SlideShare a Scribd company logo
1 of 25
Security of Wireless Networks
with rechargeable Energy Harvesting
Transmitters
Arvin Moeini - 504151332
Motivation
Security is an important issue in wireless networks due to the open
wireless medium. Security against an eavesdropper is typically
achieved via cryptographic algorithms that are implemented at
higher network layers.
Motivation
Wiretap channel
(Wyner, 1975)
Physical layer based security was pioneered by Wyner, who
introduced the wiretap channel and established the possibility of
creating perfectly secure communication links without relying on
private keys.
Motivation
Radio frequency (RF) energy harvesting technique is the
capability of converting the received RF signals into electricity.
This technique becomes a promising
solution to power energy constrained
wireless networks.
Conventionally, the energy
constrained wireless networks, such as
wireless sensor networks, have a
limited lifetime which largely confines
the network performance.
Outline
• Analyze Impact of the energy arrival rate on the system’s
secrecy rate
• Optimize the data transmission time to improve the
secrecy rate
• Optimize the weight vector to improve the secrecy rate
• Propose to use subset of jammer’s antenna for jamming
• Batteries queuing analyses
• Simulate the system on MATLAB
Background information
We consider a scenario in which a source communicates with a
destination in the presence of one eavesdropper. The
communication is aided by a relay that is equipped with multiple
antennas that provide more degrees of freedom for the relay
channel.
Background information
The secrecy outage happens when the transmission rate exceeds
the secrecy rate. Letting Cn-m L denote the channel capacity of the
n−m link when the event L is true, the secrecy rate of the Alice-
Bob link is given by
where [ ]+ denotes the maximum between the enclosed value in·
the brackets and zero
L {{∈ BJ > 0}, {BJ = 0}} represents the state of
Jimmy’s battery.
If L = {BJ > 0} Jimmy’s battery has energy
if L = {BJ = 0} Jimmy’s battery has no energy and
hence he cannot help in jamming Eve.
New Methods
New Methods
Optimize Alice’s transmission times to enhance the achievable
secrecy rate due to the increase of the transmit and jamming powers.
αA = TA/T [0∈ , 1]
analyze the energy arrival randomness at Alice and Jimmy
and show their impact on the average secrecy rate.
New Methods
Our proposed jamming scheme is summarized as follows
Secrecy Capacity
Let ΓA = eA/T and Γ J = eJ/ T. For given channel realizations,
the rates of the Alice-Bob and Alice-Eve links are
The secrecy rate is Cs A (B j >0) =[CA,B − CA,E (BJ >0]+
The superscript ∗ denotes the complex-conjugate transpose
| · | denotes the absolute value, θj,k = |hj,k|2 denotes channel gain between
Node j ∈ {A, 1, 2, 3, . . . , N } and Node k ∈ {E, B, 1, 2, . . . , N }
We aim at maximizing the secrecy rate in a given time slot over
the weight vector used at Jimmy and the transmission time. That is,
g = [g1, g2, . . . , gK ]T, where the superscript T denotes the vector
transpose, is the BF weight vector whose dimension is K × 1 with gj as the
weight used at Antenna j ∈ J .
For a given (fixed) αA, the optimization problem becomes independent of αA.
This implies that the optimal weight vector is independent of αA.
Secrecy Capacity
Optimization
for a fixed αA, maximizing Cs ,A (B ,J>0) over the weight vector g is
equivalent to minimizing
Since the logarithmic function is a monotonically increasing function,
the problem reduces to the maximization of the following objective function
The optimal weight vector g that maximizes |g*hE|2 =
subject to (s.t.) the normalization constraint ||g ||^2 = 1, where || · || represents
the l2-norm.
Optimization
the total elimination of the interference at Bob, i.e., |g hB| = 0,∗
can be achieved by solving the following optimization problem
Since g has a unit norm, we must divide the projection vector by its
magnitude. Thus,
where is the projection matrix which is given by
we substitute with g = g* into the objective function of secrecy rate and optimize it
over αA.
Optimization
Finally, we have the case when Alice’s battery has energy and Jimmy’s
battery has no energy. When Jimmy’s battery is empty, the secrecy rate
is given by
Batteries Queueing Analyses
