Security and Communication Networks

Security and Communication Networks / 2020 / Article
Special Issue

Recent Advances in Multiple Access for 5G-enabled IoT

View this Special Issue

Research Article | Open Access

Volume 2020 |Article ID 8842012 |

Jiangfeng Sun, Zhisong Bie, Hongxia Bie, Pengfei He, Machao Jin, "Secrecy Analysis of Cognitive Radio Networks over Generalized Fading Channels", Security and Communication Networks, vol. 2020, Article ID 8842012, 9 pages, 2020.

Secrecy Analysis of Cognitive Radio Networks over Generalized Fading Channels

Academic Editor: Lingwei Xu
Received24 Jul 2020
Revised20 Aug 2020
Accepted09 Sep 2020
Published22 Sep 2020


At present, the fifth generation (5G) communication networks are in the time of large-scale deployment principally because its characteristics consists of large bandwidth, fast response, and high stability. As a partner of 5G, the Internet of Things (IoT) involves billions of devices around the world, which can make the wireless communication environment more intelligent and convenient. However, the problem that cannot be ignored is the physical layer security of 5G-IoT networks. Based on this, we perform a security analysis of cognitive radio networks (CRN) for IoT, where the CRN is the single-input multiple-output (SIMO) model experiencing κ-μ shadowed fading with multiple eavesdroppers. To analyze the confidentiality of the system under consideration, we analyze the security performance for the considered IoT systems with the help of the derived secure outage probability (SOP) and probability of strictly positive secrecy capacity (SPSC). As a verification of the theoretical formula, Monte Carlo simulation is also provided. The results of great interest are the factors that can produce better security performance in high SNRs region which consist of smaller M, smaller , and larger N, and larger , smaller , and smaller .

1. Introduction

On the fifth generation (5G) networks, Internet of Things (IoT) technology makes the data exchange between people and things and objects and objects more rapid and intelligent [1]. However, the physical layer security (PLS) problem, that is, the confidential signals between IoT entities are easy to be intercepted and decoded by eavesdroppers [2]. Therefore, how to improve the confidentiality performance of IoT systems is an urgent issue to be solved. There are two methods to deal with this problem; the first is based on the encryption and decryption algorithm of the network layer and above, and the other is to improve the security capacity of the channel by using the characteristics of the fading channel. In recent years, the latter, namely, physical layer security, has gradually become a hot topic in security research. Based on the channel capacity theory [3] and the classic Wyner’s eavesdropping model [4], Wei et al. in [5] described the optimal power of artificial noise to ensure the best antieavesdropping ability in the wiretap networks experiencing Rayleigh fading. The PLS of nonorthogonal multiple access (NOMA) networks [6] and relaying 5G networks [7] with Rayleigh channels were developed. The authors in [8] studied the factors that affect the security capability of Wyner’s model based on Rician channel, where analytical SOP were deduced and proved. The physical performance and security of nonideal IoT networks over Nakagami-m fading channels were investigated through two important metrics, namely, outage probability (OP) and intercept probability (IP) [9].

Different from the channels described above, the universality of generalized channels, that can be equivalent to other fading channels, has recently received considerable attention. [1016]. On the premise of fully considering the actual unfavourable factors of the relaying wireless communication networks (WCNs) over Weibull channels, Li et al. [10] has completed the derivation of the exact formula of OP and the asymptote. The work in [11] developed the approximate expression of probability density function (PDF) and obtained the SOP analysis of the classical Wyner’s systems over generalized-K fading channels. Based on the proposed IoT relay networks, the authors of [12] explored the theoretical derivation and simulation analysis of OP and average symbol error probability (ASEP). In [13], when all the links in the wiretap networks suffered from κ-μ fading, Bhargav et al. derived the lower limit of SOP and the closed-form expression of SPSC. Under the condition of imperfect signal transmission, the authors in [14] obtained the theoretical formula of OP in considered model over α-μ fading with two different scenarios. Referring to Wyner’s classical wiretap model, Kong et al. derived and analyzed the SOP and the probability of nonzero secrecy capacity (PNZ) of Fox’s H-Function [15] channels and Fisher-Snedecor F [16] channels, respectively.

