SlideShare ist ein Scribd-Unternehmen logo
1 von 7
Downloaden Sie, um offline zu lesen
TELKOMNIKA Telecommunication, Computing, Electronics and Control
Vol. 18, No. 2, April 2020, pp. 1072~1078
ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, Decree No: 21/E/KPT/2018
DOI: 10.12928/TELKOMNIKA.v18i2.15857  1072
Journal homepage: http://journal.uad.ac.id/index.php/TELKOMNIKA
Physical security with power beacon assisted
in half-duplex relaying networks
over Rayleigh fading channel: performance analysis
Phu Tran Tin1
, Duy-Hung Ha2
, Luu Gia Thien3
, Tran Thanh Trang4
1
Faculty of Electronics Technology, Industrial University of Ho Chi Minh City, Vietnam
2
Wireless Communications Research Group, Faculty of Electrical and Electronics Engineering,
Ton Duc Thang University, Vietnam
3
Posts and Telecommunications Institute of Technology Ho Chi Minh City Campus, Vietnam
4
National Key Laboratory of Digital Control and System Engineering, Vietnam
Article Info ABSTRACT
Article history:
Received Jul 24, 2019
Revised Nov 19, 2019
Accepted Dec 4, 2019
In this research, we proposed and investigated physical security with power
beacon assisted in half-duplex relaying networks over a Rayleigh fading
channel. In this model, the source (S) node communicates with
the destination (D) node via the helping of the intermediate relay (R) node.
The D and R nodes harvest energy from the power beacon (PB) node
in the presence of a passive eavesdropper (E) node. Then we derived
the integral form of the system outage probability (OP) and closed form
of the intercept probability (IP). The correctness of the analytical of the OP
and IP is verified by the Monte Carlo simulation. The influence of the main
system parameters on the OP and IP also is investigated. The research results
indicated that the analytical results are the same as the simulation ones.
Keywords:
Energy harvesting (EH)
Half-duplex (HD)
Intercept probability (SP)
Monte carlo simulation
Relaying network This is an open access article under the CC BY-SA license.
Corresponding Author:
Duy-Hung Ha,
Wireless Communications Research Group
Faculty of Electrical and Electronics Engineering
Ton Duc Thang University, Ho Chi Minh City, Vietnam.
Email: haduyhung@tdtu.edu.vn
1. INTRODUCTION
Radiofrequency (RF) energy harvesting (EH) in the wireless communication network is become a
novel solution for the communication network with battery-limited devices and has attracted massive
attention in research and industrial directions. The communication network with the battery-limited devices
or devices and wireless sensors, which are working in the dangerous conditions is the main inside human
bodies object of RF EH wireless communication network application. This solution can be considered as the
main one because of carrying both energy and information of the EF, to help the battery-limited devices to
harvest energy for information transmission to the destination. This technic is called simultaneous wireless
information and power transfer (SWIPT) [1-11]. Nowadays, the physical layer security (PLS) in EH
communication cooperative relaying network is popularly studied with considerable interest. The first
concept of PLS was proposed by authors in [12, 13]. In this paper, the author proposed the secret
communication between the source and destination nodes with the presence of the eavesdropper channel.
Furthermore, the cÃŽperative jammer is used for secure the cooperative relaying network by degrading
the eavesdropper’s channel is proposed and studied in [14, 15]. In this cooperative network, the jammer not
TELKOMNIKA Telecommun Comput El Control 
Physical security with power beacon assisted in half-duplex 
 (Phu Tran Tin)
1073
only is used to degrade the eavesdropper’s channel but also is helpful for increasing the EH process
of the energy receiver in the cooperative relaying network. Moreover, a harvest-and-jam (HJ) protocol with
multi-relay and multi-node in the cooperative relaying network was proposed in [16] to improve the secrecy
rate of the energy harvesting and information transmission. Also, different secure relay beam-forming
algorithms for SWIPT were discussed in [17-20].
In this research, we proposed and investigated physical security with power beacon assisted in
half-duplex relaying networks over a Rayleigh fading channel. In this model, the source (S) node
communicates with the destination (D) node via the helping of the intermediate relay (R) node. The D and R
nodes harvest energy from the power beacon (PB) node in the presence of a passive Eavesdropper (E) node.
Then we derived the integral form of the system outage probability (OP) and closed form of the intercept
probability (IP). The correctness of the analytical of the OP and IP is verified by the Monte Carlo simulation.
The influence of the main system parameters on the OP and IP also is investigated. The research results
indicated that the analytical results are the same as the simulation ones.
2. SYSTEM MODEL
In Figure 1, the source (S) node communicates with the destination (D) node via the helping of
the intermediate relay (R) node. The D and R nodes harvest energy from the power beacon (PB) node in
the presence of a passive Eavesdropper (E) node. Figure 2 draws the energy harvesting (EH) and information
processing (IT) of the model system. In this protocol, the transmission is divided into blocks of length T,
which consists of three-time slots. In the first time slot αT (α is the time switching factor, 0<α<1), the S
and R harvest energy from the PB node. In the remaining intervals time (1-α)T/2, the source S transfers
the information to R, and R transfers information to D node [21-25].
Figure 1. System model Figure 2. Time switching protocol
2.1. Energy harvesting phase
In the first phase, the power beacon will supply the energy for both S and R nodes.
Hence, the harvested energy at the source and relay can be given as, respectively
𝐞𝑠 = 𝜂𝑃𝐵 𝛌𝑇|ℎ 𝐵𝑆|2
(1)
𝐞 𝑅 = 𝜂𝑃𝐵 𝛌𝑇|ℎ 𝐵𝑅|2
(2)
where 0 < 𝜂 ≀ 1 is energy conversion efficiency, PB is the average transmitted power at the power beacon,
