

\(\begin{aligned} \operatorname{Pr}\left\{C_{S_{1}}^{\mathrm{p}}>R_{t h}\right\} & =\sum_{n=0}^{N-1}\left(\begin{array}{c}N-1 \\ n\end{array}\right)(-1)^{n} \frac{N \lambda_{S R} \bar{\lambda}_{S E}}{\lambda_{S R}(n+1)+\bar{\lambda}_{S E}} \int_{0}^{+\infty} \exp \left(-\frac{4 \frac{\lambda_{B S} \xi}{\gamma_{B}}}{4 z}-\lambda_{S R}(n+1) z\right) d z \\ & =\sum_{n=0}^{N-1}\left(\begin{array}{c}N-1 \\ n\end{array}\right)(-1)^{n} \frac{N \lambda_{S R} \bar{\lambda}_{S E}}{\lambda_{S R}(n+1)+\bar{\lambda}_{S E}} 2 \sqrt{\frac{\lambda_{B S} \xi}{\gamma_{B} \lambda_{S R}(n+1)}} K_{1}\left(2 \sqrt{\frac{\lambda_{B S} \xi}{\gamma_{B}} \lambda_{S R}(n+1)}\right)\end{aligned}\)        (26)

In addition, we use the above mentioned method to get the refined expression

of Pr{C(p)S2 > Rth} as

\(\begin{aligned}\begin{array}{l}\operatorname{Pr}\left\{C_{S_{2}}^{\mathrm{p}}>R_{t h}\right\}=\operatorname{Pr}\left\{\frac{1-\alpha}{2} \log _{2} \frac{1+\gamma_{R_{n}, D}}{1+\gamma_{R_{n}, E}}>R_{t h}\right\} \\ =\operatorname{Pr}\left\{\frac{2 \eta \alpha}{1-\alpha} \frac{P_{B}\left|h_{B R_{n}^{*}}\right|^{2}}{N_{0}}\left(\left|h_{R_{n}, D}\right|^{2}-\beta\left|h_{R_{n}^{*} E}\right|^{2}\right)>(\beta-1)\right\} \\ =\operatorname{Pr}\left\{\left|h_{B R_{n^{*}}}\right|^{2}>\frac{\xi}{v \gamma_{B}}\right\}=\int_{0}^{+\infty} \exp \left\{-\frac{\lambda_{B R} \xi}{\gamma_{B}} / v\right\} f_{v}(v) d v \\\end{array}\end{aligned}\)       (27)

where υ = |hRn*D|2 - β|hRn*E|2 , \(\begin{aligned}\xi=\frac{(\beta-1)(1-\alpha)}{2 \eta \alpha}\end{aligned}\), \(\begin{aligned}\gamma_{B}=\frac{P_{B}}{N_{0}}\end{aligned}\) and \(\begin{aligned}f_{v}(v)=\frac{\lambda_{R D} \bar{\lambda}_{R E}}{\lambda_{R D}+\bar{\lambda}_{R E}} \exp \left(-\lambda_{R D} v\right)\end{aligned}\). Consequently,

\(\begin{aligned} \operatorname{Pr}\left\{C_{S_{2}}^{\mathrm{p}}>R_{t h}\right\} & =\frac{\lambda_{R D} \bar{\lambda}_{R E}}{\lambda_{R D}+\bar{\lambda}_{R E}} \int_{0}^{+\infty} \exp \left(-4 \frac{\lambda_{B R} \xi}{\gamma_{B}} / v-\lambda_{R D} v\right) d v \\ & =\frac{\lambda_{R D} \bar{\lambda}_{R E}}{\lambda_{R D}+\bar{\lambda}_{R E}} 2 \sqrt{\frac{\lambda_{B R} \xi}{\gamma_{B} \lambda_{R D}}} K_{1}\left(2 \sqrt{\frac{\lambda_{B R} \xi}{\gamma_{B}} \lambda_{R D}}\right)\end{aligned}\)       (28)

By substituting the (26) and (28) into (18), after some mathematical manipulation, we have (19).