Average secrecy rate of Alice transmission when Jimmy has no
energy and has energy to help
Average number of securely decoded bits/sec/Hz at Bob is given by
Two important special cases to gain some insights
A. The Case of Large Batteries Capacities and λA =1 or λJ =1
B. B. Geo/D/1 Queueing Model
Large Batteries Capacities
1) The Case of λA = 1 :
When λA = 1, Alice always has energy to
transmit data.
Pr{BA = 0} = 0 and Pr{BA > 0} = 1
The average secrecy rate is given by
When BJ max is very large, the probability that Jimmy’s battery is nonempty is
given by Pr{BJ > 0} = min{λj / β ,1}
By Substituting two above formula, the average secrecy rate of the system is
given by
2) The Case of λj = 1 :
When Jimmy has a reliable energy supply, Pr{BJ = 0} = 0 and Pr{BJ > 0} = 1.
In this case, the average secrecy rate of the system is given by
Geo/D/1 Queueing Model
the probability of the Geo/D/1 energy queue with unity service rate being
empty is equal to 1 − λk for Bk. Applying this model to our scenario, we
can write
B. Geo/D/1 Queueing Model
Since CA, B (BJ >0) ≥ CA, B (BJ >0) , as the energy arriving at Jimmy increases,
the secrecy rate increases.
Simulation result
We simulated the system using 4000 channel realizations and assumed that
each channel coefficient is modeled as a circularly-symmetric Gaussian
random variable with zero mean and unit variance.
Moreover, we assume N = 6, eA/ /κ
(TW) = eJ/ /(κ TW) = 20 dB, and BA max =
BJ max = 10. Figure 1 shows the
average secrecy rate for our
proposed jamming scheme with and
without optimization over g and αA.
Simulation result
After optimization the weight vector we saw that our secrecy rate increased
because maximizing Cs B ,JA >0 over the weight vector g
Simulation result
If the arrival rate of a battery is high enough to saturate the battery with
energy packets, the average secrecy rate becomes fixed with that arrival rate.
According the results average secrecy rate increases linearly with both λA and λJ.
Simulation result
Instead of using all of Jimmy’s antennas for jamming Eve, which requires N radio-
frequency (RF) chains, we assume that only a set of K RF chains is available at
Jimmy (or he only activates any K ≤ N)
Conclusion
• investigated the impact of the batteries at a source node and a jammer on
the achievable average secrecy rates.
We showed that the average secrecy rate is nondecreasing with the
arrival rates at the energy batteries and it becomes constant when these
batteries are saturated with energy packets.
• In addition, we showed that the optimization over the transmission time, TA,
can significantly enhance the average secrecy rate.
• proposed a cooperative jamming scheme and showed that the jammer
does not need to use all of its antennas for jamming Eve.
The achievable performance is comparable with the case of using all
antennas, which requires complex hardware design since it increases
the number of transmit RF chains and antennas and also complicates
system design since the number of estimated channels increases.
References
• X. Lu, P. Wang, D. Niyato, D. I. Kim, and Z. Han, “Wireless networks with RF energy
harvesting: A contemporary survey,” IEEE Commun. Surveys Tuts., vol. 17, no. 2, pp.
757–789, Jun. 2015.
• C. Alippi and C. Galperti, “An adaptive system for optimal solar energy harvesting in
wireless sensor network nodes,” IEEE Trans. Circuits Syst. I, Reg. Papers, vol. 55,
no. 6, pp. 1742–1750, Jul. 2008.
• L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, “Cooperative jamming for wireless
physical layer security,” in Proc. IEEE/SP 15th Workshop Stat. Signal Process.,
Cardiff, U.K., Aug./Sep. 2009, pp. 417–420.
• A. Mukherjee and J. Huang, “Deploying multi-antenna energy-harvesting cooperative
jammers in the MIMO wiretap channel,” in Proc. IEEE ASILOMAR, Pacific Grove, CA,
USA, 2012, pp. 1886–1890.
• I. Krikidis, G. Zheng, and B. Ottersten, “Protocols and stability analysis for energy
harvesting TDMA systems with/without relaying,” in Proc. IEEE GLOBECOM, Atlanta,
GA, USA, Dec. 2013, pp. 4536–4541.
• A. El Shafie, D. Niyato and N. Al-Dhahir, "Security of Rechargeable Energy-
Harvesting Transmitters in Wireless Networks," in IEEE Wireless Communications
Letters, vol. 5, no. 4, pp. 384-387, Aug. 2016.
Any Question?
THANK YOU FOR YOUR ATTENTION…