and hBS, hBR are the channel gain of B-S link, B-R link, respectively. The average transmitted power at
the source and relay nodes can be obtained from (1) and (2), respectively
𝑃𝑠 =
𝐞 𝑠
(1−𝛌)𝑇/2
=
𝜂𝑃 𝐵 𝛌𝑇|ℎ 𝐵𝑆|2
(1−𝛌)𝑇/2
= 𝜅𝑃𝐵|ℎ 𝐵𝑆|2
(3)
𝑃𝑅 = 𝜅𝑃𝐵|ℎ 𝐵𝑅|2
(4)
where =
2𝜂𝛌
1−𝛌
.
2.2. Information transmission phase
In the second phase, the received signal at the relay can be rewritten as
𝑊𝑟 = ℎ 𝑆𝑅 𝑥 𝑠 + 𝑛 𝑟 (5)
 ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 2, April 2020: 1072 - 1078
1074
where hSR is the channel gain of S-R link, xs is the transmitted signal from source and nr is additive white
Gaussian noise (AWGN) with variance N0. In the third phase, the received signal at the destination can be
given by
𝑊 𝑑 = ℎ 𝑅𝐷 𝑥 𝑟 + 𝑛 𝑑 (6)
where hRD is the channel gain of R-D link, xr is the transmitted signal from relay and nd is (AWGN) with
variance N0. Here, we consider amplify and forward (AF) mode at R. Hence, the amplifying factor can be
given as
𝜒 =
𝑥 𝑟
𝑊 𝑟
= √
𝑃 𝑅
𝑃𝑠|ℎ 𝑆𝑅|2+𝑁0
(7)
substituting (7) into (6), we have
𝑊 𝑑 = ℎ 𝑅𝐷 𝜒𝑊𝑟 = ℎ 𝑅𝐷 𝜒[ℎ 𝑆𝑅 𝑥 𝑠 + 𝑛 𝑟] + 𝑛 𝑑 = ℎ 𝑆𝑅ℎ 𝑅𝐷 𝜒𝑥 𝑠⏟
𝑠𝑖𝑔𝑛𝑎𝑙
+ ℎ 𝑅𝐷 𝜒𝑛 𝑟 + 𝑛 𝑑⏟
𝑛𝑜𝑖𝑠𝑒
(8)
3. SYSTEM PERFORMANCE ANALYSIS
From (8), the end to end signal to noise ratio (SNR) of S-R-D link can be calculated as (9).
𝛟𝑆𝑅𝐷 =
𝛊{|𝑠𝑖𝑔𝑛𝑎𝑙|2}
𝛊{|𝑛𝑜𝑖𝑠𝑒|2}
=
|ℎ 𝑆𝑅|2|ℎ 𝑅𝐷|2 𝜒2 𝑃𝑠
|ℎ 𝑅𝐷|2 𝜒2 𝑁0+𝑁0
=
|ℎ 𝑆𝑅|2|ℎ 𝑅𝐷|2 𝑃𝑠
|ℎ 𝑅𝐷|2 𝑁0+
𝑁0
𝜒2
(9)
After doing some algebra and using the fact that N0<<PR, the (9) can be rewritten as (10).
𝛟𝑆𝑅𝐷 =
|ℎ 𝑆𝑅|2|ℎ 𝑅𝐷|2 𝑃𝑠 𝑃 𝑅
𝑃 𝑅|ℎ 𝑅𝐷|2 𝑁0+𝑁0 𝑃𝑠|ℎ 𝑆𝑅|2 (10)
Substituting (3) and (4) into (10), the SNR can be reformulated as (11).
𝛟𝑆𝑅𝐷 =
|ℎ 𝑆𝑅|2|ℎ 𝑅𝐷|2 𝜅𝛹|ℎ 𝐵𝑆|2|ℎ 𝐵𝑅|2
|ℎ 𝐵𝑅|2|ℎ 𝑅𝐷|2+|ℎ 𝐵𝑆|2|ℎ 𝑆𝑅|2 =
𝜅𝛹𝑋𝑌
𝑋+𝑌
(11)
Where =
𝑃 𝐵
𝑁0
, 𝑋 = |ℎ 𝐵𝑅|2|ℎ 𝑅𝐷|2
, 𝑌 = |ℎ 𝐵𝑆|2|ℎ 𝑆𝑅|2
. The received signal at the eavesdropper can be
given by
𝑊 𝐞 = ℎ 𝑅𝐞 𝑥 𝑟 + 𝑛 𝐞 (12)
where hRE is the channel gain of R-E link and nE is AWGN with variance N0. The SNR at the eavesdropper
can be expressed as
𝛟 𝐞 =
|ℎ 𝑅𝐞|2 𝑃 𝑅
𝑁0
(13)
substituting (4) into (13), we have:
𝛟 𝐞 = 𝜅𝛹|ℎ 𝐵𝑅|2|ℎ 𝑅𝐞|2
= 𝜅𝛹𝑍 (14)
Where 𝑍 = |ℎ 𝐵𝑅|2|ℎ 𝑅𝐞|2
Lemma1. Please note that all channel are the Rayleigh fading channels, so the probability density function
(PDF) of |ℎ𝑖|2
can be given by:
𝑓|ℎ 𝑖|2(𝑥) = 𝜆𝑖 𝑒−𝜆 𝑖 𝑥
(15)
where 𝑖 ∈ (𝑆𝑅, 𝑅𝐷, 𝐵𝑆, 𝐵𝑅, 𝑅𝐞). Moreover, the cumulative distribution function (CDF) of |ℎ𝑖|2
also can be
obtained by
𝐹|ℎ 𝑖|2(𝑥) = 1 − 𝑒−𝜆 𝑖 𝑥
(16)
TELKOMNIKA Telecommun Comput El Control 
Physical security with power beacon assisted in half-duplex 
 (Phu Tran Tin)
1075
where𝜆𝑖is the mean value of the exponential random variable |ℎ𝑖|2
.
Lemma 2. The CDF of 𝑋and Y can be computed as respectively
𝐹𝑋(𝑎) = ∫ 𝐹|ℎ 𝑅𝐷|2 (
𝑎
|ℎ 𝐵𝑅|2 ||ℎ 𝐵𝑅|2
= 𝑥) 𝑓|ℎ 𝐵𝑅|2(𝑥)𝑑𝑥
∞
0
(17)
𝐹𝑌(𝑏) = ∫ 𝐹|ℎ 𝑆𝑅|2 (
𝑏
|ℎ 𝐵𝑆|2 ||ℎ 𝐵𝑆|2
= 𝑊) 𝑓|ℎ 𝐵𝑆|2(𝑊)𝑑𝑊
∞
0
(18)
utilizing the result in [26], the CDF of X and Y can be shown as the below equation, respectively
𝐹𝑋(𝑎) = 1 − 2√𝜆 𝑅𝐷 𝜆 𝐵𝑅 𝑎𝐟1(2√𝜆 𝑅𝐷 𝜆 𝐵𝑅 𝑎) (19)
𝐹𝑌(𝑏) = 1 − 2√𝜆 𝑆𝑅 𝜆 𝐵𝑆 𝑏𝐟1(2√𝜆 𝑆𝑅 𝜆 𝐵𝑆 𝑏) (20)
where 𝐟𝑣(•)is the modified Bessel function of the second kind and vth
order. From (21) and (22), the PDF
of X and Y can be calculated as, respectively after applying the formula
𝜕𝐟 𝑛(𝑧)
𝜕𝑧
= −𝐟𝑛−1(𝑧) −
𝑛
𝑧
𝐟𝑛(𝑧)
𝑓𝑋(𝑎) =
𝜕𝐹 𝑋(𝑎)
𝜕𝑎
= 2√𝜆 𝑅𝐷 𝜆 𝐵𝑅 𝐟0(2√𝜆 𝑅𝐷 𝜆 𝐵𝑅 𝑎) (21)
𝑓𝑌(𝑏) =
𝜕𝐹 𝑋(𝑏)
𝜕𝑏
= 2√𝜆 𝑆𝑅 𝜆 𝐵𝑆 𝐟0(2√𝜆 𝑆𝑅 𝜆 𝐵𝑆 𝑏) (22)
3.1. Outage probability (OP)
The OP of system can be given as
𝑂𝑃 = 𝑃𝑟(𝛟𝑆𝑅𝐷 < 𝛟𝑡ℎ) (23)
where 𝛟𝑡ℎ = 22𝑅
− 1 is the threshold of system and R is source rate. Substituting (11) into (23), we have
𝑂𝑃 = 𝑃𝑟 (
𝜅𝛹𝑋𝑌
𝑋+𝑌
< 𝛟𝑡ℎ) = 𝑃𝑟(𝑋[𝜅𝛹𝑌 − 𝛟𝑡ℎ] < 𝛟𝑡ℎ 𝑌)
= {
𝑃𝑟 (𝑋 <
𝛟 𝑡ℎ 𝑌
𝜅𝛹𝑌−𝛟 𝑡ℎ
) , 𝑌 >
𝛟 𝑡ℎ
𝜅𝛹
1, 𝑌 ≀
𝛟 𝑡ℎ
𝜅𝛹
= ∫ 𝑓𝑌(𝑊)𝑑𝑊
𝛟 𝑡ℎ
𝜅𝛹
0
+ ∫ 𝐹𝑋
∞
𝛟 𝑡ℎ
𝜅𝛹
(
𝛟 𝑡ℎ 𝑌
𝜅𝛹𝑌−𝛟 𝑡ℎ
|𝑌 = 𝑊) × 𝑓𝑌(𝑊)𝑑𝑊 (24)
Applying (19-22), (24) can be rewritten as (25).
𝑂𝑃 = ∫ 2√𝜆 𝑆𝑅 𝜆 𝐵𝑆 𝐟0(2√𝜆 𝑆𝑅 𝜆 𝐵𝑆 𝑊)𝑑𝑊
∞
0
− 4 ∫
√𝜆 𝑆𝑅 𝜆 𝐵𝑆 𝜆 𝑅𝐷 𝜆 𝐵𝑅 [
𝛟𝑡ℎ 𝑊
𝜅𝛹𝑊−𝛟𝑡ℎ
] ×
𝐟0(2√𝜆 𝑆𝑅 𝜆 𝐵𝑆 𝑊)𝐟1 (2√𝜆 𝑅𝐷 𝜆 𝐵𝑅 [
𝛟𝑡ℎ 𝑊
𝜅𝛹𝑊−𝛟𝑡ℎ
]) 𝑑𝑊
∞
𝛟 𝑡ℎ
𝜅𝛹
(25)
By changing the variable for the first term of (25): 𝑡 = 2√𝜆 𝑆𝑅 𝜆 𝐵𝑆 𝑊.
𝑂𝑃 =
1
√𝜆 𝑆𝑅 𝜆 𝐵𝑆
∫ 𝑡 × 𝐟0(𝑡)𝑑𝑡
∞
0
− 4 ∫
√𝜆 𝑆𝑅 𝜆 𝐵𝑆 𝜆 𝑅𝐷 𝜆 𝐵𝑅 [
𝛟 𝑡ℎ 𝑊
𝜅𝛹𝑊−𝛟 𝑡ℎ
] ×
𝐟0(2√𝜆 𝑆𝑅 𝜆 𝐵𝑆 𝑊)𝐟1 (2√𝜆 𝑅𝐷 𝜆 𝐵𝑅 [
𝛟 𝑡ℎ 𝑊
𝜅𝛹𝑊−𝛟 𝑡ℎ
]) 𝑑𝑊
∞
𝛟 𝑡ℎ
𝜅𝛹
(26)
Apply (6.561, 16) of the table of integral, (26) can be reformulated as
𝑂𝑃 =
1
√𝜆 𝑆𝑅 𝜆 𝐵𝑆
− 4 ∫
√𝜆 𝑆𝑅 𝜆 𝐵𝑆 𝜆 𝑅𝐷 𝜆 𝐵𝑅 [
𝛟 𝑡ℎ 𝑊
𝜅𝛹𝑊−𝛟 𝑡ℎ
] ×
𝐟0(2√𝜆 𝑆𝑅 𝜆 𝐵𝑆 𝑊)𝐟1 (2√𝜆 𝑅𝐷 𝜆 𝐵𝑅 [
𝛟 𝑡ℎ 𝑊
𝜅𝛹𝑊−𝛟 𝑡ℎ
]) 𝑑𝑊
∞
𝛟 𝑡ℎ
𝜅𝛹
(27)
 ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 2, April 2020: 1072 - 1078
1076
3.2. Intercept probability (IP)
The IP can be defined by
𝐌𝑃 = 𝑃𝑟(𝛟 𝐞 ≥ 𝛟𝑡ℎ) (28)
substituting (14) into (28) and then applying formulas in (19) or (20), finally we have:
𝐌𝑃 = 𝑃𝑟(𝜅𝛹𝑍 ≥ 𝛟𝑡ℎ) = 1 − 𝑃𝑟 (𝑍 <
𝛟 𝑡ℎ
𝜅𝛹
) = 2√
𝜆 𝐵𝑅 𝜆 𝑅𝐞 𝛟 𝑡ℎ
𝜅𝛹
× 𝐟1 (2√
𝜆 𝐵𝑅 𝜆 𝑅𝐞 𝛟 𝑡ℎ
𝜅𝛹
) (29)
4. NUMERICAL RESULTS AND DISCUSSION
The influence of η on the OP and IP is plotted in Figure 3 and Figure 4 for various values of ψ. Here
we set α = 0.5, R = 0.5 bps/Hz and ψ = 1, 5, 10 dB. The first observation one can see from these results is
that the analytical match very well with the simulation results. Figure 5 and Figure 6 illustrated the optimal
switching time system OP and IP versus ψ for η = 0.8, R=0.5 bps/Hz, and α = 0.25, 0.5, 0.85 respectively.
It should be pointed out that the simulation and analytical results are the same.
Figure 3. IP versus η
Figure 4. OP versus η
TELKOMNIKA Telecommun Comput El Control 
Physical security with power beacon assisted in half-duplex 
 (Phu Tran Tin)
1077
Figure 5. IP versus ψ
Figure 6. OP versus ψ
5. CONCLUSION
In this research, we proposed and investigated physical security with power beacon assisted in half-
duplex relaying networks over a Rayleigh fading channel. In this model, the source (S) node communicates
with the destination (D) node via the helping of the intermediate relay (R) node. The D and R nodes harvest
energy from the power beacon (PB) node in the presence of a passive Eavesdropper (E) node. Then we
derived the integral form of the system outage probability (OP) and closed form of the intercept probability
(IP). The correctness of the analytical of the OP and IP is verified by the Monte Carlo simulation.