Appendix B. Derivation of Eq. (20)

Following the same line of derivation used for PpSout, from (18), PipSout can be expressed as

PipSout = 1 – Pr{CipS1 > Rth}Pr{CipS2 > Rth}       (29)

We can use the same way in Appendix A to get the Pr{CipS1 > Rth} and Pr{CipS2 > Rth}, but thereare some differences in this proof, which are pointed out in Remark 2. Moreover, it is necessary to use (13) for the expression of the imperfect CSI estimation. For the convenience of channel estimation, ε is only considered in first duration of WIT. The expansion can be derived as

\(\begin{aligned} \operatorname{Pr}\left\{C_{S_{1}}^{\mathrm{ip}}>R_{t h}\right\} & =\operatorname{Pr}\left\{\frac{1-\alpha}{2} \log _{2} \frac{1+\bar{\lambda}_{S R_{n}^{*}}}{1+\gamma_{S E}}>R_{t h}\right\} \\ & =\operatorname{Pr}\left\{\bar{\lambda}_{S R_{n}}>\beta \gamma_{S E}+\beta-1\right\} \\ & =\operatorname{Pr}\left\{\left|h_{B S}\right|^{2}>\frac{\xi}{z \gamma_{B}}\right\}=\int_{0}^{+\infty} \exp \left\{-\frac{\lambda_{B S} \xi}{\gamma_{B}} / z\right\} f_{z}(z) d z\end{aligned}\)       (30)

where \(\begin{aligned}z=\left|\bar{h}_{S R_{n^{*}}}\right|^{2}-\beta\left|h_{S E}\right|^{2}\end{aligned}\).

Firstly, the same as Appendix A, the PDF fz(z) in this process can be shown as

\(\begin{aligned}f_{z}(z)=\int_{0}^{+\infty} f_{\left|\overline{\left.\bar{h}_{S R_{n}^{*}}\right|^{2}}\right|^{2}}(z+y) \frac{1}{\beta} f_{\left|h_{S E}\right|^{2}}\left(\frac{y}{\beta}\right) d y\end{aligned}\)       (31)

where \(\begin{aligned}f_{||_{\left.\bar{h}_{R_{n^{*}}}\right|^{2}}}(y)\end{aligned}\) and f|hSE|2(y), which are the PDFs of \(\begin{aligned}\left|\bar{h}_{S R_{n^{*}}}\right|^{2}\end{aligned}\) and |hSE|2, respectively, can be shown as

\(\begin{aligned}f_{\left|\bar{h} S R_{n^{*}}\right|^{2}}(y)=\int_{0}^{+\infty} f_{\left.\left|\bar{h}_{S R_{n}^{*}}\right|\right|^{2}\left|h_{S R_{n^{*}}}\right|^{2}}(y \mid x) f_{\left|h_{S R_{n^{*}}}\right|^{2}}(x) d x\end{aligned}\)       (32)

f|hSE|2(y) = λSEeSEy       (33)

Correspondingly, the joint PDF \(\begin{aligned}f_{\left.\left.\left|\overline{h_{S R_{n}^{*}}}{ }^{2}\right|\right|_{S R_{n}^{*}}\right|^{2}}(y, x)\end{aligned}\) of \(\begin{aligned}\left|\bar{h}_{S R_{n^{*}}}\right|^{2}\end{aligned}\) and |hSRn*|2 is given by [41], and the conditional PDF can be obtained as

\(\begin{aligned}f_{\left|\bar{h}_{S R_{n}}\right|^{2}\left|\|_{S_{S R} n_{n}}\right|^{2}}(y \mid x)=\frac{\lambda_{S R}}{(1-\varepsilon)} \exp \left(\frac{-\lambda_{S R}(y+\varepsilon x)}{(1-\varepsilon)}\right) \mathrm{I}_{0}\left(\frac{2 \lambda_{S R} \sqrt{\varepsilon y x}}{(1-\varepsilon)}\right)\end{aligned}\)       (34)

Hence, the PDF \(\begin{aligned}f_{\left|\overline{\bar{S}}_{S_{n_{n}}}\right|^{2}}\end{aligned}\)(y) can be obtained as