More Related Content

What's hot

Direct and indirect excitations in boron nitride: atomic structure and electr...
Direct and indirect excitations in boron nitride: atomic structure and electr...Direct and indirect excitations in boron nitride: atomic structure and electr...
Direct and indirect excitations in boron nitride: atomic structure and electr...Claudio Attaccalite
 
NS2 IEEE projects 2014
NS2 IEEE projects 2014NS2 IEEE projects 2014
NS2 IEEE projects 2014Senthilvel S
 
Linear approximation
Linear approximationLinear approximation
Linear approximationAbu Yohannan
 
Simulation of p-GaN/ i-InGaN/n-GaN Solar Cell
Simulation of p-GaN/ i-InGaN/n-GaN Solar CellSimulation of p-GaN/ i-InGaN/n-GaN Solar Cell
Simulation of p-GaN/ i-InGaN/n-GaN Solar CellIktiham Bin Taher
 
Reduction of Active Power Loss byUsing Adaptive Cat Swarm Optimization
Reduction of Active Power Loss byUsing Adaptive Cat Swarm OptimizationReduction of Active Power Loss byUsing Adaptive Cat Swarm Optimization
Reduction of Active Power Loss byUsing Adaptive Cat Swarm Optimizationijeei-iaes
 
Multi-objective whale optimization based minimization of loss, maximization o...
Multi-objective whale optimization based minimization of loss, maximization o...Multi-objective whale optimization based minimization of loss, maximization o...
Multi-objective whale optimization based minimization of loss, maximization o...IJECEIAES
 
Designing of an Energy-Efficient Nanoelectronics Architecture for Binary Comp...
Designing of an Energy-Efficient Nanoelectronics Architecture for Binary Comp...Designing of an Energy-Efficient Nanoelectronics Architecture for Binary Comp...
Designing of an Energy-Efficient Nanoelectronics Architecture for Binary Comp...VIT-AP University
 
Energy consumption of vlsi decoders
Energy consumption of vlsi decodersEnergy consumption of vlsi decoders
Energy consumption of vlsi decodersjpstudcorner
 
Throughput maximization in multiuser wireless powered communication network b...
Throughput maximization in multiuser wireless powered communication network b...Throughput maximization in multiuser wireless powered communication network b...
Throughput maximization in multiuser wireless powered communication network b...paperpublications3
 
DATA RATE LIMITS
DATA RATE LIMITSDATA RATE LIMITS
DATA RATE LIMITSChAwais15
 
Dynamic Modeling, Control and Simulation of a Wind and PV Hybrid System for G...
Dynamic Modeling, Control and Simulation of a Wind and PV Hybrid System for G...Dynamic Modeling, Control and Simulation of a Wind and PV Hybrid System for G...
Dynamic Modeling, Control and Simulation of a Wind and PV Hybrid System for G...IJERA Editor
 
Optical Absoprtion of Thin Film Semiconductors
Optical Absoprtion of Thin Film SemiconductorsOptical Absoprtion of Thin Film Semiconductors
Optical Absoprtion of Thin Film SemiconductorsEnrico Castro
 
General Physics (2) lect 1
General Physics (2) lect 1General Physics (2) lect 1
General Physics (2) lect 1Dr. Abeer Kamal
 
Modern Semiconductor Devices for Integrated Circuits 1st Edition Hu Solutions...
Modern Semiconductor Devices for Integrated Circuits 1st Edition Hu Solutions...Modern Semiconductor Devices for Integrated Circuits 1st Edition Hu Solutions...
Modern Semiconductor Devices for Integrated Circuits 1st Edition Hu Solutions...viqoza
 
ELECTRICAL POWER SYSTEMS ECONOMICS
ELECTRICAL POWER SYSTEMS ECONOMICSELECTRICAL POWER SYSTEMS ECONOMICS
ELECTRICAL POWER SYSTEMS ECONOMICSMohammedMedani4
 
Energy Harvesting Using Adaptive Duty-Cycling Algorithm - Wireless Sensor Net...
Energy Harvesting Using Adaptive Duty-Cycling Algorithm - Wireless Sensor Net...Energy Harvesting Using Adaptive Duty-Cycling Algorithm - Wireless Sensor Net...
Energy Harvesting Using Adaptive Duty-Cycling Algorithm - Wireless Sensor Net...IJERDJOURNAL
 