Recently, security issues are very important for popular applications such as Internet of vehicles [17], neural networks [18], and big data [19]. As a developing strategy to solve the obstacles of spectrum scarcity and power allocation in IoT networks, CRN can significantly improve the transmission range and quality have gained great attention in recent literatures [2026]. With the aid of artificial noise, the IP in the secondary network over Gaussian channel was investigated in [20]. The cooperation of multiple secondary users will further enhance the capacity of CRN; based on this, two different protocols were proposed, and achievable ergodic secrecy rate (ESR) was used to analyze the security performance of the considered system [21]. By employing a CRN network, which suffered from Rayleigh fading and had a legitimate receiver with multiple antennas, the authors of [22] provided the derivation of PNZ and SOP. In [23, 24], Lei et al. studied the security performance of CRNs undergoing Nakagami-m fading and generalized-K fading, respectively. The study of Zhang et al. [25] proposed a method to improve the security capacity of primary networks and secondary networks simultaneously and discussed the strategy of power allocation and band sharing. The authors in [26] studied the secrecy performance of nonorthogonal multiple access (NOMA) CRN over Nakagami-m fading channels, in which connection outage probability (COP), SOP, and effective secrecy throughput (EST) were obtained in a unified form.

More recently, the κ-μ shadowed model was first introduced by Paris in [27], and it is a generalized fading channel, which can be simplified as Rayleigh, Rician shadowed, one-side Gaussian, Nakagami-m, and κ-μ under suitable conditions. Moreover, the κ-μ shadowed fading can be applied to different systems including IoT links [28], satellite channels [29], and underwater links [30]. According to the proposed mobile communication model with κ-μ shadowed fading, the authors of [31] studied the transmission performance by analyzing OP and ergodic channel capacity (ECC). The statistical characteristics of different shadowed κ-μ fading were derived in [32], where the closed-form PDF and cumulative distribution function (CDF) for envelope and signal-to-noise ratio (SNR) were obtained, respectively. The work in [33] investigated the outage performance of hexagonal network affected by κ-μ shadowed fading in term of analyzing the performance benchmark, namely, outage probability and rate. Sun et al. in [34] presented the derivation of SOP and SPSC for the systems over κ-μ shadowed distribution, in which legitimate users and eavesdroppers were both single antenna receivers. As continuations of [34], the security analyses of SIMO networks and decode-and-forward (DF) relaying networks were carried out in [35, 36].

So far, we have not discovered relative research based on CRN over κ-μ shadowed distribution in the open database, let alone the existence of multiple antennas and multieavesdroppers. Therefore, combined with the advantages of multiantenna technology [37, 38], this paper is explored. We first present a CRN for IoT, in which the subchannels undergo κ-μ shadowed fading. Then, we derive the mathematical expressions of SOP and SPSC under the condition of multiple eavesdroppers. Finally, Monte Carlo simulations are provided to compare with the mathematical analysis; moreover, some valuable conclusions are obtained. The work can provide theoretical basis for the security performance evaluation of WCNs (5G, Internet of vehicles, etc.).

The paper is arranged as follows; this section mainly introduces the background, related literatures, and motivation. In Section 2, we explain the CRN model for IoT over κ-μ shadowed fading channels, and the PDF and CDF of the channels with multiple eavesdropping terminals are also illustrated. SOP analysis is presented in Section 3. The theoretical derivation of SPSC is made in Section 4. Section 5 provides the numerical results and some interesting results. The conclusions of the paper appear in Section 6.

