Technical ReportPDF Available

Performance Analysis of Delay-Constrained Wireless Energy Harvesting Communication Networks under Jamming Attacks

Authors:

Abstract and Figures

In wireless energy harvesting communication net-works, a user receives wireless energy released by an ambient or dedicated energy source, and uses that energy for delay constrained data transmission. However, such data transmission can be susceptible to a jamming attack from a nearby attacker also harvesting from the wireless energy source. In this paper, we consider such a scenario and present performance analysis. In particular, we develop an analytical model for the network based on a Markov chain to obtain various performance measures for the user including throughput and delay distribution. The perfor-mance evaluation shows some interesting results. For example, under the jamming attack, there is the maximum throughput achievable by the user. We also validate the analytical model using simulation.
Content may be subject to copyright.
1
Performance Analysis of Delay-Constrained
Wireless Energy Harvesting Communication
Networks under Jamming Attacks
Dusit Niyato1, Ping Wang1, Dong In Kim2, Zhu Han3, and Lu Xiao1
1School of Computer Engineering, Nanyang Technological University (NTU), Singapore
2School of Information and Communication Engineering, Sungkyunkwan University (SKKU), Korea
3Department of Electrical and Computer Engineering, University of Houston, Texas, USA
Abstract—In wireless energy harvesting communication net-
works, a user receives wireless energy released by an ambient
or dedicated energy source, and uses that energy for delay
constrained data transmission. However, such data transmission
can be susceptible to a jamming attack from a nearby attacker
also harvesting from the wireless energy source. In this paper, we
consider such a scenario and present performance analysis. In
particular, we develop an analytical model for the network based
on a Markov chain to obtain various performance measures for
the user including throughput and delay distribution. The perfor-
mance evaluation shows some interesting results. For example,
under the jamming attack, there is the maximum throughput
achievable by the user. We also validate the analytical model
using simulation.
Index Terms—Wireless harvesting communication networks,
jamming attack, delay-constrained.
I. INT ROD UC TI ON
Wireless energy harvesting or wireless powered commu-
nication networks allow a user’s device to receive wireless
energy (e.g., RF signals) transferred from energy sources [1].
The device can use the energy for data transmission, removing
reliance on limited supplied energy from a battery or external
sources. The data generated by the user can be real-time
(e.g., multimedia or biosignal) that it has to be transmitted
before a certain deadline. However, the data transmission by
the user can be susceptible to jamming by a malicious node
(i.e., an attacker) trying to disrupt the operation or degrade
the performance of the network. The attacker can also receive
the energy from the same wireless energy source, incurring
zero cost in jamming. Therefore, it is important to analyze
the the wireless energy harvesting communication network to
investigate the network performance (e.g., delay performance),
impact of the jamming attack (e.g., detrimental throughput),
and optimal parameter setting (e.g., packet generation rate).
Jamming attack has been considered in wireless networks
as it can cause severe performance degradation or interruption
of network operations. Traditionally, the attacker uses fixed
energy supply to perform jamming. The authors of [2] an-
alyzed the IEEE 802.11 networks under different jamming
attack strategies (e.g., periodic and random jamming). A
Markov chain model was developed to investigate the effect
of jamming. The optimization of the network with users and
attackers was investigated, e.g., using game theory [3], [4],
[5], [6]. Particularly, the authors of [5] presented an analytical
model of jamming attack in time-critical wireless applications.
The jamming attack detection based on estimation (JADE)
scheme was also proposed to achieve robust jamming detection
for the user. A Markov decision process was used [7] to
find an optimal transmission policy under the attack. In the
wireless energy harvesting communication network, the major
security concern is eavesdropping in which eavesdroppers exist
in the network and secretly decode information from the
users. A few works analyzed and optimized secrecy rate in
the network, e.g., [8], [9], [10]. [11] considered a jammer,
but to jam eavesdroppers to improve the secrecy rate of the
legitimate users. None of existing work considers the jamming
attack to degrade the user’s performance in the wireless energy
harvesting communication network.
In this paper, we consider the wireless energy harvesting
communication networks with a user and attacker. The user
transmits delay constrained packets to a receiver. If the packet
cannot be successfully transmitted before its deadline, it will
be dropped. There is a wireless energy source in the network,
releasing or transferring wireless energy. The user harvests the
energy and uses it for packet transmission. However, a nearby
attacker can also receive the energy and use the energy for the
jamming attack. We present an analytical model based on a
Markov chain to analyze the performance of the network under
the jamming attack. We derive the throughput of the user (i.e.,
the total amount of packets per unit time that are transmitted
successfully before the deadline). The performance evaluation
provides the model validation using simulation.