A DISTRIBUTED FAULT-TOLERANT TOPOLOGY CONTROL ALGORITHM FOR HETEROGENEOUS WIR...
A DISTRIBUTED FAULT-TOLERANT TOPOLOGY CONTROL ALGORITHM FOR HETEROGENEOUS WIR...A DISTRIBUTED FAULT-TOLERANT TOPOLOGY CONTROL ALGORITHM FOR HETEROGENEOUS WIR...
A DISTRIBUTED FAULT-TOLERANT TOPOLOGY CONTROL ALGORITHM FOR HETEROGENEOUS WIR...I3E Technologies
 

What's hot (20)

Direct and indirect excitations in boron nitride: atomic structure and electr...
Direct and indirect excitations in boron nitride: atomic structure and electr...Direct and indirect excitations in boron nitride: atomic structure and electr...
Direct and indirect excitations in boron nitride: atomic structure and electr...
 
NS2 IEEE projects 2014
NS2 IEEE projects 2014NS2 IEEE projects 2014
NS2 IEEE projects 2014
 
Linear approximation
Linear approximationLinear approximation
Linear approximation
 
10.1.1.59.4606
10.1.1.59.460610.1.1.59.4606
10.1.1.59.4606
 
Simulation of p-GaN/ i-InGaN/n-GaN Solar Cell
Simulation of p-GaN/ i-InGaN/n-GaN Solar CellSimulation of p-GaN/ i-InGaN/n-GaN Solar Cell
Simulation of p-GaN/ i-InGaN/n-GaN Solar Cell
 
Reduction of Active Power Loss byUsing Adaptive Cat Swarm Optimization
Reduction of Active Power Loss byUsing Adaptive Cat Swarm OptimizationReduction of Active Power Loss byUsing Adaptive Cat Swarm Optimization
Reduction of Active Power Loss byUsing Adaptive Cat Swarm Optimization
 
Bu31485490
Bu31485490Bu31485490
Bu31485490
 
Multi-objective whale optimization based minimization of loss, maximization o...
Multi-objective whale optimization based minimization of loss, maximization o...Multi-objective whale optimization based minimization of loss, maximization o...
Multi-objective whale optimization based minimization of loss, maximization o...
 
Designing of an Energy-Efficient Nanoelectronics Architecture for Binary Comp...
Designing of an Energy-Efficient Nanoelectronics Architecture for Binary Comp...Designing of an Energy-Efficient Nanoelectronics Architecture for Binary Comp...
Designing of an Energy-Efficient Nanoelectronics Architecture for Binary Comp...
 
Energy consumption of vlsi decoders
Energy consumption of vlsi decodersEnergy consumption of vlsi decoders
Energy consumption of vlsi decoders
 
Throughput maximization in multiuser wireless powered communication network b...
Throughput maximization in multiuser wireless powered communication network b...Throughput maximization in multiuser wireless powered communication network b...
Throughput maximization in multiuser wireless powered communication network b...
 
DATA RATE LIMITS
DATA RATE LIMITSDATA RATE LIMITS
DATA RATE LIMITS
 
A010430108
A010430108A010430108
A010430108
 
Dynamic Modeling, Control and Simulation of a Wind and PV Hybrid System for G...
Dynamic Modeling, Control and Simulation of a Wind and PV Hybrid System for G...Dynamic Modeling, Control and Simulation of a Wind and PV Hybrid System for G...
Dynamic Modeling, Control and Simulation of a Wind and PV Hybrid System for G...
 
Optical Absoprtion of Thin Film Semiconductors
Optical Absoprtion of Thin Film SemiconductorsOptical Absoprtion of Thin Film Semiconductors
Optical Absoprtion of Thin Film Semiconductors
 
General Physics (2) lect 1
General Physics (2) lect 1General Physics (2) lect 1
General Physics (2) lect 1
 
Modern Semiconductor Devices for Integrated Circuits 1st Edition Hu Solutions...
Modern Semiconductor Devices for Integrated Circuits 1st Edition Hu Solutions...Modern Semiconductor Devices for Integrated Circuits 1st Edition Hu Solutions...
Modern Semiconductor Devices for Integrated Circuits 1st Edition Hu Solutions...
 