2. IOT System Model and Properties of Generalized Channels

2.1. IOT System Model

The work considers a four entities CRN model for IoT, as shown in Figure 1, where S is the data source of the secondary networks, while P is the sender of the primary networks, and D is the preset receiver, which uses multiple antennas to receive signals. There are many eavesdroppers equipped with multiple antennas . The secondary network is composed of S, D, and E. Underlay CRN makes spectrum sharing possible, but the cost is that the power of S will not affect the communication of the main networks. is interpreted as the channel coefficient of the link and the channel coefficients of main link and wiretap link are and , respectively. It should be noted that and are vectors because of multiantenna reception at D and E. In our model, we consider passive eavesdropping scenarios, where S does not know the channel state information (CSI) of the wiretap link, but grasps the CSI of the main link.

S will communicate with P, D, and E in the considered IoT networks at the same time. Suppose the secret signal from S is ; then, we havewhere is the output power of S, is the signal received by P, is the complex white Gaussian noise on the link from S to P, the statistical expectation of is zero, and the standard deviation is . and represent the received signal matrices of D and E, while and denote noise matrices, and both standard deviations are .

2.2. Properties of Generalized Channels

The generalized channels considered in our IoT model is κ-μ shadowed fading channel. This section describes its statistical properties, mainly including the PDFs and CDFs for SNRs in link , link , and link . Relying on [27], the PDF for κ-μ shadowed variable can be expressed aswhere the parameters used to determine the κ-μ shadowed variable are , , and . and are described as the instantaneous SNR and average SNR on κ-μ shadowed fading channels, denotes the Gamma function (equation (8.310.1) in [39]), and is defined as confluent hypergeometric function (equation (9.14.1) in [39]), respectively.

According to (2) and [34], we can obtain the PDF and CDF for the SNR at the link from aswhere , . s in the lower right corner indicates that the parameter belongs to the channel .

Because the expected receiver (D) has antennas and the maximum ratio combining (MRC) merging is adopted, the pdf for random variable (RV) at can be formulated as [35]where means Pochammer calculation [39]. From (4), we can deduce the CDF of RV at asfor eavesdropping channel with multiple eavesdroppers cooperation. Employing [35], we can obtain the PDF of the eavesdropping link as

3. SOP Analysis

For the IoT systems, we need clear benchmarks to measure its security performance [40]. For the passive eavesdropping scenario considered in our model, SOPs are very suitable criteria, which can be understood as the probability that the difference value between the instantaneous capacity of the main link and the capacity of the eavesdropping link is less than a fixed threshold [41], and SOP can be written aswhere is the difference value between the instantaneous capacity of and .

Two constraints that must be considered in underlay CRN are (i) the power of S cannot exceed the maximum power value and (ii) the power of S should not exceed the threshold of anti-interference ability to the primary networks. Referring to (9) and [24], SOP in underlay CRN can be expressed aswhere X is the instantaneous SNR of the link of . Next, we will derive and in (9).

3.1. Calculation of

can be further written aswhere and , and we obtain

Employing (6) and (7), we havewhereutilizing equation (1.111) in [39],

Then, making using of equation (3.381.4) in [39], after a more complex integral operation, we havewhere

From (4), is derived as

3.2. Calculation of

It can be seen from (9), is stated as

Referring to [22], we can rewrite aswhere

In (20), . By means of (6) and (7), can be derived aswhere

Replacing in (19) with (21), then, after the integral is completed by using equation (3.351.2) in [39], we obtain the derivation of aswhere is called the incomplete Gamma function (equation (8.350.2) in [39]).

According to (15), (17), (23), and (9), we finally deduce the theoretical analysis formula of SOP.

4. SPSC Analysis

For passive eavesdropping scenarios, SPSC is often used to investigate the confidentiality of WCNs; therefore, we explore the SPSC of IoT networks in this section. According to the definition of SPSC in [41], we know that it can understand the probability that the difference value of instantaneous capacity between main channel and eavesdropping channel is not less than zero, which can be formulated as

For in (24), after replacing the integral term with (6) and (7), we can obtain

Finally, by employing (24), we can complete the proof of SPSC.