\(\begin{aligned}\begin{array}{l}f_{\mid \bar{h}_{\left.S R_{n^{*}}\right|^{2}}}(y)=\int_{0}^{+\infty} f_{\left.\left|\bar{h}_{S R_{n}^{*}}\right|^{2}|| h_{S R_{n^{*}}}\right|^{2}}(y \mid x) f_{\left|h_{S R_{n}^{*}}\right|^{2}}(x) d x \\ \qquad = \qquad \int_{0}^{+\infty} \frac{\lambda_{S R}}{(1-\varepsilon)} \exp \left(\frac{-\lambda_{S R}(y+\varepsilon x)}{(1-\varepsilon)}\right) \mathrm{I}_{0}\left(\frac{2 \lambda_{S R} \sqrt{\varepsilon y x}}{(1-\varepsilon)}\right) \cdot N \lambda_{S R} e^{-\lambda_{S R} x}\left(1-e^{-\lambda_{S R} x}\right)^{N-1} d x \\ \begin{array}{c}\text { power series, }(1+x)^{N}=\sum_{n=0}^{N}\left(\begin{array}{l}N \\ n\end{array}\right) x^{n} \end{array} \\ \qquad = \qquad \qquad \frac{N \lambda_{S R}{ }^{2}}{(1-\varepsilon)} \sum_{n=0}^{N-1}\left(\begin{array}{c}N-1 \\ n\end{array}\right)(-1)^{n} \exp \left(-\frac{\lambda_{S R} y}{(1-\varepsilon)}\right) \\ \qquad \qquad \times \int_{0}^{+\infty} \exp \left(-\frac{\lambda_{S R} \varepsilon x}{(1-\varepsilon)}-(n+1) \lambda_{S R} x\right) \mathrm{I}_{0}\left(\frac{2 \lambda_{S R} \sqrt{\varepsilon y x}}{(1-\varepsilon)}\right) d x \\ \begin{array}{c}\int_{0}^{+\infty} \mathrm{e}^{-\alpha x} \mathrm{I}_{0}(2 \sqrt{\beta x}) d x=\frac{1}{\alpha} \exp \left(\frac{\beta}{\alpha}\right) \\ =\end{array} \\ \qquad= \qquad \qquad N \sum_{n=0}^{N-1}\left(\begin{array}{c}N-1 \end{array}\right)(-1)^{n} \frac{\lambda_{S R}}{1+(1-\varepsilon) n} \exp \left(-\frac{\lambda_{S R}(n+1) y}{1+(1-\varepsilon) n}\right) \\\end{array}\\\end{aligned}\)       (35)

By substituting the (35) and (33) into (31), after some mathematical manipulation, we have fz(z) as follows.

\(\begin{aligned}f_{z}(z)=\sum_{n=0}^{N-1}\left(\begin{array}{c}N-1 \\ n\end{array}\right)(-1)^{n} \frac{N \lambda_{S R} \bar{\lambda}_{S E}}{\lambda_{S R}(n+1)+\bar{\lambda}_{S E}[1+(1-\varepsilon) n]} \exp \left(\frac{-\lambda_{S R}(n+1) z}{1+(1-\varepsilon) n}\right)\end{aligned}\)       (36)

Hence, by substituting the (36) into (30), after some mathematical manipulation, the Pr{CipS1 > Rth}, can be obtained as

\(\begin{aligned} \operatorname{Pr}\left\{C_{S_{1}}^{\mathrm{ip}}>R_{t h}\right\} & =\sum_{n=0}^{N-1}\left(\begin{array}{c}N-1 \\ n\end{array}\right)(-1)^{n} \frac{N \lambda_{S R} \bar{\lambda}_{S E}}{\lambda_{S R}(n+1)+\bar{\lambda}_{S E}+[1+(1-\varepsilon) n]} \times \int_{0}^{+\infty} \exp \left(-\frac{\frac{4 \lambda_{B S} \xi}{\gamma_{B}}}{4 z}-\frac{\lambda_{S R}(n+1) z}{1+(1-\varepsilon) n}\right) d z \\ = & \sum_{n=0}^{N-1}\left(\begin{array}{c}N-1 \\ n\end{array}\right)(-1)^{n} \frac{N \lambda_{S R} \bar{\lambda}_{S E}}{\lambda_{S R}(n+1)+\bar{\lambda}_{S E}[1+(1-\varepsilon) n]} \\ & \times 2 \sqrt{\frac{\lambda_{B S} \xi[1+(1-\varepsilon) n]}{\gamma_{B} \lambda_{S R}(n+1)}} K_{1}\left(2 \sqrt{\frac{\lambda_{B S} \xi}{\gamma_{B}} \frac{\lambda_{S R}(n+1)}{[1+(1-\varepsilon) n]}}\right)\end{aligned}\)       (37)

We can easily get that

Pr{CipS2 > Rth} = Pr{CpS2 > Rth}       (38)

With the help of (37) and (38), we have PipSout in (20).