The influence of the main system parameters on the OP and IP also is investigated. The research results
indicated that the analytical results are the same as the simulation ones.
ACKNOWLEDGMENTS
This research was supported by National Key Laboratory of Digital Control and System
Engineering (DCSELAB), HCMUT, VNU-HCM, Vietnam.
 ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 2, April 2020: 1072 - 1078
1078
REFERENCES
[1] Bi, S., Ho, C. K., and Zhang, R., “Wireless powered communication: Opportunities and challenges,” IEEE
Communications Magazine, vol. 53, pp. 117-125, 2015.
[2] Niyato, D., Kim, D. I., Maso, M., and Han, Z., “Wireless Powered Communication Networks: Research Directions
and Technological Approaches,” IEEE Wireless Communications, pp. 2-11, 2017.
[3] Yu, H., Lee, H., and Jeon, H., “What is 5G? Emerging 5G Mobile Services and Network Requirements,”
Sustainability, vol. 9, no. 10, p. 1848-1869, 2017.
[4] Duarte, Melissa, Chris Dick, and Ashutosh Sabharwal, “Experiment-Driven Characterization of Full-Duplex
Wireless Systems,” IEEE Transactions on Wireless Communications, vol. 12, pp. 4296-307, 2012.
[5] Lee, W. C. Y., “The Most Spectrum-efficient Duplexing System: CDD,” IEEE Communications Magazine, vol. 40,
pp. 163-66, 2012.
[6] Wang, Cheng-Xiang, Fourat Haider, Xiqi Gao, Xiao-Hu You, Yang Yang, Dongfeng Yuan, Hadi Aggoune, Harald
Haas, Simon Fletcher, and Erol Hepsaydir, “Cellular Architecture and Key Technologies for 5G Wireless
Communication Networks,” IEEE Communications Magazine, vol. 52, pp. 122-130, 2014.
[7] Ding, Zhiguo, Pingzhi Fan, and H. Vincent Poor, “Impact of User Pairing on 5G Nonorthogonal Multiple-Access
Downlink Transmissions,” IEEE Transactions on Vehicular Technology, vol. 65, no. 8, 2016.
[8] Tan N. Nguyen, T.H.Q. Minh, Phuong T. Tran, Miroslav Voznak, T.T. Duy, Thanh-Long Nguyen and Phu Tran
Tin, “Performance Enhancement for Energy Harvesting Based Two-Way Relay Protocols in Wireless Ad-hoc
Networks with Partial and Full Relay Selection Methods,” Ad hoc networks, vol. 84, pp. 178-187, 2019.
[9] Tan N. Nguyen, T.H.Q. Minh, Phuong T. Tran, and Miroslav Voznak, “Energy Harvesting over Rician Fading
Channel: A Performance Analysis for Half-Duplex Bidirectional Sensor Networks under Hardware Impairments,”
Sensors, vol. 18, no. 6, 2018.
[10] Tan N. Nguyen, T.H.Q. Minh, Phuong T. Tran, and Miroslav Voznak, “Adaptive Energy Harvesting Relaying
Protocol for Two-Way Half Duplex System Network over Rician Fading Channel,” Wireless Communications and
Mobile Computing, vol. 2018, 2018.
[11] Bhatnagar, M. R., “On the Capacity of Decode-and-Forward Relaying over Rician Fading Channels,” IEEE
Communications Letters, vol. 17, pp. 1100-1103, 2013.
[12] Salem, Abdelhamid, Khairi Ashour Hamdi, and Khaled M. Rabie, “Physical Layer Security with RF Energy
Harvesting in AF Multi-Antenna Relaying Networks,” IEEE Transactions on Communications, vol. 64, no. 7,
pp. 3025-038, 2016.
[13] Wyner, A. D., “The Wire-Tap Channel,” Bell System Technical Journal, vol. 54, no. 8, pp. 1355-387, 1975.
[14] Zhang, Qi, Xiaobin Huang, Quanzhong Li, and Jiayin Qin, “Cooperative Jamming Aided Robust Secure
Transmission for Wireless Information and Power Transfer in MISO Channels,” IEEE Transactions on
Communications, vol. 63, no. 3, pp. 906-915, 2015.
[15] Xing, Hong, Liang Liu, and Rui Zhang, “Secrecy Wireless Information and Power Transfer in Fading Wiretap
Channel,” IEEE Transactions on Vehicular Technology, vol. 65, no. 1, pp. 180-190, 2016.
[16] Xing, Hong, Zheng Chu, Zhiguo Ding, and Arumugam Nallanathan, “Harvest-and-jam: Improving Security for
Wireless Energy Harvesting Cooperative Networks,” 2014 IEEE Global Communications Conference, 2014.
[17] Li, Quanzhong, Qi Zhang, and Jiayin Qin, “Secure Relay Beamforming for Simultaneous Wireless Information and
Power Transfer in Nonregenerative Relay Networks,” IEEE Transactions on Vehicular Technology, vol. 63, no. 5,
pp. 2462-467, 2014.
[18] Ding, Zhiguo, Kin K. Leung, Dennis L. Goeckel, and Don Towsley, “Opportunistic Relaying for Secrecy
Communications: Cooperative Jamming vs. Relay Chatting,” IEEE Transactions on Wireless Communications,
vol. 10, no. 6, pp. 1725-729, 2011.
[19] Zhao, Rui, Yongming Huang, Wei Wang, and Vincent K. N. Lau, “Ergodic Achievable Secrecy Rate of
Multiple-Antenna Relay Systems with Cooperative Jamming,” IEEE Transactions on Wireless Communications,
vol. 15, no. 4, pp. 2537-551, 2016.
[20] Krikidis, Ioannis, A. Suraweera, Peter J. Smith, and Chau Yuen, “Full-Duplex Relay Selection for Amplify-and-
Forward Cooperative Networks,” IEEE Transactions on Wireless Communications, vol. 11, pp. 4381-393, 2012.
[21] S. Luo, R. Zhang, and T. J. Lim, “Optimal save-then-transmit protocol for energy harvesting wireless transmitters,”
IEEE Transactions on Wireless Communications, vol. 13, no. 3, pp. 1196-1207, 2013.
[22] Suraweera, H., G. Karagiannidis, and P. Smith, “Performance Analysis of the Dual-hop Asymmetric Fading
Channel,” IEEE Transactions on Wireless Communications, vol. 8, pp. 2783-788, 2009.
[23] Tin, Phu Tran, Tran Hoang Quang Minh, Tan N. Nguyen, and Miroslav Voznak, “System Performance Analysis of
Half-Duplex Relay Network over Rician Fading Channel,” Telecommunication Computing Electronics and Control
TELKOMNIKA Telecommunication Computing Electronics and Control, vol. 16, no. 1, pp. 189-199, 2018.
[24] Rashid, Tarique, Sunil Kumar, Akshay Verma, Prateek Raj Gautam, and Arvind Kumar, “Pm-EEMRP: Postural
Movement Based Energy Efficient Multi-hop Routing Protocol for Intra Wireless Body Sensor Network
(Intra-WBSN),” TELKOMNIKA Telecommunication Computing Electronics and Control, vol. 16, no. 1, 2018.
[25] A. F. Morabito, “Power Synthesis of Mask-Constrained Shaped Beams Through Maximally-Sparse Planar Arrays,”
TELKOMNIKA Telecommunication Computing Electronics and Control, vol. 14, no. 4, pp. 1217-1219, 2016.
[26] C. Zhong, S. Jin, K.-K. Wong, and M. R. Mckay, “Ergodic Mutual Information Analysis for Multi-Keyhole MIMO
Channels,” IEEE Transactions on Wireless Communications, vol. 10, no. 6, pp. 1754–1763, 2011.

