Cargando…
Secrecy Performance Analysis of Wireless Powered Sensor Networks Under Saturation Nonlinear Energy Harvesting and Activation Threshold
In this paper, we investigate the impact of saturation nonlinear energy harvesting (EH) and activation threshold on the multiuser wireless powered sensor networks (WPSNs) from the physical layer security (PLS) perspective. In particular, for improving the secrecy performance, the generalized multius...
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2020
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7146341/ https://www.ncbi.nlm.nih.gov/pubmed/32183366 http://dx.doi.org/10.3390/s20061632 |
_version_ | 1783520178784436224 |
---|---|
author | Shang, Xiaohui Yin, Hao Wang, Yida Li, Mu Wang, Yong |
author_facet | Shang, Xiaohui Yin, Hao Wang, Yida Li, Mu Wang, Yong |
author_sort | Shang, Xiaohui |
collection | PubMed |
description | In this paper, we investigate the impact of saturation nonlinear energy harvesting (EH) and activation threshold on the multiuser wireless powered sensor networks (WPSNs) from the physical layer security (PLS) perspective. In particular, for improving the secrecy performance, the generalized multiuser scheduling (GMS) scheme is exploited, in which the Kth strongest sensor is chosen based on the legitimate link. For evaluating the impact of various key parameters on the security of system, we obtain the exact closed-form expressions for secrecy outage probability (SOP) under linear EH (LEH), saturation nonlinear EH (SNEH) and saturation nonlinear EH with activation threshold (SNAT), respectively, and solve the maximization problem of secure energy efficiency (SEE). Simulation results demonstrate that: (1) the number of source sensors, the EH efficiency and the transmit power of power beacon (PB) all have positive impact on SOP, and the smaller generalized selection coefficient is advantageous for secrecy performance; (2) LEH is an ideal situation for SNEH when the saturation threshold is large enough and SNEH is a special situation for SNAT when the activation threshold is low enough; (3) the time-switching factor and the activation threshold both have an important impact on the secrecy performance, which are worth considering carefully. |
format | Online Article Text |
id | pubmed-7146341 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2020 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-71463412020-04-15 Secrecy Performance Analysis of Wireless Powered Sensor Networks Under Saturation Nonlinear Energy Harvesting and Activation Threshold Shang, Xiaohui Yin, Hao Wang, Yida Li, Mu Wang, Yong Sensors (Basel) Article In this paper, we investigate the impact of saturation nonlinear energy harvesting (EH) and activation threshold on the multiuser wireless powered sensor networks (WPSNs) from the physical layer security (PLS) perspective. In particular, for improving the secrecy performance, the generalized multiuser scheduling (GMS) scheme is exploited, in which the Kth strongest sensor is chosen based on the legitimate link. For evaluating the impact of various key parameters on the security of system, we obtain the exact closed-form expressions for secrecy outage probability (SOP) under linear EH (LEH), saturation nonlinear EH (SNEH) and saturation nonlinear EH with activation threshold (SNAT), respectively, and solve the maximization problem of secure energy efficiency (SEE). Simulation results demonstrate that: (1) the number of source sensors, the EH efficiency and the transmit power of power beacon (PB) all have positive impact on SOP, and the smaller generalized selection coefficient is advantageous for secrecy performance; (2) LEH is an ideal situation for SNEH when the saturation threshold is large enough and SNEH is a special situation for SNAT when the activation threshold is low enough; (3) the time-switching factor and the activation threshold both have an important impact on the secrecy performance, which are worth considering carefully. MDPI 2020-03-14 /pmc/articles/PMC7146341/ /pubmed/32183366 http://dx.doi.org/10.3390/s20061632 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Shang, Xiaohui Yin, Hao Wang, Yida Li, Mu Wang, Yong Secrecy Performance Analysis of Wireless Powered Sensor Networks Under Saturation Nonlinear Energy Harvesting and Activation Threshold |
title | Secrecy Performance Analysis of Wireless Powered Sensor Networks Under Saturation Nonlinear Energy Harvesting and Activation Threshold |
title_full | Secrecy Performance Analysis of Wireless Powered Sensor Networks Under Saturation Nonlinear Energy Harvesting and Activation Threshold |
title_fullStr | Secrecy Performance Analysis of Wireless Powered Sensor Networks Under Saturation Nonlinear Energy Harvesting and Activation Threshold |
title_full_unstemmed | Secrecy Performance Analysis of Wireless Powered Sensor Networks Under Saturation Nonlinear Energy Harvesting and Activation Threshold |
title_short | Secrecy Performance Analysis of Wireless Powered Sensor Networks Under Saturation Nonlinear Energy Harvesting and Activation Threshold |
title_sort | secrecy performance analysis of wireless powered sensor networks under saturation nonlinear energy harvesting and activation threshold |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7146341/ https://www.ncbi.nlm.nih.gov/pubmed/32183366 http://dx.doi.org/10.3390/s20061632 |
work_keys_str_mv | AT shangxiaohui secrecyperformanceanalysisofwirelesspoweredsensornetworksundersaturationnonlinearenergyharvestingandactivationthreshold AT yinhao secrecyperformanceanalysisofwirelesspoweredsensornetworksundersaturationnonlinearenergyharvestingandactivationthreshold AT wangyida secrecyperformanceanalysisofwirelesspoweredsensornetworksundersaturationnonlinearenergyharvestingandactivationthreshold AT limu secrecyperformanceanalysisofwirelesspoweredsensornetworksundersaturationnonlinearenergyharvestingandactivationthreshold AT wangyong secrecyperformanceanalysisofwirelesspoweredsensornetworksundersaturationnonlinearenergyharvestingandactivationthreshold |