Kishk, Mustafa A. and Dhillon, Harpreet S. (2018) Coexistence of RF-powered IoT and a Primary Wireless Network With Secrecy Guard Zones. IEEE Transactions on Wireless Communications, 17 (3). pp. 1460-1473. ISSN 1536-1276
Preview
MK_co exist.pdf
Download (2MB) | Preview
Abstract
This paper studies the secrecy performance of a
wireless network (primary network) overlaid with an ambient RF
energy harvesting Internet of Things (IoT) network (secondary
network). The nodes in the secondary network are assumed
to be solely powered by ambient RF energy harvested from
the transmissions of the primary network. We assume that the
secondary nodes can eavesdrop on the primary transmissions
due to which the primary network uses secrecy guard zones.
The primary transmitter goes silent if any secondary receiver
is detected within its guard zone. Using tools from stochastic
geometry, we derive the probability of successful connection
of the primary network as well as the probability of secure
communication. Two conditions must be jointly satisfied in order
to ensure successful connection: 1) the signal-to-interference-plus-noise ratio (SINR) at the primary receiver is above a
predefined threshold, and 2) the primary transmitter is not silent.
In order to ensure secure communication, the SINR value at
each of the secondary nodes should be less than a predefined
threshold. Clearly, when more secondary nodes are deployed,
more primary transmitters will remain silent for a given guard
zone radius, which will in turn impact the amount of energy
harvested by the secondary network. Our results concretely show
the existence of an optimal deployment density for the secondary
network that maximizes the density of nodes that are able to
harvest sufficient amount of energy. Furthermore, we show the
dependence of this optimal deployment density on the guard
zone radius of the primary network. In addition, we show that
the optimal guard zone radius selected by the primary network is
a function of the deployment density of the secondary network.
This interesting coupling between the performance of the two
networks is studied using tools from game theory. We propose
an algorithm that can assist the two networks to converge to
Nash equilibrium. The convergence of this algorithm is verified
using simulations. Overall, this paper is one of the few concrete
works that symbiotically merge tools from stochastic geometry
and game theory.
Item Type: | Article |
---|---|
Keywords: | Stochastic geometry; wireless power transfer; physical layer security; game theory; coverage probability; Poisson point process; Poisson hole process; |
Academic Unit: | Faculty of Science and Engineering > Electronic Engineering Faculty of Science and Engineering > Research Institutes > Hamilton Institute |
Item ID: | 16999 |
Identification Number: | 10.1109/TWC.2017.2778703 |
Depositing User: | Mustafa Kishk |
Date Deposited: | 06 Mar 2023 16:21 |
Journal or Publication Title: | IEEE Transactions on Wireless Communications |
Publisher: | Institute of Electrical and Electronics Engineers |
Refereed: | Yes |
Related URLs: | |
URI: | https://mu.eprints-hosting.org/id/eprint/16999 |
Use Licence: | This item is available under a Creative Commons Attribution Non Commercial Share Alike Licence (CC BY-NC-SA). Details of this licence are available here |
Repository Staff Only (login required)
Downloads
Downloads per month over past year