On Security and Throughput for Energy Harvesting Untrusted Relays in IoT Systems Using NOMA

In this paper, we analyze the secrecy and throughput of multiple-input single-output (MISO) energy harvesting (EH) Internet of Things (IoT) systems, in which a multi-antenna base station (BS) transmits signals to IoT devices (IoTDs) with the help of relays. Specifically, the communication process is...

Full description

Bibliographic Details
Main Authors: Van Nhan Vo, Chakchai So-In, Hung Tran, Duc-Dung Tran, Sovannarith Heng, Phet Aimtongkham, Anh-Nhat Nguyen
Format: Article
Language:English
Published: IEEE 2019-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8865010/
_version_ 1818911296558465024
author Van Nhan Vo
Chakchai So-In
Hung Tran
Duc-Dung Tran
Sovannarith Heng
Phet Aimtongkham
Anh-Nhat Nguyen
author_facet Van Nhan Vo
Chakchai So-In
Hung Tran
Duc-Dung Tran
Sovannarith Heng
Phet Aimtongkham
Anh-Nhat Nguyen
author_sort Van Nhan Vo
collection DOAJ
description In this paper, we analyze the secrecy and throughput of multiple-input single-output (MISO) energy harvesting (EH) Internet of Things (IoT) systems, in which a multi-antenna base station (BS) transmits signals to IoT devices (IoTDs) with the help of relays. Specifically, the communication process is separated into two phases. In the first phase, the BS applies transmit antenna selection (TAS) to broadcast the signal to the relays and IoTDs by using non-orthogonal multiple access (NOMA). Here, the relays use power-splitting-based relaying (PSR) for EH and information processing. In the second phase, the selected relay employs the amplify-and-forward (AF) technique to forward the received signal to the IoTDs using NOMA. The information transmitted from the BS to the IoTD risks leakage by the relay, which is able to act as an eavesdropper (EAV) (i.e., an untrusted relay). To analyze the secrecy performance, we investigate three schemes: random-BS-best-relay (RBBR), best-BS-random-relay (BBRR), and best-BS-best-relay (BBBR). The physical layer secrecy (PLS) performance is characterized by deriving closed-form expressions of secrecy outage probability (SOP) for the IoTDs. A BS transmit power optimization algorithm is also proposed to achieve the best secrecy performance. Based on this, we then evaluate the system performance of the considered system, i.e., the outage probability and throughput. In addition, the impacts of the EH time, the power-splitting ratio, the numbers of BS antennas, and the numbers of untrusted relays on the SOP and throughput are investigated. The Monte Carlo approach is applied to verify our analytical results. Finally, the numerical examples indicate that the system performance of BBBR is greater than that of RBBR and BBRR.
first_indexed 2024-12-19T22:56:27Z
format Article
id doaj.art-00168b5560944d6d8a45c0fb17c5b418
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-12-19T22:56:27Z
publishDate 2019-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-00168b5560944d6d8a45c0fb17c5b4182022-12-21T20:02:37ZengIEEEIEEE Access2169-35362019-01-01714934114935410.1109/ACCESS.2019.29466008865010On Security and Throughput for Energy Harvesting Untrusted Relays in IoT Systems Using NOMAVan Nhan Vo0https://orcid.org/0000-0003-0753-5203Chakchai So-In1https://orcid.org/0000-0003-1026-191XHung Tran2https://orcid.org/0000-0002-0231-1211Duc-Dung Tran3Sovannarith Heng4Phet Aimtongkham5Anh-Nhat Nguyen6International School, Duy Tan University, Da Nang, VietnamDepartment of Computer Science, Applied Network Technology (ANT) Laboratory, Faculty of Science, Khon Kaen University, Khon Kaen, ThailandSchool of Innovation, Design and Engineering, Mälardalen University, Västerås, SwedenFaculty of Electrical and Electronics Engineering, Duy Tan University, Da Nang, VietnamDepartment of Computer Science, Applied Network Technology (ANT) Laboratory, Faculty of Science, Khon Kaen University, Khon