5. Numerical Results

In this part, we perform the theoretical simulations of (9) and (24). As a verification of correctness, Monte Carlo simulations are also obtained for comparison with the analysis results. From all simulation diagrams (Figures 29), we can capture the following information. (i) All the analysis curves coincide well with the statistical simulation curves. (ii) All simulation results change with abscissa, namely, , and the change trend indicates that a large can improve the security of IoT systems. Moreover, matlab simulations show that the convergence condition of the analytical expression including infinite series is that the upper limit of the cycle is 55 times.

Figures 2 and 3 indicate how the SOP and SPSC change with when M takes different values. From Figure 2, we can see that when is fixed, the value of SOP will rise along with the rise of M. In Figure 3, the increase of M will lead to the decrease of SPSC. Moreover, the distances between curves represented by different M are larger. Therefore, we conclude that the increase of the number of eavesdroppers will significantly reduce the performance of IoT model.

The influence of the number of antennas on the safety performance is provided in Figures 4 and 5. We assume . According to simulation curves, a valuable discovery is that when the value of abscissa is greater than 9 dB; the increase of antenna number, i.e., N, will decrease the SOP and increase the SPSC. This means that, under the mechanism of high SNR, the security can be improved by increasing the number of receiving antennas. On the contrary, in the case of small SNR, the increase of the number of antennas will reduce the ability of security.

When the shape parameters and of the generalized channel change, the security analyses are shown in Figures 6 and 7. We suppose that and , where the subscript S, D, and E indicate that the links are , , and , respectively. Referring to Figures 6(a) and 7(a), we can see that the gradual increase of causes the increase of SOP and the decrease of SPSC with dB. However, the effect of increasing on the IoT systems is opposite to that of based on Figures 6(b) and 7(b).

means the threshold of anti-interference ability to the primary networks. Figure 8 describes its effect on SOP for IoT networks under consideration.Rin represents the threshold value of security capacity interruption, the impact of its change on system performance is illustrated in Figure 9. When IP changes from 5 dB to −7 dB, then to 15 dB and from 0.1 dB to 0.5 dB and then to 1 dB, the change trend of SOP is gradually decreasing. Therefore, we can find that smaller and smaller will increase the probability of system security interruption. Moreover, it is interesting that the impact of on security is more significant than that of .

is also an important parameter of κ-μ shadowed distribution, which represents the degree of shadow fading. The simulation results show that when the high SNR is established, the increase of will improve the SPSC and reduce the SOP, but the difference between the curves is very small. In other words, the impact of on the security performance is not obvious.

Good security performance requires as small as possible SOP and as large as possible SPSC. Through the above analysis of all simulations, we can obtain that larger M, larger , and smaller N will worsen the security of the system when the SNR is large. Meanwhile, we also know that larger , smaller , and smaller will enhance the security performance.

6. Conclusion

In this paper, we explore PHY layer security of Underlay CRNs for IoT networks over generalized fading channels on the basis of the derived SOP and SPSC. The CRN model with multiple antennas can be used in many different situations. The analytical formulas for SOP and SPSC are derived in a concise form. The accuracy of the analytical formulas is verified by Monte Carlo simulations. Moreover, we discuss the influence of the parameters including M, N, , , , and on the security of IoT networks.

Data Availability

The data used to support the findings of this study are available from the corresponding author upon request.

Conflicts of Interest

The authors declare that there are no conflicts of interest regarding the publication of this paper.


This work was supported in part by the National Natural Science Foundation of China under Grant 41174158 and Ministry of Land and Resources P.R.C. Special Project in the Public Interest under Grant 201311195-04.


