Method for allocating transfer times in a wireless powered communication network

10524276 ยท 2019-12-31

Assignee

Inventors

Cpc classification

International classification

Abstract

The present invention relates to a method for allocating transfer times of a low degree of complexity for improving physical-layer security in a wireless powered communication network. A method for allocating transfer times in a wireless powered communication network according to an embodiment of the invention can provide a low-complexity method of allocating transfer times that enables physical-layer security in a secure wireless powered communication network (WPCN) using an energy harvesting jammer, and this method can be utilized to establish an energy harvesting communication system that is efficient in terms of information security.

Claims

1. A method for allocating transfer times in a wireless powered communication network using an energy harvesting jammer, the method comprising: obtaining frequency band information; obtaining an upper limit for a secrecy rate; obtaining first channel state information and second channel state information relating to an energy transfer operation, the first channel state information representing energy transferred by a hybrid access point to a user during the energy transfer operation, the second channel state information representing energy transferred by the hybrid access point to a jammer during the energy transfer operation; obtaining third channel state information, fourth channel state information, first channel distribution, and second channel distribution relating to an information transfer operation, the third channel state information representing information transferred by the user to the hybrid access point during the information transfer operation, the fourth channel state information representing information transferred by the jammer to the hybrid access point during the information transfer operation, the first channel distribution representing information transferred by the user to a tapper, and the second channel distribution representing jamming signals transferred by the jammer to the tapper; and calculating times allocated to the energy transfer operation and the information transfer operation based on the frequency band information, the upper limit for a secrecy rate, the first channel state information, the second channel state information, the third channel state information, the fourth channel state information, the first channel distribution, and the second channel distribution such that a secrecy outage probability is minimized.

2. The method for allocating transfer times in a wireless powered communication network according to claim 1, further comprising: transferring an allocation time for the energy transfer operation and an allocation time for the information transfer operation to the user and the jammer.

3. The method for allocating transfer times in a wireless powered communication network according to claim 1, wherein the hybrid access point, the user, and the jammer share channel state information between one another, and channel distribution information is shared for the tapper.

4. The method for allocating transfer times in a wireless powered communication network according to claim 3, wherein the hybrid access point and the jammer cooperate.

5. The method for allocating transfer times in a wireless powered communication network according to claim 1, wherein the secrecy outage probability is calculated by Equation 1 shown below: [ Equation 1 ] P out = { G ( s ) 1 + G ( s ) e - V ( s ) G ( s ) , if 1 + A s - 2 r th W ( 1 + s ) > 0 1 , otherwise , where G ( s ) = 2 r th W ( 1 + s ) D / ( 1 + As - 2 r th W ( 1 + s ) ) , D = U U .Math. h SU .Math. 2 P S L SU L UE J J .Math. h SJ .Math. 2 P S L SJ L JE , and V ( s ) = 1 / ( Cs ) .

6. The method for allocating transfer times in a wireless powered communication network according to claim 5, wherein the calculating of the times allocated to the energy transfer operation and the information transfer operation is performed by using Equation 2 shown below: = s s + 1 = WA - r th ln 2 WA - ( 1 - A ) r th ln 2 , where s = W r th ln 2 - 1 A , A = S S .Math. h SU .Math. 4 P S L SU 2 / S 2 , [ Equation 2 ] W is a frequency band, .sub.S is a proportion of power used in actual transmission from among harvested energy, P.sub.S is a transmission power of the hybrid access point, custom character is signal attenuation according to distance, and .sup.2.sub.S is a variance of noise of the hybrid access point.

Description

BRIEF DESCRIPTION OF THE DRAWINGS

(1) FIG. 1 illustrates an energy harvesting system for allocating transfer times in a wireless powered communication network associated with an embodiment of the invention.

(2) FIG. 2 is a block diagram of the hybrid access point illustrated in FIG. 1.

(3) FIG. 3 is a graph showing the performance obtained by a method for allocating transfer times in a wireless powered communication network according to an embodiment of the invention compared with the performance obtained by methods of allocating transfer times according to certain other technologies.

DETAILED DESCRIPTION OF THE INVENTION

(4) A method for allocating transfer times in a wireless powered communication network associated with an embodiment of the invention is described below with reference to the accompanying drawings.

(5) In the present specification, an expression used in the singular encompasses the expression of the plural, unless it has a clearly different meaning in the context. In the present specification, terms such as including or having, etc., are not to be interpreted as necessarily including all of the components or steps listed thereafter in the specification. Some of the listed components or steps may not be included, while certain other components or steps may additionally be included.