Acknowledgement

The authors would like to thank the reviewers and the guest editor for their comments and suggestions.

References

  1. G. A. Akpakwu, B. J. Silva, G. P. Hancke and A. M. Abu-Mahfouz, "A Survey on 5G Networks for the Internet of Things: Communication Technologies and Challenges," IEEE Access, vol. 6, pp. 3619-3647, 2018. https://doi.org/10.1109/ACCESS.2017.2779844
  2. H. Chen, Y. Li, J. Luiz Rebelatto, B. F. Uchoa-Filho and B. Vucetic, "Harvest-Then-Cooperate: Wireless-Powered Cooperative Communications," IEEE Transactions on Signal Processing, vol. 63, no. 7, pp. 1700-1711, April1, 2015. https://doi.org/10.1109/TSP.2015.2396009
  3. I. Krikidis, S. Timotheou, S. Nikolaou, G. Zheng, D. W. K. Ng and R. Schober, "Simultaneous wireless information and power transfer in modern communication systems," IEEE Communications Magazine, vol. 52, no. 11, pp. 104-110, Nov. 2014. https://doi.org/10.1109/MCOM.2014.6957150
  4. Y. Zeng and R. Zhang, "Optimized Training Design for Wireless Energy Transfer," IEEE Transactions on Communications, vol. 63, no. 2, pp. 536-550, Feb. 2015. https://doi.org/10.1109/TCOMM.2014.2385077
  5. H. Ju and R. Zhang, "Throughput Maximization in Wireless Powered Communication Networks," IEEE Transactions on Wireless Communications, vol. 13, no. 1, pp. 418-428, January 2014.  https://doi.org/10.1109/TWC.2013.112513.130760
  6. L. Tang and Q. Li, "Wireless Power Transfer and Cooperative Jamming for Secrecy Throughput Maximization," IEEE Wireless Communications Letters, vol. 5, no. 5, pp. 556-559, Oct. 2016.  https://doi.org/10.1109/LWC.2016.2601100
  7. Y. Feng, Z. Yang, W. -P. Zhu, Q. Li and B. Lv, "Robust Cooperative Secure Beamforming for Simultaneous Wireless Information and Power Transfer in Amplify-and-Forward Relay Networks," IEEE Transactions on Vehicular Technology, vol. 66, no. 3, pp. 2354-2366, March 2017.  https://doi.org/10.1109/TVT.2016.2578313
  8. Y. Liu, H. -H. Chen and L. Wang, "Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges," IEEE Communications Surveys & Tutorials, vol. 19, no. 1, pp. 347-376, Firstquarter 2017. https://doi.org/10.1109/COMST.2016.2598968
  9. X. Chen, D. W. K. Ng, W. H. Gerstacker and H. -H. Chen, "A Survey on Multiple-Antenna Techniques for Physical Layer Security," IEEE Communications Surveys & Tutorials, vol. 19, no. 2, pp. 1027-1053, Secondquarter 2017. https://doi.org/10.1109/COMST.2016.2633387
  10. Y. Huang, P. Zhang, Q. Wu and J. Wang, "Secrecy Performance of Wireless Powered Communication Networks With Multiple Eavesdroppers and Outdated CSI," IEEE Access, vol. 6, pp. 33774-33788, 2018. https://doi.org/10.1109/ACCESS.2018.2835832
  11. E. Boshkovska, D. W. K. Ng, L. Dai and R. Schober, "Power-Efficient and Secure WPCNs With Hardware Impairments and Non-Linear EH Circuit," IEEE Transactions on Communications, vol. 66, no. 6, pp. 2642-2657, June 2018. https://doi.org/10.1109/TCOMM.2017.2783628
  12. B. Li, Z. Fei, C. Zhou and Y. Zhang, "Physical-Layer Security in Space Information Networks: A Survey," IEEE Internet of Things Journal, vol. 7, no. 1, pp. 33-52, Jan. 2020.  https://doi.org/10.1109/JIOT.2019.2943900
  13. G. Li, H. Luo, J. Yu, A. Hu and J. Wang, "Information-Theoretic Secure Key Sharing for WideArea Mobile Applications," IEEE Wireless Communications, pp. 1-8, 2023. 