Weitere Àhnliche Inhalte

Was ist angesagt?

All optical network design with even and odd nodes
All optical network design with even and odd nodesAll optical network design with even and odd nodes
All optical network design with even and odd nodes
eSAT Journals
 
PhD Summary (isprateno)
PhD Summary (isprateno)PhD Summary (isprateno)
PhD Summary (isprateno)
Jovan Stosic
 

Was ist angesagt? (20)

Outage performance of underlay cognitive radio networks over mix fading envir...
Outage performance of underlay cognitive radio networks over mix fading envir...Outage performance of underlay cognitive radio networks over mix fading envir...
Outage performance of underlay cognitive radio networks over mix fading envir...
 
Physical security layer with friendly jammer in half-duplex relaying networks...
Physical security layer with friendly jammer in half-duplex relaying networks...Physical security layer with friendly jammer in half-duplex relaying networks...
Physical security layer with friendly jammer in half-duplex relaying networks...
 
Performance analysis for power-splitting energy harvesting based two-way full...
Performance analysis for power-splitting energy harvesting based two-way full...Performance analysis for power-splitting energy harvesting based two-way full...
Performance analysis for power-splitting energy harvesting based two-way full...
 
Wideband Multi-Port Reflectometer as an Alternative in Reflection Coefficient...
Wideband Multi-Port Reflectometer as an Alternative in Reflection Coefficient...Wideband Multi-Port Reflectometer as an Alternative in Reflection Coefficient...
Wideband Multi-Port Reflectometer as an Alternative in Reflection Coefficient...
 
All optical network design with even and odd nodes
All optical network design with even and odd nodesAll optical network design with even and odd nodes
All optical network design with even and odd nodes
 
PhD Summary (isprateno)
PhD Summary (isprateno)PhD Summary (isprateno)
PhD Summary (isprateno)
 
Performance analysis of adaptive filter channel estimated MIMO OFDM communica...
Performance analysis of adaptive filter channel estimated MIMO OFDM communica...Performance analysis of adaptive filter channel estimated MIMO OFDM communica...
Performance analysis of adaptive filter channel estimated MIMO OFDM communica...
 
Performance Comparison of Modified Variable Step Size Leaky LMS Algorithm for...
Performance Comparison of Modified Variable Step Size Leaky LMS Algorithm for...Performance Comparison of Modified Variable Step Size Leaky LMS Algorithm for...
Performance Comparison of Modified Variable Step Size Leaky LMS Algorithm for...
 
40120140501015
4012014050101540120140501015
40120140501015
 
MODIFIED LLL ALGORITHM WITH SHIFTED START COLUMN FOR COMPLEXITY REDUCTION
MODIFIED LLL ALGORITHM WITH SHIFTED START COLUMN FOR COMPLEXITY REDUCTIONMODIFIED LLL ALGORITHM WITH SHIFTED START COLUMN FOR COMPLEXITY REDUCTION
MODIFIED LLL ALGORITHM WITH SHIFTED START COLUMN FOR COMPLEXITY REDUCTION
 
Evaluation of channel estimation combined with ICI self-cancellation scheme i...
Evaluation of channel estimation combined with ICI self-cancellation scheme i...Evaluation of channel estimation combined with ICI self-cancellation scheme i...
Evaluation of channel estimation combined with ICI self-cancellation scheme i...
 
A SEMI BLIND CHANNEL ESTIMATION METHOD BASED ON HYBRID NEURAL NETWORKS FOR UP...
A SEMI BLIND CHANNEL ESTIMATION METHOD BASED ON HYBRID NEURAL NETWORKS FOR UP...A SEMI BLIND CHANNEL ESTIMATION METHOD BASED ON HYBRID NEURAL NETWORKS FOR UP...
A SEMI BLIND CHANNEL ESTIMATION METHOD BASED ON HYBRID NEURAL NETWORKS FOR UP...
 
F43063841
F43063841F43063841
F43063841
 
EVALUATION OF MIMO SYSTEM CAPACITY OVER RAYLEIGH FADING CHANNEL
EVALUATION OF MIMO SYSTEM CAPACITY OVER RAYLEIGH FADING CHANNELEVALUATION OF MIMO SYSTEM CAPACITY OVER RAYLEIGH FADING CHANNEL
EVALUATION OF MIMO SYSTEM CAPACITY OVER RAYLEIGH FADING CHANNEL
 
Intercept probability analysis in DF time switching full-duplex relaying netw...
Intercept probability analysis in DF time switching full-duplex relaying netw...Intercept probability analysis in DF time switching full-duplex relaying netw...
Intercept probability analysis in DF time switching full-duplex relaying netw...
 
Reduction of PAPR and Efficient detection ordering scheme for MIMO Transmissi...
Reduction of PAPR and Efficient detection ordering scheme for MIMO Transmissi...Reduction of PAPR and Efficient detection ordering scheme for MIMO Transmissi...
Reduction of PAPR and Efficient detection ordering scheme for MIMO Transmissi...
 
Analysis of Space Time Codes Using Modulation Techniques
Analysis of Space Time Codes Using Modulation TechniquesAnalysis of Space Time Codes Using Modulation Techniques
Analysis of Space Time Codes Using Modulation Techniques
 
Lantiq/Intel Contributions to G.fast at Scientific Conferences
Lantiq/Intel Contributions to G.fast at Scientific ConferencesLantiq/Intel Contributions to G.fast at Scientific Conferences
Lantiq/Intel Contributions to G.fast at Scientific Conferences
 
performance analysis of MUSIC and ESPRIT DOA estimation used in adaptive arra...
performance analysis of MUSIC and ESPRIT DOA estimation used in adaptive arra...performance analysis of MUSIC and ESPRIT DOA estimation used in adaptive arra...
performance analysis of MUSIC and ESPRIT DOA estimation used in adaptive arra...
 