  1. G. A. Akpakwu, B. J. Silva, G. P. Hancke, and A. M. Abu-Mahfouz, “A survey on 5G networks for the Internet of things: communication technologies and challenges,” IEEE Access, vol. 6, pp. 3619–3647, 2018. View at: Publisher Site | Google Scholar
  2. M. Seliem, K. Elgazzar, and K. Khalil, “Towards privacy preserving IoT environments: a survey,” Wireless Communications And Mobile Computing, vol. 2018, Article ID 1032761, 15 pages, 2018. View at: Publisher Site | Google Scholar
  3. C. E. Shannon, “Communication theory of secrecy systems,” Bell System Technical Journal, vol. 28, no. 4, pp. 656–715, 1949. View at: Publisher Site | Google Scholar
  4. A. D. Wyner, “The wire-tap channel,” Bell System Technical Journal, vol. 54, no. 8, pp. 1355–1387, 1975. View at: Publisher Site | Google Scholar
  5. H. Wei, X. Hou, Y. Zhu, and D. Wang, “Security analysis for rayleigh fading channel by artificial noise,” in Proceedings of the 2014 Sixth International Conference On Wireless Communications And Signal Processing, pp. 1–6, WCSP), Hefei, China, 2014. View at: Google Scholar
  6. X. Li, M. Zhao, Y. Liu, L. Li, Z. Ding et al., “Secrecy analysis of ambient backscatter NOMA systems under I/Q imbalance,” IEEE Transactions on Vehicular Technology, p. 1, 2020. View at: Publisher Site | Google Scholar
  7. X. Li, H. Mengyan, Y. Liu, V. G. Menon, A. Paul, and Z. Ding, “I/Q imbalance aware nonlinear wireless-powered relaying of b5g networks: security and reliability analysis,” IEEE Transactions on Network Science and Engineering, Article ID 03902, 2006. View at: Publisher Site | Google Scholar
  8. Y. Ai, L. Kong, and M. Cheffena, “Secrecy outage analysis of double shadowed Rician channels,” Electronics Letters, vol. 55, no. 13, pp. 765–767, 2019. View at: Publisher Site | Google Scholar
  9. X. Li, M. Huang, J. Li, Q. Yu, K. Rabie et al., “Secure analysis of multi-antenna cooperative networks with residual transceiver HIs and CEEs,” IET Communications, vol. 13, no. 17, pp. 2649–2659, 2019. View at: Publisher Site | Google Scholar
  10. X. Li, J. Li, and L. Li, “Performance analysis of impaired SWIPT NOMA relaying networks over imperfect Weibull channels,” IEEE Systems Journal, vol. 14, no. 1, pp. 669–672, 2020. View at: Google Scholar
  11. H. Zhao, Y. Liu, A. Sultan-Salem, and M.-S. Alouini, “A simple evaluation for the secrecy outage probability over generalized-K fading channels,” IEEE Communications Letters, vol. 23, no. 9, pp. 1479–1483, 2019. View at: Publisher Site | Google Scholar
  12. A. Dziri, M. Terre, and N. Nasser, “Performance analysis of relay selection for iot networks over generalized k distribution,” in Proceedings of the 2019 15th International Wireless Communications And Mobile Computing Conference (IWCMC), pp. 1411–1415, Tangier, Morocco, 2019. View at: Google Scholar
  13. N. Bhargav, S. L. Cotton, and D. E. Simmons, “Secrecy capacity analysis over $\kappa $ - $\mu $ fading channels: theory and applications,” IEEE Transactions on Communications, vol. 64, no. 7, pp. 3011–3024, 2016. View at: Publisher Site | Google Scholar
  14. X. Li, J. Li, Y. Liu, Z. Ding, and A. Nallanathan, “Residual transceiver hardware impairments on cooperative NOMA networks,” IEEE Transactions on Wireless Communications, vol. 19, no. 1, pp. 680–695, 2020. View at: Publisher Site | Google Scholar
  15. L. Kong, G. Kaddoum, and H. Chergui, “On physical layer security over fox’s $H$-function wiretap fading channels,” IEEE Transactions on Vehicular Technology, vol. 68, no. 7, pp. 6608–6621, 2019. View at: Publisher Site | Google Scholar