Note that [12] considers a similar jamming attack in wire-
less powered communication network. However, it does not
consider delay constrained data transmission. Additionally, the
energy harvesting process of the user and attacker are assumed
to be independent.
The rest of this paper is organized as follows. Section II
describes the system model and states the assumptions used
in this paper. Section III presents the Markov chain model
and derive performance measures. Section IV presents the
performance evaluation. Section V summarizes the paper.
2
II. SY ST EM MO DE L
A. Network Model
+
-
+
-
User
Wireless
energy
source
Energy
storage
Transmitter
Attacker
Jamming
attack
Receiver
Packet
arrival
Packet drop
Fig. 1. System model.
We consider the wireless energy transfer/harvesting com-
munication network as shown in Fig. 1. In the network,
there are the legitimate user and attacker. The user harvests
wireless energy from the wireless energy source (e.g., an RF
source). The harvested energy is stored in the energy storage
of the user and the energy is used to transmit his/her packet.
The packet generated by a user’s application will be stored
in the data queue. However, the packet has the maximum
delay limit (i.e., deadline). That is, if the packet cannot be
transmitted successfully before the deadline, the packet will
be discarded from the queue. The maximum delay limit is
fixed for all packets and it is measured from when the packet
is generated. The attacker secretly harvests energy from the
wireless energy source. Similarly, the harvested energy is
stored in the energy storage. The attacker requires certain
units of energy to perform a jamming attack. If the jamming
attack is performed, the packet transmission by the user will
be corrupted. If the deadline of the corrupted packet is not
reached, the user will re-transmit the packet.
Note that the energy level of the energy storage of the user
and the energy unit of the attacker can be different, depending
on their circuit characteristics. Additionally, we consider the
out-of-band energy transfer/harvesting network. In particular,
the user and attacker can harvest energy, transmit a packet,
and perform the jamming attack simultaneously.
B. Assumptions
To analyze the performance of the wireless energy trans-
fer/harvesting communication network with jamming attack,
we will develop an analytical model based on a Markov chain.
We make the following assumptions for the user.
We consider a time slotted system, where packet trans-
mission and jamming attack align to a time slot structure.
The packet arrival/generation probability of the user is
denoted by α.
The maximum delay limit (i.e., deadline) of the packet is
denoted by Dtime slots.
The successful packet transmission probability (i.e., with-
out the jamming attack) of the user is denoted by µ.
The maximum energy level of the energy storage of the
user is denoted by E.
The wireless energy source transfers energy with prob-
ability λ. Therefore, the energy level of the user can
increase by one with the probability λ.
If the user transmits a packet, the energy level of the
storage decreases by one..
The following assumptions are made for the attacker.
Given that the wireless energy source transfers energy,
the attacker can harvest one unit of the energy with
probability γ.
The maximum units of the energy storage of the attacker
is denoted by B. Without loss of generality, the attacker
performs the jamming attack when there is Bunits of
energy in its storage.
The attacker cannot harvest wireless energy from the
user’s transmission (e.g., the user transmits at much lower
power than that of the energy source).
III. QUEUEING MODEL
In this section, we present a Markov chain model (i.e., a
queueing model) to analyze the performance of the user in
the wireless energy harvesting communication network with
the attacker. We first show the state space. Then we explain
the delay state transition and the transition matrix afterward.
A. State Space
The discrete-time Markov chain of the network has the
following state space,
= D0,D1, . . . , DD,E,B;Dd {0,1},
E {0,1, . . . , E },B {0,1, . . . , B},(1)
where Ddrepresents the number of packets that is experi-
encing the delay of dtime slots. Since only one packet can
be generated in a time slot, the maximum number of packets
having a certain delay is one. Erepresents the energy level of
the user, and Brepresents the unit of energy that the attacker
accumulates.
B. Delay State Transition
In every time slot, the packet can arrive at the queue of
the user. Similarly, if there is enough energy in the energy
storage of the user, the packet may depart from the queue.
We model the delay state of the packet using variables Ddfor
d= 0,1, . . . , D.
There are four cases associated with the delay state transi-
tion.
1) Without packet arrival and without packet departure: In
this case, the delay of each packet will increase by one,
and there is no new packet in the queue of the user.
The state will be Dd=Dd1, for d=D, D 1, . . . , 1
and D0= 0. In particular, The delay dof a packet will
3
become d+ 1 in each time slot, and there is no new
packet with the delay 0. Note that the packet with the
maximum delay Dwill be removed from the queue by
either successfully transmitted or discarded (i.e., DD=
DD1). The probability for this case is (1 α)(1
ˆµ(E,B)).