MIMO Communications
MIMO CommunicationsMIMO Communications
MIMO Communications
 

Ähnlich wie Physical security with power beacon assisted in half-duplex relaying networks over Rayleigh fading channel: performance analysis

Ähnlich wie Physical security with power beacon assisted in half-duplex relaying networks over Rayleigh fading channel: performance analysis (20)

Hybrid decode-amplify and forward protocol of FD EH relaying network: outage ...
Hybrid decode-amplify and forward protocol of FD EH relaying network: outage ...Hybrid decode-amplify and forward protocol of FD EH relaying network: outage ...
Hybrid decode-amplify and forward protocol of FD EH relaying network: outage ...
 
Physical layer security in DF full-duplex relaying network: performance analysis
Physical layer security in DF full-duplex relaying network: performance analysisPhysical layer security in DF full-duplex relaying network: performance analysis
Physical layer security in DF full-duplex relaying network: performance analysis
 
Outage performance analysis of non-orthogonal multiple access systems with RF...
Outage performance analysis of non-orthogonal multiple access systems with RF...Outage performance analysis of non-orthogonal multiple access systems with RF...
Outage performance analysis of non-orthogonal multiple access systems with RF...
 
User selection protocols in FD PSP EH cooperative network over rayleigh fadin...
User selection protocols in FD PSP EH cooperative network over rayleigh fadin...User selection protocols in FD PSP EH cooperative network over rayleigh fadin...
User selection protocols in FD PSP EH cooperative network over rayleigh fadin...
 
Hybrid Time-power Switching Protocol of Energy Harvesting Bidirectional Relay...
Hybrid Time-power Switching Protocol of Energy Harvesting Bidirectional Relay...Hybrid Time-power Switching Protocol of Energy Harvesting Bidirectional Relay...
Hybrid Time-power Switching Protocol of Energy Harvesting Bidirectional Relay...
 
Performance enhancement of wireless sensor network by using non-orthogonal mu...
Performance enhancement of wireless sensor network by using non-orthogonal mu...Performance enhancement of wireless sensor network by using non-orthogonal mu...
Performance enhancement of wireless sensor network by using non-orthogonal mu...
 
Outage probability analysis of EH NOMA system network over Rayleigh fading ch...
Outage probability analysis of EH NOMA system network over Rayleigh fading ch...Outage probability analysis of EH NOMA system network over Rayleigh fading ch...
Outage probability analysis of EH NOMA system network over Rayleigh fading ch...
 
Hybrid TSR-PSR in nonlinear EH half duplex network: system performance analy...
Hybrid TSR-PSR in nonlinear EH half duplex  network: system performance analy...Hybrid TSR-PSR in nonlinear EH half duplex  network: system performance analy...
Hybrid TSR-PSR in nonlinear EH half duplex network: system performance analy...
 
Investigation on energy harvesting enabled device-to-device networks in prese...
Investigation on energy harvesting enabled device-to-device networks in prese...Investigation on energy harvesting enabled device-to-device networks in prese...
Investigation on energy harvesting enabled device-to-device networks in prese...
 
Studying strictly positive secure capacity in cognitive radio-based non-ortho...
Studying strictly positive secure capacity in cognitive radio-based non-ortho...Studying strictly positive secure capacity in cognitive radio-based non-ortho...
Studying strictly positive secure capacity in cognitive radio-based non-ortho...
 
Secure outage probability of cognitive radio network relying non-orthogonal m...
Secure outage probability of cognitive radio network relying non-orthogonal m...Secure outage probability of cognitive radio network relying non-orthogonal m...
Secure outage probability of cognitive radio network relying non-orthogonal m...
 
5. 23769.pdf
5. 23769.pdf5. 23769.pdf
5. 23769.pdf
 
Exploiting Outage Performance of Wireless Powered NOMA
Exploiting Outage Performance of Wireless Powered NOMAExploiting Outage Performance of Wireless Powered NOMA
Exploiting Outage Performance of Wireless Powered NOMA
 
System Performance Analysis of Half-Duplex Relay Network over Rician Fading C...
System Performance Analysis of Half-Duplex Relay Network over Rician Fading C...System Performance Analysis of Half-Duplex Relay Network over Rician Fading C...
System Performance Analysis of Half-Duplex Relay Network over Rician Fading C...
 
Study on outage performance gap of two destinations on CR-NOMA network
Study on outage performance gap of two destinations on CR-NOMA networkStudy on outage performance gap of two destinations on CR-NOMA network
Study on outage performance gap of two destinations on CR-NOMA network
 
Throughput analysis of non-orthogonal multiple access and orthogonal multipl...
Throughput analysis of non-orthogonal multiple access and  orthogonal multipl...Throughput analysis of non-orthogonal multiple access and  orthogonal multipl...
Throughput analysis of non-orthogonal multiple access and orthogonal multipl...
 
Adaptive relaying protocol for wireless energy harvesting and information pro...
Adaptive relaying protocol for wireless energy harvesting and information pro...Adaptive relaying protocol for wireless energy harvesting and information pro...
Adaptive relaying protocol for wireless energy harvesting and information pro...
 
COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...
COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...
COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...
 
Performance Analysis of Differential Beamforming in Decentralized Networks
Performance Analysis of Differential Beamforming in Decentralized NetworksPerformance Analysis of Differential Beamforming in Decentralized Networks
Performance Analysis of Differential Beamforming in Decentralized Networks
 
Cooperative underlay cognitive radio assisted NOMA: secondary network improve...
Cooperative underlay cognitive radio assisted NOMA: secondary network improve...Cooperative underlay cognitive radio assisted NOMA: secondary network improve...
Cooperative underlay cognitive radio assisted NOMA: secondary network improve...
 

Mehr von TELKOMNIKA JOURNAL

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...
TELKOMNIKA JOURNAL
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
TELKOMNIKA JOURNAL
 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
TELKOMNIKA JOURNAL
 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imaging
TELKOMNIKA JOURNAL
 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
TELKOMNIKA JOURNAL
 

Mehr von TELKOMNIKA JOURNAL (20)

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...
 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...
 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...
 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antenna
 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fire
 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio network
 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bands
 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...
 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertainties
 
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...
 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensor
 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...
 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networks
 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imaging
 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
 

KÃŒrzlich hochgeladen

Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
jaanualu31
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 

KÃŒrzlich hochgeladen (20)

Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksLearn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic Marks
 
Rums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfRums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdf
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 

Physical security with power beacon assisted in half-duplex relaying networks over Rayleigh fading channel: performance analysis

