TY - JOUR
T1 - Learning-Based Wireless Powered Secure Transmission
AU - He, Dongxuan
AU - Liu, Chenxi
AU - Wang, Hua
AU - Quek, Tony Q.S.
N1 - Publisher Copyright:
© 2012 IEEE.
PY - 2019/4
Y1 - 2019/4
N2 - In this letter, we propose a learning-based wireless powered secure transmission, in which a source utilizes energy harvested from a power beacon to communicate with a legitimate receiver, in the presence of an eavesdropper. In order to confuse the eavesdropper, we assume that the source transmits the artificial noise signals, in addition to the information signals. We first characterize the effective secrecy throughput of our system, showing its dependence on the transmission parameters, including the fraction of time allocated for wireless power transfer, the fraction of power allocated to the information signals, as well as the wiretap code rates. We then leverage the deep feedforward neural network to learn how the optimal transmission parameters that jointly maximize the effective secrecy throughput can be obtained. Through numerical results, we demonstrate that our learning-based scheme can achieve almost the same secrecy performance as the optimal solution obtained from the exhaustive search, while requiring much less computational complexity.
AB - In this letter, we propose a learning-based wireless powered secure transmission, in which a source utilizes energy harvested from a power beacon to communicate with a legitimate receiver, in the presence of an eavesdropper. In order to confuse the eavesdropper, we assume that the source transmits the artificial noise signals, in addition to the information signals. We first characterize the effective secrecy throughput of our system, showing its dependence on the transmission parameters, including the fraction of time allocated for wireless power transfer, the fraction of power allocated to the information signals, as well as the wiretap code rates. We then leverage the deep feedforward neural network to learn how the optimal transmission parameters that jointly maximize the effective secrecy throughput can be obtained. Through numerical results, we demonstrate that our learning-based scheme can achieve almost the same secrecy performance as the optimal solution obtained from the exhaustive search, while requiring much less computational complexity.
KW - Wireless power transfer
KW - artificial noise
KW - deep feedforward neural network
KW - physical layer security
UR - http://www.scopus.com/inward/record.url?scp=85056731372&partnerID=8YFLogxK
U2 - 10.1109/LWC.2018.2881976
DO - 10.1109/LWC.2018.2881976
M3 - Article
AN - SCOPUS:85056731372
SN - 2162-2337
VL - 8
SP - 600
EP - 603
JO - IEEE Wireless Communications Letters
JF - IEEE Wireless Communications Letters
IS - 2
M1 - 8540070
ER -