(6) The following describes a method of a low level of complexity for allocating energy transfer (ET) and information transfer (IT) times to provide physical-layer security for signals sent by an energy harvesting (EH) user to a hybrid access point (H-AP) using an EH jammer in an environment in which a tapper is present. The communication system considered may be a wireless powered communication network (WPCN).

(7) FIG. 1 illustrates an energy harvesting system for allocating transfer times in a wireless powered communication network associated with an embodiment of the invention.

(8) As illustrated in the drawing, a wireless powered communication network system can include a hybrid access point (H-AP) 100, a user 200, a jammer 300, and a tapper 400.

(9) To begin with, during a first energy transfer (ET) time , an H-AP 100 may transmit energy signals, and the user 200 and the jammer 300 may use the signals to perform energy harvesting (EH). Next, during an information transfer (IT) time 1, the user 200 may transfer information signals to the H-AP 100 based on the harvested energy, and the jammer 300 may transmit jamming signals to prevent the deciphering of the information by the tapper 400. So as not to lose generality, the total communication unit time is set to 1.

(10) The communication channel is referred to as hXY and follows a Rayleigh probability distribution, and XY{S,U,J,E}. Furthermore, channel reciprocity and quasi-static flat fading are supposed, and it is also supposed that the H-AP 100, the user 200, and the jammer 300 know the channel state information (CSI) between one another.

(11) As regards the tapper 400, it is supposed that only the channel distribution information (CDI) and the physical position are detected and that the exact CSI is unknown.

(12) During the first ET time, the signal received at the EH terminal X.sub.{U,J} is as expressed by Equation 1 below.
y.sub.X.sub.={square root over (P.sub.SL.sub.SX.sub.)}h.sub.SX.sub.X.sub.S+n.sub.X.sub.[Equation 1]

(13) Here, P.sub.S is the transmission power of the H-AP, L.sub.SX.sub. is the signal attenuation according to distance, x.sub.SCN (0,1) is the energy signal of the H-AP, and n.sub.X.sub.CN(0,.sup.2.sub.X.sub.) is white noise. Here, the amount of energy that the EH terminal X.sub. harvests can be expressed as Equation 2 shown below.
.sub.X.sub.=n.sub.X.sub.E[|y.sub.X.sub.|.sup.2]=n.sub.X.sub.L.sub.SX.sub.P.sub.Sx|h.sub.SX.sub.|.sup.2[Equation 2]

(14) Here, n.sub.X.sub.(0,1] represents the energy harvesting (EH) efficiency.

(15) The signal transferred by the user 200 to the H-AP 100 based on the harvested energy during the following IT time is x.sub.UCN (0,1), and the jamming signal transferred by the jammer 300 is X.sub.JCN (0,1). Here, the signal received at the H-AP 100 and the tapper 400 can be expressed as Equation 3 shown below.
y.sub.X.sub.I={square root over (L.sub.UX.sub.I)}h.sub.UX.sub.I{square root over (P.sub.U)}x.sub.u+{square root over (L.sub.JX.sub.I)}h.sub.JX.sub.Ih.sub.JX.sub.I{square root over (P)}x.sub.J+n.sub.X.sub.I[Equation 3]

(16) Here, X.sub.I{S,E}, and P.sub.X.sub.=.sub.X.sub..sub.X.sub./(1) represents the transmission power of X.sub., while .sub.X.sub. represents the proportion of power used in actual transmission from among the harvested energy.

(17) It is supposed that the H-AP 100 and the jammer 300 cooperate with each other. That is, it is supposed that the sets of jamming signals generated by the jammer 300 and the order in which they are generated are already known to the H-AP 100, so that the H-AP 100 is able to completely cancel out the jamming signals from the received signals.

(18) In this case, the signal-to-interference-plus-noise ratio (SINR) can be expressed as Equation 4 shown below.

(19) SINR S = .Math. h SU .Math. 2 P U L SU S 2 = 1 - A SINR E = .Math. h UE .Math. 2 P U L UE .Math. h JE .Math. 2 P J L JE + E 2 = B .Math. h UE .Math. 2 ( C .Math. h JE .Math. 2 - 1 ) + 1 [ Equation 4 ]

(20) Here, A.sub.S.sub.S|h.sub.SU|.sup.4P.sub.SL.sub.SU.sup.2/.sub.S.sup.2, B.sub.U.sub.U|h.sub.SU|.sup.2P.sub.SL.sub.SUL.sub.UE/.sub.E.sup.2, and C.sub.J.sub.J|h.sub.SJ|.sup.2P.sub.SL.sub.SJL.sub.JE/.sub.E.sup.2. Also, .sup.2.sub.S represents the variance for the noise of the H-AP 100, and .sup.2.sub.E represents the variance for the noise of the tapper 400.