  • 1. TELKOMNIKA Telecommunication, Computing, Electronics and Control Vol. 18, No. 2, April 2020, pp. 1072~1078 ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, Decree No: 21/E/KPT/2018 DOI: 10.12928/TELKOMNIKA.v18i2.15857  1072 Journal homepage: http://journal.uad.ac.id/index.php/TELKOMNIKA Physical security with power beacon assisted in half-duplex relaying networks over Rayleigh fading channel: performance analysis Phu Tran Tin1 , Duy-Hung Ha2 , Luu Gia Thien3 , Tran Thanh Trang4 1 Faculty of Electronics Technology, Industrial University of Ho Chi Minh City, Vietnam 2 Wireless Communications Research Group, Faculty of Electrical and Electronics Engineering, Ton Duc Thang University, Vietnam 3 Posts and Telecommunications Institute of Technology Ho Chi Minh City Campus, Vietnam 4 National Key Laboratory of Digital Control and System Engineering, Vietnam Article Info ABSTRACT Article history: Received Jul 24, 2019 Revised Nov 19, 2019 Accepted Dec 4, 2019 In this research, we proposed and investigated physical security with power beacon assisted in half-duplex relaying networks over a Rayleigh fading channel. In this model, the source (S) node communicates with the destination (D) node via the helping of the intermediate relay (R) node. The D and R nodes harvest energy from the power beacon (PB) node in the presence of a passive eavesdropper (E) node. Then we derived the integral form of the system outage probability (OP) and closed form of the intercept probability (IP). The correctness of the analytical of the OP and IP is verified by the Monte Carlo simulation. The influence of the main system parameters on the OP and IP also is investigated. The research results indicated that the analytical results are the same as the simulation ones. Keywords: Energy harvesting (EH) Half-duplex (HD) Intercept probability (SP) Monte carlo simulation Relaying network This is an open access article under the CC BY-SA license. Corresponding Author: Duy-Hung Ha, Wireless Communications Research Group Faculty of Electrical and Electronics Engineering Ton Duc Thang University, Ho Chi Minh City, Vietnam. Email: haduyhung@tdtu.edu.vn 1. INTRODUCTION Radiofrequency (RF) energy harvesting (EH) in the wireless communication network is become a novel solution for the communication network with battery-limited devices and has attracted massive attention in research and industrial directions. The communication network with the battery-limited devices or devices and wireless sensors, which are working in the dangerous conditions is the main inside human bodies object of RF EH wireless communication network application. This solution can be considered as the main one because of carrying both energy and information of the EF, to help the battery-limited devices to harvest energy for information transmission to the destination. This technic is called simultaneous wireless information and power transfer (SWIPT) [1-11]. Nowadays, the physical layer security (PLS) in EH communication cooperative relaying network is popularly studied with considerable interest. The first concept of PLS was proposed by authors in [12, 13]. In this paper, the author proposed the secret communication between the source and destination nodes with the presence of the eavesdropper channel. Furthermore, the cÃŽperative jammer is used for secure the cooperative relaying network by degrading the eavesdropper’s channel is proposed and studied in [14, 15]. In this cooperative network, the jammer not
  • 2. TELKOMNIKA Telecommun Comput El Control  Physical security with power beacon assisted in half-duplex 
 (Phu Tran Tin) 1073 only is used to degrade the eavesdropper’s channel but also is helpful for increasing the EH process of the energy receiver in the cooperative relaying network. Moreover, a harvest-and-jam (HJ) protocol with multi-relay and multi-node in the cooperative relaying network was proposed in [16] to improve the secrecy rate of the energy harvesting and information transmission. Also, different secure relay beam-forming algorithms for SWIPT were discussed in [17-20]. In this research, we proposed and investigated physical security with power beacon assisted in half-duplex relaying networks over a Rayleigh fading channel. In this model, the source (S) node communicates with the destination (D) node via the helping of the intermediate relay (R) node. The D and R nodes harvest energy from the power beacon (PB) node in the presence of a passive Eavesdropper (E) node. Then we derived the integral form of the system outage probability (OP) and closed form of the intercept probability (IP). The correctness of the analytical of the OP and IP is verified by the Monte Carlo simulation. The influence of the main system parameters on the OP and IP also is investigated. The research results indicated that the analytical results are the same as the simulation ones. 2. SYSTEM MODEL In Figure 1, the source (S) node communicates with the destination (D) node via the helping of the intermediate relay (R) node. The D and R nodes harvest energy from the power beacon (PB) node in the presence of a passive Eavesdropper (E) node. Figure 2 draws the energy harvesting (EH) and information processing (IT) of the model system. In this protocol, the transmission is divided into blocks of length T, which consists of three-time slots. In the first time slot αT (α is the time switching factor, 0<α<1), the S and R harvest energy from the PB node. In the remaining intervals time (1-α)T/2, the source S transfers the information to R, and R transfers information to D node [21-25]. Figure 1. System model Figure 2. Time switching protocol 2.1. Energy harvesting phase In the first phase, the power beacon will supply the energy for both S and R nodes. Hence, the harvested energy at the source and relay can be given as, respectively 𝐞𝑠 = 𝜂𝑃𝐵 𝛌𝑇|ℎ 𝐵𝑆|2 (1) 𝐞 𝑅 = 𝜂𝑃𝐵 𝛌𝑇|ℎ 𝐵𝑅|2 (2) where 0 < 𝜂 ≀ 1 is energy conversion efficiency, PB is the average transmitted power at the power beacon, and hBS, hBR are the channel gain of B-S link, B-R link, respectively. The average transmitted power at the source and relay nodes can be obtained from (1) and (2), respectively 𝑃𝑠 = 𝐞 𝑠 (1−𝛌)𝑇/2 = 𝜂𝑃 𝐵 𝛌𝑇|ℎ 𝐵𝑆|2 (1−𝛌)𝑇/2 = 𝜅𝑃𝐵|ℎ 𝐵𝑆|2 (3) 𝑃𝑅 = 𝜅𝑃𝐵|ℎ 𝐵𝑅|2 (4) where = 2𝜂𝛌 1−𝛌 . 2.2. Information transmission phase In the second phase, the received signal at the relay can be rewritten as 𝑊𝑟 = ℎ 𝑆𝑅 𝑥 𝑠 + 𝑛 𝑟 (5)