Kaen, ThailandDepartment of Computer Science, Applied Network Technology (ANT) Laboratory, Faculty of Science, Khon Kaen University, Khon Kaen, ThailandDepartment of Computer Science, Applied Network Technology (ANT) Laboratory, Faculty of Science, Khon Kaen University, Khon Kaen, ThailandIn this paper, we analyze the secrecy and throughput of multiple-input single-output (MISO) energy harvesting (EH) Internet of Things (IoT) systems, in which a multi-antenna base station (BS) transmits signals to IoT devices (IoTDs) with the help of relays. Specifically, the communication process is separated into two phases. In the first phase, the BS applies transmit antenna selection (TAS) to broadcast the signal to the relays and IoTDs by using non-orthogonal multiple access (NOMA). Here, the relays use power-splitting-based relaying (PSR) for EH and information processing. In the second phase, the selected relay employs the amplify-and-forward (AF) technique to forward the received signal to the IoTDs using NOMA. The information transmitted from the BS to the IoTD risks leakage by the relay, which is able to act as an eavesdropper (EAV) (i.e., an untrusted relay). To analyze the secrecy performance, we investigate three schemes: random-BS-best-relay (RBBR), best-BS-random-relay (BBRR), and best-BS-best-relay (BBBR). The physical layer secrecy (PLS) performance is characterized by deriving closed-form expressions of secrecy outage probability (SOP) for the IoTDs. A BS transmit power optimization algorithm is also proposed to achieve the best secrecy performance. Based on this, we then evaluate the system performance of the considered system, i.e., the outage probability and throughput. In addition, the impacts of the EH time, the power-splitting ratio, the numbers of BS antennas, and the numbers of untrusted relays on the SOP and throughput are investigated. The Monte Carlo approach is applied to verify our analytical results. Finally, the numerical examples indicate that the system performance of BBBR is greater than that of RBBR and BBRR.https://ieeexplore.ieee.org/document/8865010/Energy harvestingInternet of Thingsphysical layer secrecythroughputNOMAMISO
spellingShingle Van Nhan Vo
Chakchai So-In
Hung Tran
Duc-Dung Tran
Sovannarith Heng
Phet Aimtongkham
Anh-Nhat Nguyen
On Security and Throughput for Energy Harvesting Untrusted Relays in IoT Systems Using NOMA
IEEE Access
Energy harvesting
Internet of Things
physical layer secrecy
throughput
NOMA
MISO
title On Security and Throughput for Energy Harvesting Untrusted Relays in IoT Systems Using NOMA
title_full On Security and Throughput for Energy Harvesting Untrusted Relays in IoT Systems Using NOMA
title_fullStr On Security and Throughput for Energy Harvesting Untrusted Relays in IoT Systems Using NOMA
title_full_unstemmed On Security and Throughput for Energy Harvesting Untrusted Relays in IoT Systems Using NOMA
title_short On Security and Throughput for Energy Harvesting Untrusted Relays in IoT Systems Using NOMA
title_sort on security and throughput for energy harvesting untrusted relays in iot systems using noma
topic Energy harvesting
Internet of Things
physical layer secrecy
throughput
NOMA
MISO
url https://ieeexplore.ieee.org/document/8865010/
work_keys_str_mv AT vannhanvo onsecurityandthroughputforenergyharvestinguntrustedrelaysiniotsystemsusingnoma
AT chakchaisoin onsecurityandthroughputforenergyharvestinguntrustedrelaysiniotsystemsusingnoma
AT hungtran onsecurityandthroughputforenergyharvestinguntrustedrelaysiniotsystemsusingnoma
AT ducdungtran onsecurityandthroughputforenergyharvestinguntrustedrelaysiniotsystemsusingnoma
AT sovannarithheng onsecurityandthroughputforenergyharvestinguntrustedrelaysiniotsystemsusingnoma
AT phetaimtongkham onsecurityandthroughputforenergyharvestinguntrustedrelaysiniotsystemsusingnoma
AT anhnhatnguyen onsecurityandthroughputforenergyharvestinguntrustedrelaysiniotsystemsusingnoma