  14. Biao He, Xiangyun Zhou, and Thushara D. Abhayapala, "Wireless physical layer security with imperfect channel state information: A survey," ZTE Communications, vol. 11, no. 3, pp.11-19, september 2013.
  15. Y. Wang, W. Yang, X. Shang, J. Hu, Y. Huang and Y. Cai, "Energy-Efficient Secure Transmission for Wireless Powered Internet of Things With Multiple Power Beacons," IEEE Access, vol. 6, pp. 75086-75098, 2018. https://doi.org/10.1109/ACCESS.2018.2883143
  16. R. Jiang, K. Xiong, P. Fan, L. Zhou and Z. Zhong, "Outage Probability and Throughput of Multirelay SWIPT-WPCN Networks With Nonlinear EH Model and Imperfect CSI," IEEE Systems Journal, vol. 14, no. 1, pp. 1206-1217, March 2020. https://doi.org/10.1109/JSYST.2019.2940490
  17. J. Moon, H. Lee, C. Song and I. Lee, "Secrecy Performance Optimization for Wireless Powered Communication Networks With an Energy Harvesting Jammer," IEEE Transactions on Communications, vol. 65, no. 2, pp. 764-774, Feb. 2017. https://doi.org/10.1109/TCOMM.2016.2623627
  18. G. Pan, C. Tang, T. Li and Y. Chen, "Secrecy Performance Analysis for SIMO Simultaneous Wireless Information and Power Transfer Systems," IEEE Transactions on Communications, vol. 63, no. 9, pp. 3423-3433, Sept. 2015. https://doi.org/10.1109/TCOMM.2015.2458317
  19. Y. Huang, F. S. Al-Qahtani, T. Q. Duong and J. Wang, "Secure Transmission in MIMO Wiretap Channels Using General-Order Transmit Antenna Selection With Outdated CSI," IEEE Transactions on Communications, vol. 63, no. 8, pp. 2959-2971, Aug. 2015.  https://doi.org/10.1109/TCOMM.2015.2442248
  20. Z. Chen, L. Hadley, Z. Ding and X. Dai, "Improving Secrecy Performance of a Wirelessly Powered Network," IEEE Transactions on Communications, vol. 65, no. 11, pp. 4996-5008, Nov. 2017.  https://doi.org/10.1109/TCOMM.2017.2732449
  21. K. Wang, Y. Li, Y. Ye and H. Zhang, "Dynamic Power Splitting Schemes for Non-Linear EH Relaying Networks: Perfect and Imperfect CSI," in Proc. of 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall), Toronto, ON, Canada, pp. 1-5, 2017.
  22. J. Zhang, G. Pan and Y. Xie, "Secrecy Analysis of Wireless-Powered Multi-Antenna Relaying System With Nonlinear Energy Harvesters and Imperfect CSI," IEEE Transactions on Green Communications and Networking, vol. 2, no. 2, pp. 460-470, June 2018. https://doi.org/10.1109/TGCN.2017.2785245
  23. C. Meng, G. Wang and X. Dai, "Secure Energy-Efficient Transmission for SWIPT Intelligent Connected Vehicles With Imperfect CSI," IEEE Access, vol. 7, pp. 154649-154658, 2019.  https://doi.org/10.1109/ACCESS.2019.2944948
  24. D. Wang, B. Bai, W. Chen and Z. Han, "Energy Efficient Secure Communication Over Decodeand-Forward Relay Channels," IEEE Transactions on Communications, vol. 63, no. 3, pp. 892-905, March 2015. https://doi.org/10.1109/TCOMM.2014.2387342
  25. A. Zappone, P. -H. Lin and E. A. Jorswieck, "Energy-efficient secure communications in MISOSE systems," in Proc. of 2014 48th Asilomar Conference on Signals, Systems and Computers, Pacific Grove, CA, USA, pp. 1001-1005, 2014.
  26. J. Farhat, G. Brante, R. D. Souza and J. L. Rebelatto, "Energy Efficiency of Repetition Coding and Parallel Coding Relaying Under Partial Secrecy Regime," IEEE Access, vol. 4, pp. 7275-7288, 2016. https://doi.org/10.1109/ACCESS.2016.2622062