  • 3.  ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 2, April 2020: 1072 - 1078 1074 where hSR is the channel gain of S-R link, xs is the transmitted signal from source and nr is additive white Gaussian noise (AWGN) with variance N0. In the third phase, the received signal at the destination can be given by 𝑊 𝑑 = ℎ 𝑅𝐷 𝑥 𝑟 + 𝑛 𝑑 (6) where hRD is the channel gain of R-D link, xr is the transmitted signal from relay and nd is (AWGN) with variance N0. Here, we consider amplify and forward (AF) mode at R. Hence, the amplifying factor can be given as 𝜒 = 𝑥 𝑟 𝑊 𝑟 = √ 𝑃 𝑅 𝑃𝑠|ℎ 𝑆𝑅|2+𝑁0 (7) substituting (7) into (6), we have 𝑊 𝑑 = ℎ 𝑅𝐷 𝜒𝑊𝑟 = ℎ 𝑅𝐷 𝜒[ℎ 𝑆𝑅 𝑥 𝑠 + 𝑛 𝑟] + 𝑛 𝑑 = ℎ 𝑆𝑅ℎ 𝑅𝐷 𝜒𝑥 𝑠⏟ 𝑠𝑖𝑔𝑛𝑎𝑙 + ℎ 𝑅𝐷 𝜒𝑛 𝑟 + 𝑛 𝑑⏟ 𝑛𝑜𝑖𝑠𝑒 (8) 3. SYSTEM PERFORMANCE ANALYSIS From (8), the end to end signal to noise ratio (SNR) of S-R-D link can be calculated as (9). 𝛟𝑆𝑅𝐷 = 𝛊{|𝑠𝑖𝑔𝑛𝑎𝑙|2} 𝛊{|𝑛𝑜𝑖𝑠𝑒|2} = |ℎ 𝑆𝑅|2|ℎ 𝑅𝐷|2 𝜒2 𝑃𝑠 |ℎ 𝑅𝐷|2 𝜒2 𝑁0+𝑁0 = |ℎ 𝑆𝑅|2|ℎ 𝑅𝐷|2 𝑃𝑠 |ℎ 𝑅𝐷|2 𝑁0+ 𝑁0 𝜒2 (9) After doing some algebra and using the fact that N0<<PR, the (9) can be rewritten as (10). 𝛟𝑆𝑅𝐷 = |ℎ 𝑆𝑅|2|ℎ 𝑅𝐷|2 𝑃𝑠 𝑃 𝑅 𝑃 𝑅|ℎ 𝑅𝐷|2 𝑁0+𝑁0 𝑃𝑠|ℎ 𝑆𝑅|2 (10) Substituting (3) and (4) into (10), the SNR can be reformulated as (11). 𝛟𝑆𝑅𝐷 = |ℎ 𝑆𝑅|2|ℎ 𝑅𝐷|2 𝜅𝛹|ℎ 𝐵𝑆|2|ℎ 𝐵𝑅|2 |ℎ 𝐵𝑅|2|ℎ 𝑅𝐷|2+|ℎ 𝐵𝑆|2|ℎ 𝑆𝑅|2 = 𝜅𝛹𝑋𝑌 𝑋+𝑌 (11) Where = 𝑃 𝐵 𝑁0 , 𝑋 = |ℎ 𝐵𝑅|2|ℎ 𝑅𝐷|2 , 𝑌 = |ℎ 𝐵𝑆|2|ℎ 𝑆𝑅|2 . The received signal at the eavesdropper can be given by 𝑊 𝐞 = ℎ 𝑅𝐞 𝑥 𝑟 + 𝑛 𝐞 (12) where hRE is the channel gain of R-E link and nE is AWGN with variance N0. The SNR at the eavesdropper can be expressed as 𝛟 𝐞 = |ℎ 𝑅𝐞|2 𝑃 𝑅 𝑁0 (13) substituting (4) into (13), we have: 𝛟 𝐞 = 𝜅𝛹|ℎ 𝐵𝑅|2|ℎ 𝑅𝐞|2 = 𝜅𝛹𝑍 (14) Where 𝑍 = |ℎ 𝐵𝑅|2|ℎ 𝑅𝐞|2 Lemma1. Please note that all channel are the Rayleigh fading channels, so the probability density function (PDF) of |ℎ𝑖|2 can be given by: 𝑓|ℎ 𝑖|2(𝑥) = 𝜆𝑖 𝑒−𝜆 𝑖 𝑥 (15) where 𝑖 ∈ (𝑆𝑅, 𝑅𝐷, 𝐵𝑆, 𝐵𝑅, 𝑅𝐞). Moreover, the cumulative distribution function (CDF) of |ℎ𝑖|2 also can be obtained by 𝐹|ℎ 𝑖|2(𝑥) = 1 − 𝑒−𝜆 𝑖 𝑥 (16)
  • 4. TELKOMNIKA Telecommun Comput El Control  Physical security with power beacon assisted in half-duplex 
 (Phu Tran Tin) 1075 where𝜆𝑖is the mean value of the exponential random variable |ℎ𝑖|2 . Lemma 2. The CDF of 𝑋and Y can be computed as respectively 𝐹𝑋(𝑎) = ∫ 𝐹|ℎ 𝑅𝐷|2 ( 𝑎 |ℎ 𝐵𝑅|2 ||ℎ 𝐵𝑅|2 = 𝑥) 𝑓|ℎ 𝐵𝑅|2(𝑥)𝑑𝑥 ∞ 0 (17) 𝐹𝑌(𝑏) = ∫ 𝐹|ℎ 𝑆𝑅|2 ( 𝑏 |ℎ 𝐵𝑆|2 ||ℎ 𝐵𝑆|2 = 𝑊) 𝑓|ℎ 𝐵𝑆|2(𝑊)𝑑𝑊 ∞ 0 (18) utilizing the result in [26], the CDF of X and Y can be shown as the below equation, respectively 𝐹𝑋(𝑎) = 1 − 2√𝜆 𝑅𝐷 𝜆 𝐵𝑅 𝑎𝐟1(2√𝜆 𝑅𝐷 𝜆 𝐵𝑅 𝑎) (19) 𝐹𝑌(𝑏) = 1 − 2√𝜆 𝑆𝑅 𝜆 𝐵𝑆 𝑏𝐟1(2√𝜆 𝑆𝑅 𝜆 𝐵𝑆 𝑏) (20) where 𝐟𝑣(•)is the modified Bessel function of the second kind and vth order. From (21) and (22), the PDF of X and Y can be calculated as, respectively after applying the formula 𝜕𝐟 𝑛(𝑧) 𝜕𝑧 = −𝐟𝑛−1(𝑧) − 𝑛 𝑧 𝐟𝑛(𝑧) 𝑓𝑋(𝑎) = 𝜕𝐹 𝑋(𝑎) 𝜕𝑎 = 2√𝜆 𝑅𝐷 𝜆 𝐵𝑅 𝐟0(2√𝜆 𝑅𝐷 𝜆 𝐵𝑅 𝑎) (21) 𝑓𝑌(𝑏) = 𝜕𝐹 𝑋(𝑏) 𝜕𝑏 = 2√𝜆 𝑆𝑅 𝜆 𝐵𝑆 𝐟0(2√𝜆 𝑆𝑅 𝜆 𝐵𝑆 𝑏) (22) 3.1. Outage probability (OP) The OP of system can be given as 𝑂𝑃 = 𝑃𝑟(𝛟𝑆𝑅𝐷 < 𝛟𝑡ℎ) (23) where 𝛟𝑡ℎ = 22𝑅 − 1 is the threshold of system and R is source rate. Substituting (11) into (23), we have 𝑂𝑃 = 𝑃𝑟 ( 𝜅𝛹𝑋𝑌 𝑋+𝑌 < 𝛟𝑡ℎ) = 𝑃𝑟(𝑋[𝜅𝛹𝑌 − 𝛟𝑡ℎ] < 𝛟𝑡ℎ 𝑌) = { 𝑃𝑟 (𝑋 < 𝛟 𝑡ℎ 𝑌 𝜅𝛹𝑌−𝛟 𝑡ℎ ) , 𝑌 > 𝛟 𝑡ℎ 𝜅𝛹 1, 𝑌 ≀ 𝛟 𝑡ℎ 𝜅𝛹 = ∫ 𝑓𝑌(𝑊)𝑑𝑊 𝛟 𝑡ℎ 𝜅𝛹 0 + ∫ 𝐹𝑋 ∞ 𝛟 𝑡ℎ 𝜅𝛹 ( 𝛟 𝑡ℎ 𝑌 𝜅𝛹𝑌−𝛟 𝑡ℎ |𝑌 = 𝑊) × 𝑓𝑌(𝑊)𝑑𝑊 (24) Applying (19-22), (24) can be rewritten as (25). 𝑂𝑃 = ∫ 2√𝜆 𝑆𝑅 𝜆 𝐵𝑆 𝐟0(2√𝜆 𝑆𝑅 𝜆 𝐵𝑆 𝑊)𝑑𝑊 ∞ 0 − 4 ∫ √𝜆 𝑆𝑅 𝜆 𝐵𝑆 𝜆 𝑅𝐷 𝜆 𝐵𝑅 [ 𝛟𝑡ℎ 𝑊 𝜅𝛹𝑊−𝛟𝑡ℎ ] × 𝐟0(2√𝜆 𝑆𝑅 𝜆 𝐵𝑆 𝑊)𝐟1 (2√𝜆 𝑅𝐷 𝜆 𝐵𝑅 [ 𝛟𝑡ℎ 𝑊 𝜅𝛹𝑊−𝛟𝑡ℎ ]) 𝑑𝑊 ∞ 𝛟 𝑡ℎ 𝜅𝛹 (25) By changing the variable for the first term of (25): 𝑡 = 2√𝜆 𝑆𝑅 𝜆 𝐵𝑆 𝑊. 𝑂𝑃 = 1 √𝜆 𝑆𝑅 𝜆 𝐵𝑆 ∫ 𝑡 × 𝐟0(𝑡)𝑑𝑡 ∞ 0 − 4 ∫ √𝜆 𝑆𝑅 𝜆 𝐵𝑆 𝜆 𝑅𝐷 𝜆 𝐵𝑅 [ 𝛟 𝑡ℎ 𝑊 𝜅𝛹𝑊−𝛟 𝑡ℎ ] × 𝐟0(2√𝜆 𝑆𝑅 𝜆 𝐵𝑆 𝑊)𝐟1 (2√𝜆 𝑅𝐷 𝜆 𝐵𝑅 [ 𝛟 𝑡ℎ 𝑊 𝜅𝛹𝑊−𝛟 𝑡ℎ ]) 𝑑𝑊 ∞ 𝛟 𝑡ℎ 𝜅𝛹 (26) Apply (6.561, 16) of the table of integral, (26) can be reformulated as 𝑂𝑃 = 1 √𝜆 𝑆𝑅 𝜆 𝐵𝑆 − 4 ∫ √𝜆 𝑆𝑅 𝜆 𝐵𝑆 𝜆 𝑅𝐷 𝜆 𝐵𝑅 [ 𝛟 𝑡ℎ 𝑊 𝜅𝛹𝑊−𝛟 𝑡ℎ ] × 𝐟0(2√𝜆 𝑆𝑅 𝜆 𝐵𝑆 𝑊)𝐟1 (2√𝜆 𝑅𝐷 𝜆 𝐵𝑅 [ 𝛟 𝑡ℎ 𝑊 𝜅𝛹𝑊−𝛟 𝑡ℎ ]) 𝑑𝑊 ∞ 𝛟 𝑡ℎ 𝜅𝛹 (27)
  • 5.  ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 2, April 2020: 1072 - 1078 1076 3.2. Intercept probability (IP) The IP can be defined by 𝐌𝑃 = 𝑃𝑟(𝛟 𝐞 ≥ 𝛟𝑡ℎ) (28) substituting (14) into (28) and then applying formulas in (19) or (20), finally we have: 𝐌𝑃 = 𝑃𝑟(𝜅𝛹𝑍 ≥ 𝛟𝑡ℎ) = 1 − 𝑃𝑟 (𝑍 < 𝛟 𝑡ℎ 𝜅𝛹 ) = 2√ 𝜆 𝐵𝑅 𝜆 𝑅𝐞 𝛟 𝑡ℎ 𝜅𝛹 × 𝐟1 (2√ 𝜆 𝐵𝑅 𝜆 𝑅𝐞 𝛟 𝑡ℎ 𝜅𝛹 ) (29) 4. NUMERICAL RESULTS AND DISCUSSION The influence of η on the OP and IP is plotted in Figure 3 and Figure 4 for various values of ψ. Here we set α = 0.5, R = 0.5 bps/Hz and ψ = 1, 5, 10 dB. The first observation one can see from these results is that the analytical match very well with the simulation results. Figure 5 and Figure 6 illustrated the optimal switching time system OP and IP versus ψ for η = 0.8, R=0.5 bps/Hz, and α = 0.25, 0.5, 0.85 respectively. It should be pointed out that the simulation and analytical results are the same. Figure 3. IP versus η Figure 4. OP versus η
  • 6. TELKOMNIKA Telecommun Comput El Control  Physical security with power beacon assisted in half-duplex 
 (Phu Tran Tin) 1077 Figure 5. IP versus ψ Figure 6. OP versus ψ 5. CONCLUSION In this research, we proposed and investigated physical security with power beacon assisted in half- duplex relaying networks over a Rayleigh fading channel. In this model, the source (S) node communicates with the destination (D) node via the helping of the intermediate relay (R) node. The D and R nodes harvest energy from the power beacon (PB) node in the presence of a passive Eavesdropper (E) node. Then we derived the integral form of the system outage probability (OP) and closed form of the intercept probability (IP). The correctness of the analytical of the OP and IP is verified by the Monte Carlo simulation. The influence of the main system parameters on the OP and IP also is investigated. The research results indicated that the analytical results are the same as the simulation ones. ACKNOWLEDGMENTS This research was supported by National Key Laboratory of Digital Control and System Engineering (DCSELAB), HCMUT, VNU-HCM, Vietnam.