  16. L. Kong and G. Kaddoum, “On physical layer security over the Fisher-snedecor ${\mathcal{F}}$ wiretap fading channels,” IEEE Access, vol. 6, pp. 39466–39472, 2018. View at: Publisher Site | Google Scholar
  17. L. Xu, X. Yu, H. Wang et al., “Physical layer security performance of mobile vehicular networks,” Mobile Networks and Applications, vol. 25, no. 2, pp. 643–649, 2020. View at: Google Scholar
  18. L. Xu, J. Wang, H. Wang et al., “BP neural network-based ABEP performance prediction for mobile internet of things communication systems,” Neural Computing And Applications, 2019. View at: Publisher Site | Google Scholar
  19. H. Wang, L. Xu, Z. Yan, and T. A. Gulliver, “Low complexity MIMO-FBMC sparse channel parameter estimation for industrial big data communications,” IEEE Transactions on Industrial Informatics, vol. 2020, Article ID 2995598, 11 pages, 2020. View at: Publisher Site | Google Scholar
  20. P. Xie, M. Zhang, G. Zhang, R. Zheng et al., “On physical-layer security for primary system in underlay cognitive radio networks,” IET Networks, vol. 7, no. 2, pp. 68–73, 2018. View at: Publisher Site | Google Scholar
  21. M. Qin, S. Yang, H. Deng, and M. H. Lee, “Enhancing security of primary user in underlay cognitive radio networks with secondary user selection,” IEEE Access, vol. 6, pp. 32624–32636, 2018. View at: Publisher Site | Google Scholar
  22. H. Zhao, H. Liu, Y. Liu, C. Tang, and G. Pan, “Physical layer security of maximal ratio combining in underlay cognitive radio unit over rayleigh fading channels,” in Proceedings of the 2015 IEEE International Conference On Communication Software And Networks, pp. 201–205, ICCSN), Chengdu, China, 2015. View at: Google Scholar
  23. H. Lei, H. Zhang, I. S. Ansari, C. Gao et al., “Secrecy outage performance for SIMO underlay cognitive radio systems with generalized selection combining over Nakagami-,” IEEE Transactions on Vehicular Technology, vol. 65, no. 12, pp. 10126–10132, 2016. View at: Publisher Site | Google Scholar
  24. H. Lei, H. Zhang, I. S. Ansari, G. Pan, and K. A. Qaraqe, “Secrecy outage analysis for SIMO underlay cognitive radio networks over generalized-K fading channels,” IEEE Signal Processing Letters, vol. 23, no. 8, pp. 1106–1110, 2016. View at: Google Scholar
  25. Y. Zhang, R. Lu, B. Cao, and Q. Zhang, “Cooperative jamming-based physical-layer security of cooperative cognitive radio networks: system model and enabling techniques,” IET Communications, vol. 13, no. 5, pp. 539–544, 2019. View at: Publisher Site | Google Scholar
  26. Z. Xiang, W. Yang, G. Pan, Y. Cai et al., “Physical layer security in cognitive radio inspired NOMA network,” IEEE Journal of Selected Topics in Signal Processing, vol. 13, no. 3, pp. 700–714, 2019. View at: Publisher Site | Google Scholar
  27. J. F. Paris, “Statistical characterization of κ-μ shadowed fading,” IEEE Transactions on Vehicular Technology, vol. 63, no. 2, pp. 518–526, 2014. View at: Publisher Site | Google Scholar
  28. L. Moreno-Pozas, F. J. Lopez-Martinez, S. L. Cotton, J. F. Paris, and E. Martos-Naya, “Comments on human body shadowing in cellular device-to-device communications: channel modelling using the shadowed κ-μ fading model,” IEEE Journal on Selected Areas in Communications, vol. 35, no. 2, pp. 517–520, 2017. View at: Publisher Site | Google Scholar
  29. M. K. Arti, “Beamforming and combining based scheme over κ-μ shadowed fading satellite channels,” IET Communications, vol. 10, no. 15, pp. 2001–2009, 2016. View at: Publisher Site | Google Scholar