ELECTRICAL POWER SYSTEMS ECONOMICS
ELECTRICAL POWER SYSTEMS ECONOMICSELECTRICAL POWER SYSTEMS ECONOMICS
ELECTRICAL POWER SYSTEMS ECONOMICS
 
Energy Harvesting Using Adaptive Duty-Cycling Algorithm - Wireless Sensor Net...
Energy Harvesting Using Adaptive Duty-Cycling Algorithm - Wireless Sensor Net...Energy Harvesting Using Adaptive Duty-Cycling Algorithm - Wireless Sensor Net...
Energy Harvesting Using Adaptive Duty-Cycling Algorithm - Wireless Sensor Net...
 
A DISTRIBUTED FAULT-TOLERANT TOPOLOGY CONTROL ALGORITHM FOR HETEROGENEOUS WIR...
A DISTRIBUTED FAULT-TOLERANT TOPOLOGY CONTROL ALGORITHM FOR HETEROGENEOUS WIR...A DISTRIBUTED FAULT-TOLERANT TOPOLOGY CONTROL ALGORITHM FOR HETEROGENEOUS WIR...
A DISTRIBUTED FAULT-TOLERANT TOPOLOGY CONTROL ALGORITHM FOR HETEROGENEOUS WIR...
 

Similar to Security of wireless networks with rechargeable energy harvesting transmitters

ElectricallySmallAntennaPaper
ElectricallySmallAntennaPaperElectricallySmallAntennaPaper
ElectricallySmallAntennaPaperMina Micheal W
 
On the optimal transmission policy in hybrid energy supply wireless communica...
On the optimal transmission policy in hybrid energy supply wireless communica...On the optimal transmission policy in hybrid energy supply wireless communica...
On the optimal transmission policy in hybrid energy supply wireless communica...MNIT Jaipur
 
Digital Beamforming for Simultaneous Power and Information Transmission in Wi...
Digital Beamforming for Simultaneous Power and Information Transmission in Wi...Digital Beamforming for Simultaneous Power and Information Transmission in Wi...
Digital Beamforming for Simultaneous Power and Information Transmission in Wi...idescitation
 
A new design of a microstrip rectenna at 5.8 GHz for wireless power transmiss...
A new design of a microstrip rectenna at 5.8 GHz for wireless power transmiss...A new design of a microstrip rectenna at 5.8 GHz for wireless power transmiss...
A new design of a microstrip rectenna at 5.8 GHz for wireless power transmiss...IJECEIAES
 
Analysis and optimization of wireless power transfer link
Analysis and optimization of wireless power transfer linkAnalysis and optimization of wireless power transfer link
Analysis and optimization of wireless power transfer linkAjay Kumar Sah
 
22 7404 latex power beaconb
22 7404 latex power beaconb22 7404 latex power beaconb
22 7404 latex power beaconbIAESIJEECS
 
22 7404 latex power beaconb
22 7404 latex power beaconb22 7404 latex power beaconb
22 7404 latex power beaconbIAESIJEECS
 
Lantiq/Intel Contributions to G.fast at Scientific Conferences
Lantiq/Intel Contributions to G.fast at Scientific ConferencesLantiq/Intel Contributions to G.fast at Scientific Conferences
Lantiq/Intel Contributions to G.fast at Scientific ConferencesLantiq
 
Broadband and efficient full wave rectenna for wireless energy 2019
Broadband and efficient full wave rectenna for wireless energy 2019Broadband and efficient full wave rectenna for wireless energy 2019
Broadband and efficient full wave rectenna for wireless energy 2019Diana Diana
 
Computational Investigation of Asymmetric Coplanar Waveguides Using Neural Ne...
Computational Investigation of Asymmetric Coplanar Waveguides Using Neural Ne...Computational Investigation of Asymmetric Coplanar Waveguides Using Neural Ne...
Computational Investigation of Asymmetric Coplanar Waveguides Using Neural Ne...Konstantinos Karamichalis
 
ECGR4121_P2_LaPlant_J-edited
ECGR4121_P2_LaPlant_J-editedECGR4121_P2_LaPlant_J-edited
ECGR4121_P2_LaPlant_J-editedJoshua LaPlant
 
Senior Thesis Presentation
Senior Thesis PresentationSenior Thesis Presentation
Senior Thesis PresentationBryan McLaren
 

Similar to Security of wireless networks with rechargeable energy harvesting transmitters (20)

ElectricallySmallAntennaPaper
ElectricallySmallAntennaPaperElectricallySmallAntennaPaper
ElectricallySmallAntennaPaper
 