  • 7.  ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 2, April 2020: 1072 - 1078 1078 REFERENCES [1] Bi, S., Ho, C. K., and Zhang, R., “Wireless powered communication: Opportunities and challenges,” IEEE Communications Magazine, vol. 53, pp. 117-125, 2015. [2] Niyato, D., Kim, D. I., Maso, M., and Han, Z., “Wireless Powered Communication Networks: Research Directions and Technological Approaches,” IEEE Wireless Communications, pp. 2-11, 2017. [3] Yu, H., Lee, H., and Jeon, H., “What is 5G? Emerging 5G Mobile Services and Network Requirements,” Sustainability, vol. 9, no. 10, p. 1848-1869, 2017. [4] Duarte, Melissa, Chris Dick, and Ashutosh Sabharwal, “Experiment-Driven Characterization of Full-Duplex Wireless Systems,” IEEE Transactions on Wireless Communications, vol. 12, pp. 4296-307, 2012. [5] Lee, W. C. Y., “The Most Spectrum-efficient Duplexing System: CDD,” IEEE Communications Magazine, vol. 40, pp. 163-66, 2012. [6] Wang, Cheng-Xiang, Fourat Haider, Xiqi Gao, Xiao-Hu You, Yang Yang, Dongfeng Yuan, Hadi Aggoune, Harald Haas, Simon Fletcher, and Erol Hepsaydir, “Cellular Architecture and Key Technologies for 5G Wireless Communication Networks,” IEEE Communications Magazine, vol. 52, pp. 122-130, 2014. [7] Ding, Zhiguo, Pingzhi Fan, and H. Vincent Poor, “Impact of User Pairing on 5G Nonorthogonal Multiple-Access Downlink Transmissions,” IEEE Transactions on Vehicular Technology, vol. 65, no. 8, 2016. [8] Tan N. Nguyen, T.H.Q. Minh, Phuong T. Tran, Miroslav Voznak, T.T. Duy, Thanh-Long Nguyen and Phu Tran Tin, “Performance Enhancement for Energy Harvesting Based Two-Way Relay Protocols in Wireless Ad-hoc Networks with Partial and Full Relay Selection Methods,” Ad hoc networks, vol. 84, pp. 178-187, 2019. [9] Tan N. Nguyen, T.H.Q. Minh, Phuong T. Tran, and Miroslav Voznak, “Energy Harvesting over Rician Fading Channel: A Performance Analysis for Half-Duplex Bidirectional Sensor Networks under Hardware Impairments,” Sensors, vol. 18, no. 6, 2018. [10] Tan N. Nguyen, T.H.Q. Minh, Phuong T. Tran, and Miroslav Voznak, “Adaptive Energy Harvesting Relaying Protocol for Two-Way Half Duplex System Network over Rician Fading Channel,” Wireless Communications and Mobile Computing, vol. 2018, 2018. [11] Bhatnagar, M. R., “On the Capacity of Decode-and-Forward Relaying over Rician Fading Channels,” IEEE Communications Letters, vol. 17, pp. 1100-1103, 2013. [12] Salem, Abdelhamid, Khairi Ashour Hamdi, and Khaled M. Rabie, “Physical Layer Security with RF Energy Harvesting in AF Multi-Antenna Relaying Networks,” IEEE Transactions on Communications, vol. 64, no. 7, pp. 3025-038, 2016. [13] Wyner, A. D., “The Wire-Tap Channel,” Bell System Technical Journal, vol. 54, no. 8, pp. 1355-387, 1975. [14] Zhang, Qi, Xiaobin Huang, Quanzhong Li, and Jiayin Qin, “Cooperative Jamming Aided Robust Secure Transmission for Wireless Information and Power Transfer in MISO Channels,” IEEE Transactions on Communications, vol. 63, no. 3, pp. 906-915, 2015. [15] Xing, Hong, Liang Liu, and Rui Zhang, “Secrecy Wireless Information and Power Transfer in Fading Wiretap Channel,” IEEE Transactions on Vehicular Technology, vol. 65, no. 1, pp. 180-190, 2016. [16] Xing, Hong, Zheng Chu, Zhiguo Ding, and Arumugam Nallanathan, “Harvest-and-jam: Improving Security for Wireless Energy Harvesting Cooperative Networks,” 2014 IEEE Global Communications Conference, 2014. [17] Li, Quanzhong, Qi Zhang, and Jiayin Qin, “Secure Relay Beamforming for Simultaneous Wireless Information and Power Transfer in Nonregenerative Relay Networks,” IEEE Transactions on Vehicular Technology, vol. 63, no. 5, pp. 2462-467, 2014. [18] Ding, Zhiguo, Kin K. Leung, Dennis L. Goeckel, and Don Towsley, “Opportunistic Relaying for Secrecy Communications: Cooperative Jamming vs. Relay Chatting,” IEEE Transactions on Wireless Communications, vol. 10, no. 6, pp. 1725-729, 2011. [19] Zhao, Rui, Yongming Huang, Wei Wang, and Vincent K. N. Lau, “Ergodic Achievable Secrecy Rate of Multiple-Antenna Relay Systems with Cooperative Jamming,” IEEE Transactions on Wireless Communications, vol. 15, no. 4, pp. 2537-551, 2016. [20] Krikidis, Ioannis, A. Suraweera, Peter J. Smith, and Chau Yuen, “Full-Duplex Relay Selection for Amplify-and- Forward Cooperative Networks,” IEEE Transactions on Wireless Communications, vol. 11, pp. 4381-393, 2012. [21] S. Luo, R. Zhang, and T. J. Lim, “Optimal save-then-transmit protocol for energy harvesting wireless transmitters,” IEEE Transactions on Wireless Communications, vol. 13, no. 3, pp. 1196-1207, 2013. [22] Suraweera, H., G. Karagiannidis, and P. Smith, “Performance Analysis of the Dual-hop Asymmetric Fading Channel,” IEEE Transactions on Wireless Communications, vol. 8, pp. 2783-788, 2009. [23] Tin, Phu Tran, Tran Hoang Quang Minh, Tan N. Nguyen, and Miroslav Voznak, “System Performance Analysis of Half-Duplex Relay Network over Rician Fading Channel,” Telecommunication Computing Electronics and Control TELKOMNIKA Telecommunication Computing Electronics and Control, vol. 16, no. 1, pp. 189-199, 2018. [24] Rashid, Tarique, Sunil Kumar, Akshay Verma, Prateek Raj Gautam, and Arvind Kumar, “Pm-EEMRP: Postural Movement Based Energy Efficient Multi-hop Routing Protocol for Intra Wireless Body Sensor Network (Intra-WBSN),” TELKOMNIKA Telecommunication Computing Electronics and Control, vol. 16, no. 1, 2018. [25] A. F. Morabito, “Power Synthesis of Mask-Constrained Shaped Beams Through Maximally-Sparse Planar Arrays,” TELKOMNIKA Telecommunication Computing Electronics and Control, vol. 14, no. 4, pp. 1217-1219, 2016. [26] C. Zhong, S. Jin, K.-K. Wong, and M. R. Mckay, “Ergodic Mutual Information Analysis for Multi-Keyhole MIMO Channels,” IEEE Transactions on Wireless Communications, vol. 10, no. 6, pp. 1754–1763, 2011.