On the Placement of RF Energy Harvesting Node in Wireless Networks with Secrecy Considerations

Biao He, Xiangyun Zhou

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Abstract

    The potential dual use of radio-frequency (RF) signals for carrying energy and information brings an exciting opportunity for energy harvesting (EH) from ambient RF signals in wireless communication networks. To maximize the efficiency of harvesting wireless energy, it is desirable to have the EH node located close to the transmitter. However, when the transmitted information is confidential, the EH node should be regarded as a potential eavesdropper, and hence, it is preferred to have the EH node located far from the transmitter. Therefore, the placement of EH nodes in wireless networks becomes an interesting problem when secrecy is an important consideration. In this paper, we investigate the optimal placement of the EH node with physical-layer security considerations by formulating and solving two optimization problems. The first problem maximizes the average EH power subject to a secrecy outage constraint, while the second problem minimizes the secrecy outage probability subject to an EH constraint. Our results also demonstrate the tradeoff between secrecy and EH performances caused by the placement of the EH node.
    Original languageEnglish
    Title of host publication2014 IEEE Global Communications Conference, GLOBECOM 2014
    Place of PublicationOnline
    PublisherIEEE
    Pages1355-1360
    EditionPeer Reviewed
    ISBN (Print)9781479935116
    DOIs
    Publication statusPublished - 2014
    Event2014 IEEE Global Communications Conference, GLOBECOM 2014 - Austin, USA
    Duration: 1 Jan 2014 → …

    Conference

    Conference2014 IEEE Global Communications Conference, GLOBECOM 2014
    Period1/01/14 → …
    OtherDecember 8-12 2014

    Fingerprint

    Dive into the research topics of 'On the Placement of RF Energy Harvesting Node in Wireless Networks with Secrecy Considerations'. Together they form a unique fingerprint.

    Cite this