Review paper
Review paperReview paper
Review paper
 
wireless power transfer
wireless power transferwireless power transfer
wireless power transfer
 
On the optimal transmission policy in hybrid energy supply wireless communica...
On the optimal transmission policy in hybrid energy supply wireless communica...On the optimal transmission policy in hybrid energy supply wireless communica...
On the optimal transmission policy in hybrid energy supply wireless communica...
 
wireless power transfer
wireless power transferwireless power transfer
wireless power transfer
 
Digital Beamforming for Simultaneous Power and Information Transmission in Wi...
Digital Beamforming for Simultaneous Power and Information Transmission in Wi...Digital Beamforming for Simultaneous Power and Information Transmission in Wi...
Digital Beamforming for Simultaneous Power and Information Transmission in Wi...
 
Design and Analysis of Capacitive Power Transfer System with and without the ...
Design and Analysis of Capacitive Power Transfer System with and without the ...Design and Analysis of Capacitive Power Transfer System with and without the ...
Design and Analysis of Capacitive Power Transfer System with and without the ...
 
wireless power transfer
wireless power transferwireless power transfer
wireless power transfer
 
Witricity
WitricityWitricity
Witricity
 
J010217780
J010217780J010217780
J010217780
 
A new design of a microstrip rectenna at 5.8 GHz for wireless power transmiss...
A new design of a microstrip rectenna at 5.8 GHz for wireless power transmiss...A new design of a microstrip rectenna at 5.8 GHz for wireless power transmiss...
A new design of a microstrip rectenna at 5.8 GHz for wireless power transmiss...
 
Analysis and optimization of wireless power transfer link
Analysis and optimization of wireless power transfer linkAnalysis and optimization of wireless power transfer link
Analysis and optimization of wireless power transfer link
 
Transfer function and Impulse Response Simulation of Power Line Channel
Transfer function and Impulse Response Simulation of Power Line ChannelTransfer function and Impulse Response Simulation of Power Line Channel
Transfer function and Impulse Response Simulation of Power Line Channel
 
22 7404 latex power beaconb
22 7404 latex power beaconb22 7404 latex power beaconb
22 7404 latex power beaconb
 
22 7404 latex power beaconb
22 7404 latex power beaconb22 7404 latex power beaconb
22 7404 latex power beaconb
 
Lantiq/Intel Contributions to G.fast at Scientific Conferences
Lantiq/Intel Contributions to G.fast at Scientific ConferencesLantiq/Intel Contributions to G.fast at Scientific Conferences
Lantiq/Intel Contributions to G.fast at Scientific Conferences
 
Broadband and efficient full wave rectenna for wireless energy 2019
Broadband and efficient full wave rectenna for wireless energy 2019Broadband and efficient full wave rectenna for wireless energy 2019
Broadband and efficient full wave rectenna for wireless energy 2019
 
Computational Investigation of Asymmetric Coplanar Waveguides Using Neural Ne...
Computational Investigation of Asymmetric Coplanar Waveguides Using Neural Ne...Computational Investigation of Asymmetric Coplanar Waveguides Using Neural Ne...
Computational Investigation of Asymmetric Coplanar Waveguides Using Neural Ne...
 
ECGR4121_P2_LaPlant_J-edited
ECGR4121_P2_LaPlant_J-editedECGR4121_P2_LaPlant_J-edited
ECGR4121_P2_LaPlant_J-edited
 
Senior Thesis Presentation
Senior Thesis PresentationSenior Thesis Presentation
Senior Thesis Presentation
 

Recently uploaded

Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...Call Girls in Nagpur High Profile
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 

Recently uploaded (20)

Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 

Security of wireless networks with rechargeable energy harvesting transmitters

  • 1. Security of Wireless Networks with rechargeable Energy Harvesting Transmitters Arvin Moeini - 504151332
  • 2. Motivation Security is an important issue in wireless networks due to the open wireless medium. Security against an eavesdropper is typically achieved via cryptographic algorithms that are implemented at higher network layers.
  • 3. Motivation Wiretap channel (Wyner, 1975) Physical layer based security was pioneered by Wyner, who introduced the wiretap channel and established the possibility of creating perfectly secure communication links without relying on private keys.
  • 4. Motivation Radio frequency (RF) energy harvesting technique is the capability of converting the received RF signals into electricity. This technique becomes a promising solution to power energy constrained wireless networks. Conventionally, the energy constrained wireless networks, such as wireless sensor networks, have a limited lifetime which largely confines the network performance.
  • 5. Outline • Analyze Impact of the energy arrival rate on the system’s secrecy rate • Optimize the data transmission time to improve the secrecy rate • Optimize the weight vector to improve the secrecy rate • Propose to use subset of jammer’s antenna for jamming • Batteries queuing analyses • Simulate the system on MATLAB
  • 6. Background information We consider a scenario in which a source communicates with a destination in the presence of one eavesdropper. The communication is aided by a relay that is equipped with multiple antennas that provide more degrees of freedom for the relay channel.
  • 7. Background information The secrecy outage happens when the transmission rate exceeds the secrecy rate. Letting Cn-m L denote the channel capacity of the n−m link when the event L is true, the secrecy rate of the Alice- Bob link is given by where [ ]+ denotes the maximum between the enclosed value in· the brackets and zero L {{∈ BJ > 0}, {BJ = 0}} represents the state of Jimmy’s battery. If L = {BJ > 0} Jimmy’s battery has energy if L = {BJ = 0} Jimmy’s battery has no energy and hence he cannot help in jamming Eve.
  • 9. New Methods Optimize Alice’s transmission times to enhance the achievable secrecy rate due to the increase of the transmit and jamming powers. αA = TA/T [0∈ , 1] analyze the energy arrival randomness at Alice and Jimmy and show their impact on the average secrecy rate.
  • 10. New Methods Our proposed jamming scheme is summarized as follows
  • 11. Secrecy Capacity Let ΓA = eA/T and Γ J = eJ/ T. For given channel realizations, the rates of the Alice-Bob and Alice-Eve links are The secrecy rate is Cs A (B j >0) =[CA,B − CA,E (BJ >0]+ The superscript ∗ denotes the complex-conjugate transpose | · | denotes the absolute value, θj,k = |hj,k|2 denotes channel gain between Node j ∈ {A, 1, 2, 3, . . . , N } and Node k ∈ {E, B, 1, 2, . . . , N }
  • 12. We aim at maximizing the secrecy rate in a given time slot over the weight vector used at Jimmy and the transmission time. That is, g = [g1, g2, . . . , gK ]T, where the superscript T denotes the vector transpose, is the BF weight vector whose dimension is K × 1 with gj as the weight used at Antenna j ∈ J . For a given (fixed) αA, the optimization problem becomes independent of αA. This implies that the optimal weight vector is independent of αA. Secrecy Capacity
  • 13. Optimization for a fixed αA, maximizing Cs ,A (B ,J>0) over the weight vector g is equivalent to minimizing Since the logarithmic function is a monotonically increasing function, the problem reduces to the maximization of the following objective function The optimal weight vector g that maximizes |g*hE|2 = subject to (s.t.) the normalization constraint ||g ||^2 = 1, where || · || represents the l2-norm.
  • 14. Optimization the total elimination of the interference at Bob, i.e., |g hB| = 0,∗ can be achieved by solving the following optimization problem Since g has a unit norm, we must divide the projection vector by its magnitude. Thus, where is the projection matrix which is given by we substitute with g = g* into the objective function of secrecy rate and optimize it over αA.
  • 15. Optimization Finally, we have the case when Alice’s battery has energy and Jimmy’s battery has no energy. When Jimmy’s battery is empty, the secrecy rate is given by
  • 16. Batteries Queueing Analyses Average secrecy rate of Alice transmission when Jimmy has no energy and has energy to help Average number of securely decoded bits/sec/Hz at Bob is given by Two important special cases to gain some insights A. The Case of Large Batteries Capacities and λA =1 or λJ =1 B. B. Geo/D/1 Queueing Model