(21) Based on the above, the transmission amount can be expressed as Equation 5.
r.sub.0=[W(1)(log.sub.2(1+SINR.sub.S)log.sub.2(1+SINR.sub.E.sub.m)][Equation 5]

(22) Here, W refers to the frequency band.

(23) The problem to be resolved in this embodiment of the invention is the problem of minimizing the following secrecy outage probability, to provide physical-layer security for information between the user 200 and the H-AP 100, in a situation where only the channel distribution information (CDI) of the tapper 400 is given. This problem may be expressed as Equation 6 shown below.

(24) min r P out = Pr ( r 0 r th ) s . t . 0 < < 1 [ Equation 6 ]

(25) Here, r.sub.th is the upper limit for a secrecy rate that the system has set as a goal.

(26) Next, a description is provided of a method of finding the secrecy outage probability and an upper limit formula for the secrecy outage probability.

(27) First, if a mathematical expansion shows that the amount of information transfer at the H-AP 100 is greater than the upper limit r.sub.th or if W(1)log.sub.2(1+A(1))r.sub.th, then r.sub.0<r.sub.th, and from the perspective of physical-layer security, security failure inevitably occurs.

(28) On the other hand, the probability of security failure when W(1)log.sub.2(1+A(1))>r.sub.th can be expressed as Equation 7 below if the variable s=/(1) is substituted.

(29) [ Equation 7 ] P out = Pr ( log 2 ( 1 + AS ) - log 2 ( 1 + B .Math. h UE .Math. 2 s C .Math. h JE .Math. 2 s + 1 ) r th W ( 1 + s ) ) = Pr ( .Math. h JE .Math. 2 G ( s ) .Math. h UE .Math. 2 - V ( s ) ) = V ( s ) G ( s ) 0 G ( s ) x - V ( s ) e - x e - y dydx = G ( s ) 1 + G ( s ) e - V ( s ) G ( s ) Here , G ( s ) = 2 r th W ( 1 + s ) D / ( 1 + As - 2 r th W ( 1 + s ) ) , D = U U .Math. h SU .Math. 2 P S L SU L UE J J .Math. h SJ .Math. 2 P S L SJ L JE ,
and V(s)1/(Cs). In other words, the equation can be rewritten as Equation 8 shown below.

(30) P out = { G ( s ) 1 + G ( s ) e - V ( s ) G ( s ) , if 1 + As - 2 r th W ( 1 + s ) > 0 1 , otherwise [ Equation 8 ]

(31) Since P.sub.out above is non-convex with respect to , the procedure for obtaining an optimal solution can be obtained only by way of a one-dimensional exhaustive search and thus requires a considerably high degree of complexity.

(32) For an easier method of analysis, an embodiment of the invention utilizes the upper limit formula P.sub.out,UB of the secrecy outage probability. To be more specific, if it is supposed that the noise .sub.E.sup.2 generated at the tapper 400 is negligibly small, then the following property is obtained, which can be expressed as Equation 9.

(33) [ Equation 9 ] P out = P out , UB = { G ( s ) 1 + G ( s ) , if 1 + As - 2 r th W ( 1 + s ) > 0 1 , otherwise

(34) The problem to be resolved can thus ultimately be approximated as Equation 10 shown below.

(35) ( P .1 ) : min s P out , UB = G ( s ) 1 + G ( s ) s . t . 1 + As - 2 r th W ( 1 + s ) > 0 [ Equation 10 ]

(36) Below, a description is provided of a method of a low degree of complexity for allocating energy transfer (ET) time and information transfer (IT) time by using Equation 10.

(37) First, since the condition expression

(38) 1 + As - 2 r th W ( 1 + s )
has a concave property with respect to s, it is known that the set of solutions that s of (P.1) can have is a convex set. Also, by using the Lambert W function W.sub.L,K() for the k-th branch, the set of solutions can be expressed as {tilde over (s)}.sub.L<s<{tilde over (s)}.sub.U. The set of solutions can be expressed as Equation 11 shown below.

(39) s L ~ = - w r th ln 2 W L , 0 ( ) - 1 A s U ~ = - w r th ln 2 W L , - 1 ( ) - 1 A Here , = - r th ln 2 .Math. 2 r th W ( 1 - 1 A ) / ( WA ) . [ Equation 11 ]

(40) Next, P.sub.out,UB is a monotonically increasing function with respect to G(s), and the derivative of G(s) with respect to s yields Equation 12 shown below.

(41) G ( s ) s = D ( A ( r th s ln 2 - W ) + r th ln 2 ) 2 r th W ( 1 + s ) W ( 1 + As - 2 r th W ( 1 + s ) ) [ Equation 12 ]

(42) The solution that minimizes G(s) according to Equation 12 can be expressed Equation 13 or Equation 14 shown below.