  27. X. Shang, H. Yin, Y. Wang, M. Li and Y. Wang, "Secure Multiuser Scheduling for Hybrid RelayAssisted Wireless Powered Cooperative Communication Networks With Full-Duplex DestinationBased Jamming," IEEE Access, vol. 9, pp. 49774-49787, 2021. https://doi.org/10.1109/ACCESS.2021.3067472
  28. Y. Wang, H. Yin, T. Zhang, W. Yang, X. Shang and Y. Shen, "Secure Transmission for EnergyHarvesting Sensor Networks With a Buffer-Aided Sink Node," IEEE Internet of Things Journal, vol. 9, no. 9, pp. 6703-6718, 1 May, 2022. https://doi.org/10.1109/JIOT.2021.3112269
  29. A. -N. Nguyen, V. Nhan Vo, C. So-In, D. -B. Ha, S. Sanguanpong and Z. A. Baig, "On Secure Wireless Sensor Networks With Cooperative Energy Harvesting Relaying," IEEE Access, vol. 7, pp. 139212-139225, 2019. https://doi.org/10.1109/ACCESS.2019.2941915
  30. Z. Zhu, N. Wang, W. Hao, Z. Wang and I. Lee, "Robust Beamforming Designs in Secure MIMO SWIPT IoT Networks With a Nonlinear Channel Model," IEEE Internet of Things Journal, vol. 8, no. 3, pp. 1702-1715, 1 Feb.1, 2021.
  31. J. Ren, X. Lei, P. D. Diamantoulakis, Q. Chen and G. K. Karagiannidis, "Buffer-Aided Secure Relay Networks With SWIPT," IEEE Transactions on Vehicular Technology, vol. 69, no. 6, pp. 6485-6499, June 2020. https://doi.org/10.1109/TVT.2020.2988357
  32. X. Kang, Y. -C. Liang and J. Yang, "Riding on the Primary: A New Spectrum Sharing Paradigm for Wireless-Powered IoT Devices," IEEE Transactions on Wireless Communications, vol. 17, no. 9, pp. 6335-6347, Sept. 2018. https://doi.org/10.1109/TWC.2018.2859389
  33. T. M. Hoang, T. Q. Duong, N. -S. Vo and C. Kundu, "Physical Layer Security in Cooperative Energy Harvesting Networks With a Friendly Jammer," IEEE Wireless Communications Letters, vol. 6, no. 2, pp. 174-177, April 2017. https://doi.org/10.1109/LWC.2017.2650224
  34. V. Nhan Vo, T. G. Nguyen, C. So-In, Z. A. Baig and S. Sanguanpong, "Secrecy Outage Performance Analysis for Energy Harvesting Sensor Networks With a Jammer Using Relay Selection Strategy," IEEE Access, vol. 6, pp. 23406-23419, 2018. https://doi.org/10.1109/ACCESS.2018.2829485
  35. H. Chen, C. Zhai, Y. Li and B. Vucetic, "Cooperative Strategies for Wireless-Powered Communications: An Overview," IEEE Wireless Communications, vol. 25, no. 4, pp. 112-119, AUGUST 2018. https://doi.org/10.1109/MWC.2017.1700245
  36. C. Meng, G. Wang and X. Dai, "Secure Energy-Efficient Transmission for SWIPT Intelligent Connected Vehicles With Imperfect CSI," IEEE Access, vol. 7, pp. 154649-154658, 2019.  https://doi.org/10.1109/ACCESS.2019.2944948
  37. M. Li, H. Yin, Y. Huang, Y. Wang and R. Yu, "Physical Layer Security of WPCNs With Imperfect CSI and Full-Duplex Receiver Aided Jamming," IEEE Access, vol. 7, pp. 55318-55328, 2019.  https://doi.org/10.1109/ACCESS.2019.2913210
  38. O. O. Koyluoglu, C. E. Koksal and H. E. Gamal, "On Secrecy Capacity Scaling in Wireless Networks," IEEE Transactions on Information Theory, vol. 58, no. 5, pp. 3000-3015, May 2012.  https://doi.org/10.1109/TIT.2012.2184692
  39. Gradshteyn I. S., Ryzhik I. M., Table of integrals, series, and products, 7th ed., New York, USA: Academic, 2007.
  40. M. Xia and S. Aissa, "On the Efficiency of Far-Field Wireless Power Transfer," IEEE Transactions on Signal Processing, vol. 63, no. 11, pp. 2835-2847, June1, 2015. https://doi.org/10.1109/TSP.2015.2417497
  41. M. K. Simon and M.-S. Alouini, Digital Communication over Fading Channels, 2st ed., New York, USA: John Wiley and Sons, 2005, pp. 170-171.