  • 17. Large Batteries Capacities 1) The Case of λA = 1 : When λA = 1, Alice always has energy to transmit data. Pr{BA = 0} = 0 and Pr{BA > 0} = 1 The average secrecy rate is given by When BJ max is very large, the probability that Jimmy’s battery is nonempty is given by Pr{BJ > 0} = min{λj / β ,1} By Substituting two above formula, the average secrecy rate of the system is given by
  • 18. 2) The Case of λj = 1 : When Jimmy has a reliable energy supply, Pr{BJ = 0} = 0 and Pr{BJ > 0} = 1. In this case, the average secrecy rate of the system is given by Geo/D/1 Queueing Model the probability of the Geo/D/1 energy queue with unity service rate being empty is equal to 1 − λk for Bk. Applying this model to our scenario, we can write B. Geo/D/1 Queueing Model Since CA, B (BJ >0) ≥ CA, B (BJ >0) , as the energy arriving at Jimmy increases, the secrecy rate increases.
  • 19. Simulation result We simulated the system using 4000 channel realizations and assumed that each channel coefficient is modeled as a circularly-symmetric Gaussian random variable with zero mean and unit variance. Moreover, we assume N = 6, eA/ /κ (TW) = eJ/ /(κ TW) = 20 dB, and BA max = BJ max = 10. Figure 1 shows the average secrecy rate for our proposed jamming scheme with and without optimization over g and αA.
  • 20. Simulation result After optimization the weight vector we saw that our secrecy rate increased because maximizing Cs B ,JA >0 over the weight vector g
  • 21. Simulation result If the arrival rate of a battery is high enough to saturate the battery with energy packets, the average secrecy rate becomes fixed with that arrival rate. According the results average secrecy rate increases linearly with both λA and λJ.
  • 22. Simulation result Instead of using all of Jimmy’s antennas for jamming Eve, which requires N radio- frequency (RF) chains, we assume that only a set of K RF chains is available at Jimmy (or he only activates any K ≤ N)
  • 23. Conclusion • investigated the impact of the batteries at a source node and a jammer on the achievable average secrecy rates. We showed that the average secrecy rate is nondecreasing with the arrival rates at the energy batteries and it becomes constant when these batteries are saturated with energy packets. • In addition, we showed that the optimization over the transmission time, TA, can significantly enhance the average secrecy rate. • proposed a cooperative jamming scheme and showed that the jammer does not need to use all of its antennas for jamming Eve. The achievable performance is comparable with the case of using all antennas, which requires complex hardware design since it increases the number of transmit RF chains and antennas and also complicates system design since the number of estimated channels increases.
  • 24. References • X. Lu, P. Wang, D. Niyato, D. I. Kim, and Z. Han, “Wireless networks with RF energy harvesting: A contemporary survey,” IEEE Commun. Surveys Tuts., vol. 17, no. 2, pp. 757–789, Jun. 2015. • C. Alippi and C. Galperti, “An adaptive system for optimal solar energy harvesting in wireless sensor network nodes,” IEEE Trans. Circuits Syst. I, Reg. Papers, vol. 55, no. 6, pp. 1742–1750, Jul. 2008. • L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, “Cooperative jamming for wireless physical layer security,” in Proc. IEEE/SP 15th Workshop Stat. Signal Process., Cardiff, U.K., Aug./Sep. 2009, pp. 417–420. • A. Mukherjee and J. Huang, “Deploying multi-antenna energy-harvesting cooperative jammers in the MIMO wiretap channel,” in Proc. IEEE ASILOMAR, Pacific Grove, CA, USA, 2012, pp. 1886–1890. • I. Krikidis, G. Zheng, and B. Ottersten, “Protocols and stability analysis for energy harvesting TDMA systems with/without relaying,” in Proc. IEEE GLOBECOM, Atlanta, GA, USA, Dec. 2013, pp. 4536–4541. • A. El Shafie, D. Niyato and N. Al-Dhahir, "Security of Rechargeable Energy- Harvesting Transmitters in Wireless Networks," in IEEE Wireless Communications Letters, vol. 5, no. 4, pp. 384-387, Aug. 2016.
  • 25. Any Question? THANK YOU FOR YOUR ATTENTION…

Editor's Notes

  1. Encryption is the science of changing data so that it is unrecognisable and useless to an unauthorised person. Decryption is changing it back to its original form. RSA is designed by Rivest, Shamir, and Adleman Advanced Encryption Standard - Data Encryption Standard- "Rivest Cipher"
  2. Recently there has been an upsurge of research interests in radio frequency (RF) energy harvesting technique
  3. To solve this problem, we first note that the optimal weight vector must null the interference at Bob.This implies that the optimal weight vector is orthogonal to hB and belongs to a subspace orthogonal to the channel vector hB
  4. When λA = 1, Alice always hasenergy to transmit data. In other words, she has a reliableenergy supply.
  5. In addition,the rate is linearly increasing with the average energy packetarrival rate at Alice because as λA increases, Alice will bemore active and able to transmit data which improves her rate.The maximum average rate is achieved when λJ = λA = 1energy packets/slot.