(43) 0 s .star-solid. = W r th ln 2 - 1 A [ Equation 13 ] .star-solid. = s .star-solid. s .star-solid. + 1 = WA - r th ln 2 WA - ( 1 - A ) r th ln 2 [ Equation 14 ]

(44) A.sub.S.sub.S|h.sub.SU|.sup.2P.sub.SL.sub.SU.sup.2/.sub.S.sup.2, W is the frequency band, .sub.S is the proportion of power used in actual transmission from among the harvested energy, P.sub.S is the transmission power of the H-AP 100, L.sub.sX.sub. is signal attenuation according to distance, and .sup.2.sub.S is the variance of noise of the H-AP 100.

(45) In particular, since <0, and since 0<W.sub.L,0()<1 and 1<W.sub.L,1(), s.sup..star-solid. becomes the optimal solution of (P.1).

(46) FIG. 2 is a block diagram of the hybrid access point illustrated in FIG. 1.

(47) The illustrated hybrid access point 100 can include a computation unit 110 and a transfer time allocation unit 120.

(48) The computation unit 110 can calculate the optimal energy transfer (ET) time by using Equation 13 or Equation 14, and based on the energy transfer (ET) time thus determined, can calculate the information transfer (IT) time.

(49) The transfer time allocation unit 120 can allocate the optimal energy transfer (ET) time and information transfer (IT) time thus calculated as the energy transfer time and information transfer time. Also, for synchronization, the allocated transfer time results can be transmitted to the user 200 and the jammer 300.

(50) FIG. 3 is a graph showing the performance obtained by a method for allocating transfer times in a wireless powered communication network according to an embodiment of the invention compared with the performance obtained by methods of allocating transfer times according to certain other technologies. In the graph, the performances are expressed in terms of the average secrecy outage probability. The example shown in FIG. 3 adopts the variables shown in Table 1 below.

(51) TABLE-US-00001 TABLE 1 variable value L.sub.XY 10.sup.3d.sub.XY.sup.3, X, Y {S, U, J, E} d.sub.SU 6 m d.sub.SJ 3 m d.sub.UE 4 m W 1 MHz .sub.X 0.5, X {S, U, J, E} .sub.X 0.7, X {S, U, J, E} .sub.X.sup.2 160 dBm/Hz r.sub.th 100 kbps

(52) Proposed Closed-form represents the performance obtained when allocating the energy transfer time and information transfer time with the low degree of complexity of Equation 13 or Equation 14, Optimal represents the performance obtained when the calculations consider the energy transfer times of all possible cases, ERA represents the performance obtained when the ET and IT times are distributed equally, IRM represents the performance obtained according to the related art where only the amount of information transfer is maximized and the presence of tappers is ignored, and w/o Jammer represents the performance when times are allocated without the help of a jammer.

(53) As can be observed from FIG. 3, the method based on an embodiment of the invention may provide the advantage of low complexity while providing virtually the same results as the Optimal case. It is also observable that the method based on an embodiment of the invention provides greatly superior performance compared to the other methods.

(54) As described above, a method for allocating transfer times in a wireless powered communication network according to an embodiment of the invention can provide a low-complexity method of allocating transfer times that enables physical-layer security in a secure wireless powered communication network (WPCN) using an energy harvesting jammer, and this method can be utilized to establish an energy harvesting communication system that is efficient in terms of information security.

(55) A method for allocating transfer times in a wireless powered communication network associated with an embodiment of the invention can be implemented in the form of program instructions that may be performed using various computer means and can be recorded in a computer-readable medium. Here, the computer-readable medium can include program instructions, data files, data structures, etc., alone or in combination. The program instructions recorded on the medium can be designed and configured specifically for the present invention or can be a type known to and used by the skilled person in the field of computer software.

(56) Examples of a computer-readable medium may include magnetic media such as hard disks, floppy disks, magnetic tapes, etc., optical media such as CD-ROM's, DVD's, etc., magneto-optical media such as floptical disks, etc., and hardware devices such as ROM, RAM, flash memory, etc.

(57) The recorded medium can also be a transmission medium, such as rays, metal lines, waveguides, etc., which may include carrier waves that transfer signals for specifying program instructions, data structures, etc.

(58) Examples of the program of instructions may include not only machine language codes produced by a compiler but also high-level language codes that can be executed by a computer through the use of an interpreter, etc. The hardware mentioned above can be made to operate as one or more software modules that perform the actions of the embodiments of the invention, and vice versa.

(59) The method for allocating transfer times in a wireless powered communication network described above is not to be applied in a manner limited to the compositions and methods of the embodiments set forth above. Rather, different embodiments can be partially or wholly incorporated into a selectively combined implementation to allow numerous variations.