  30. E. Illi, F. El Bouanani, and F. Ayoub, “Asymptotic analysis of underwater communication system subject to κ-μ shadowed fading channel,” in Proceedings of the 2017 13th International Wireless Communications And Mobile Computing Conference, pp. 855–860, IWCMC), Valencia, Spain, 2017. View at: Google Scholar
  31. I. Singh and N. P. Singh, “Outage probability and ergodic channel capacity of underlay device-to-device communications over κ-μ shadowed fading channels,” Wireless Networks, vol. 26, no. 1, pp. 573–582, 2020. View at: Publisher Site | Google Scholar
  32. N. Simmons, C. R. N. Da Silva, S. L. Cotton, P. C. Sofotasios et al., “On shadowing the κ-μ fading model,” IEEE Access, vol. 2020, Article ID 3005527, 9 pages, 2020. View at: Publisher Site | Google Scholar
  33. S. Kumar and S. Kalyani, “Outage probability and rate for κ-μ shadowed fading in interference limited scenario,” IEEE Transactions on Wireless Communications, vol. 16, no. 12, pp. 8289–8304, 2017. View at: Publisher Site | Google Scholar
  34. J. Sun, X. Li, M. Huang, Y. Ding, J. Jin et al., “Performance analysis of physical layer security over κ-μ shadowed fading channels,” IET Communications, vol. 12, no. 8, pp. 970–975, 2018. View at: Publisher Site | Google Scholar
  35. J. Sun, H. Bie, X. Li, K. M. Rabie, and R. Kharel, “Average secrecy capacity of simo κ-μ shadowed fading channels with multiple eavesdroppers,” in Proceedings of the 2020 IEEE Wireless Communications And Networking Conference (WCNC), pp. 1–6, Seoul, Korea, 2020. View at: Google Scholar
  36. J. Sun, H. Bie, and X. Li, “Security performance analysis of SIMO relay systems over Composite Fading Channels,” KSII Transactions on Internet and Information Systems, vol. 14, no. 6, pp. 2649–2669, 2020. View at: Google Scholar
  37. Z. Chu, Z. Zhu, M. Johnston, and S. Y. Le Goff, “Simultaneous wireless information power transfer for MISO secrecy channel,” IEEE Transactions on Vehicular Technology, vol. 65, no. 9, pp. 6913–6925, 2016. View at: Publisher Site | Google Scholar
  38. Z. Zhu, Z. Chu, F. Zhou, H. Niu, Z. Wang et al., “Secure beamforming designs for secrecy MIMO SWIPT systems,” IEEE Wireless Communications Letters, vol. 7, no. 3, pp. 424–427, 2018. View at: Publisher Site | Google Scholar
  39. I. S. Gradshteyn and I. M. Ryzhik, Table of Integrals, Series, and Products, Academic Press, Cambridge, MA, USA, 2007.
  40. N. Neshenko, E. Bou-Harb, J. Crichigno, G. Kaddoum, and N. Ghani, “Demystifying IoT security: an exhaustive survey on IoT vulnerabilities and a first empirical look on internet-scale IoT exploitations,” IEEE Communications Surveys and Tutorials, vol. 21, no. 3, pp. 2702–2733, 2019. View at: Publisher Site | Google Scholar
  41. M. Bloch, J. Barros, M. R. Rodrigues, and S. W. McLaughlin, “Wireless information-theoretic security,” IEEE Transactions on Information Theory, vol. 54, no. 6, pp. 2515–2534, 2008. View at: Publisher Site | Google Scholar

Copyright © 2020 Jiangfeng Sun et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

More related articles

 PDF Download Citation Citation
 Download other formatsMore
 Order printed copiesOrder

Related articles

We are committed to sharing findings related to COVID-19 as quickly as possible. We will be providing unlimited waivers of publication charges for accepted research articles as well as case reports and case series related to COVID-19. Review articles are excluded from this waiver policy. Sign up here as a reviewer to help fast-track new submissions.