About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Communications and Networking. 14th EAI International Conference, ChinaCom 2019, Shanghai, China, November 29 – December 1, 2019, Proceedings, Part II

Research Article

Legitimate Eavesdropping with Multiple Wireless Powered Eavesdroppers

Download(Requires a free EAI acccount)
5 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-030-41117-6_17,
        author={Qun Li and Ding Xu},
        title={Legitimate Eavesdropping with Multiple Wireless Powered Eavesdroppers},
        proceedings={Communications and Networking. 14th EAI International Conference, ChinaCom 2019, Shanghai, China, November 29 -- December 1, 2019, Proceedings, Part II},
        proceedings_a={CHINACOM PART 2},
        year={2020},
        month={2},
        keywords={Legitimate eavesdropping Wireless powered communication Successful eavesdropping probability Collusive eavesdroppers Non-collusiveeavesdroppers},
        doi={10.1007/978-3-030-41117-6_17}
    }
    
  • Qun Li
    Ding Xu
    Year: 2020
    Legitimate Eavesdropping with Multiple Wireless Powered Eavesdroppers
    CHINACOM PART 2
    Springer
    DOI: 10.1007/978-3-030-41117-6_17
Qun Li, Ding Xu,*
    *Contact email: xuding@ieee.org

    Abstract

    This paper considers a suspicious communication network with multiple suspicious source-destination nodes and multiple wireless powered legitimate eavesdroppers, where the legitimate eavesdroppers are assumed to be collusive or non-collusive. A minimum harvested energy constraint is applied at each eavesdropper such that each eavesdropper must harvest a minimum required energy. The legitimate eavesdropping in such a scenario is investigated and our aim is to maximize the average successful eavesdropping probability by optimizing the power splitting ratio at each eavesdropper under the minimum harvested energy constraint. The optimal algorithm is proposed to solve the optimization problem for both collusive eavesdroppers and non-collusive eavesdroppers. Simulation results show that the proposed algorithm achieves the upper bound of the successful eavesdropping probability when the energy harvesting efficiency is large, the required minimum harvested energy is small, or the transmit power of the suspicious source node is high.

    Keywords
    Legitimate eavesdropping Wireless powered communication Successful eavesdropping probability Collusive eavesdroppers Non-collusiveeavesdroppers
    Published
    2020-02-27
    Appears in
    SpringerLink
    http://dx.doi.org/10.1007/978-3-030-41117-6_17
    Copyright © 2019–2025 ICST
    EBSCOProQuestDBLPDOAJPortico
    EAI Logo

    About EAI

    • Who We Are
    • Leadership
    • Research Areas
    • Partners
    • Media Center

    Community

    • Membership
    • Conference
    • Recognition
    • Sponsor Us

    Publish with EAI

    • Publishing
    • Journals
    • Proceedings
    • Books
    • EUDL