2) With packet arrival and without packet departure: The
delay of each packet will increase by one, and there is
new packet in the queue. The state will be Dd=Dd1,
for d=D, D 1, . . . , 1and D0= 1. Here, the new
packet will have the delay 0. The probability for this
case is α(1 ˆµ(E,B)).
3) Without packet arrival and with packet departure: The
head-of-queue packet with the largest delay in the queue
will be removed. The largest delay is denoted by dL=
maxd∈{D,D1,...,0}Ddsubject to Dd= 1. In this case,
the state will become Dd=Dd1, for d=dL, dL
1, . . . , 1and D0= 0. Again, there is no packet with the
delay 0. The probability for this case is (1 α)ˆµ(E,B).
4) With packet arrival and with packet departure: Similarly,
the head-of-queue packet with the largest delay will be
removed. The state will be Dd=Dd1, for d=dL, dL
1, . . . , 1and D0= 1. The probability for this case is
αˆµ(E,B).
ˆµ(E,B)is the actual packet departure probability. This prob-
ability can be defined based on the energy states of the user
and attacker (i.e., Eand B, respectively) as follows:
ˆµ(E,B) = µ, E>0and B =B,
0,otherwise.(2)
The packet departure probability is the successful packet
transmission if the user has enough energy, and the attacker
does not perform the jamming attack due to insufficient energy.
Otherwise, the packet will not be successfully transmitted.
Figure 2 illustrates an example of state transition. The
maximum delay limit is D= 3. The current state is
(D0,D1,D2,D3) = (1,0,1,0). For example, without packet
arrival and without packet departure, the state D2is shifted
to D3, and the state D0is shifted to D1. The new state
becomes (0,1,0,1). For another example, with packet arrival
and with packet departure, the state D2is clear to 0 (i.e.,
packet departure), the state D0is shifted to D1, and the state
D0is set to 1 (i.e., packet arrival). The new state then becomes
(1,1,0,0).
C. Transition Matrix
Let Dq(E,B)denote the transition matrix of the delay state
when there are qpackets in the queue given the energy states
Eand Bof the user and attacker, respectively. The element of
the matrix Dq(E,B)corresponds to the current delay state
(D0, . . . , DD)and the next delay state (D
0, . . . , D
D). The
element of this matrix is obtained as presented in Section III-B.
Then, the matrix Dq(E,B)is derived based on the different
cases as follows:
D0,D1,D2,D3
1, 0, 1, 0
With packet arrival and
without packet departure
Without packet arrival and
without packet departure
Without packet arrival and
with packet departure
With packet arrival and
with packet departure
D0,D1,D2,D3
1, 1, 0, 0
D0,D1,D2,D3
0, 1, 0, 0
D0,D1,D2,D3
1, 1, 0, 1
D0,D1,D2,D3
0, 1, 0, 1
Fig. 2. Example of state transition.
For q= 0, there is no packet transmission, and hence
the energy of the user will increase if there is wireless
energy transfer, or will remain the same if there is no
wireless energy from the energy source. Therefore, the
elements of matrix Dq=0(E,B)in other rows except that
associated with the state (D0, . . . , DD) = (0, . . . , 0) will
be zero.
For q > 0, there could be packet transmission, and
hence the energy of the user will decrease. Therefore,
the elements of matrix Dq>0(E,B)associated with the
state (D0, . . . , DD) = (0, . . . , 0) will be zero.
Then, the transition matrix of the delay state and energy state
of the user can be expressed as in (3) and (4). 0is a matrix
of ones with an appropriate size. D(E,B) = Dq=0(E,B) +
Dq>0(E,B).λ= 1 λis the probability that there is no
energy arrival (i.e., the energy source does not transfer wireless
energy). The matrices E(B)and E(B)correspond to the cases
that there is and there is no energy arrival, respectively. Each
row of matrices E(B)and E(B)corresponds to the energy
level of the user. In this case, the energy level decreases if
there is no energy arrival, and the user transmits a packet
(i.e., q > 0). The energy level increases if there is energy
arrival, and the user does not transmit a packet (i.e., q= 0).
Otherwise, the energy level remains the same.
Finally, we derive the transition matrix Pof the delay state,
energy states of the user and attacker, and it is expressed as in
(5), where γ= 1γis the probability that the attacker cannot
harvest wireless energy from the energy source. The row of
matrix Pcorresponds to the units of energy in the storage
of the attacker. In this case, the energy unit of the attacker
increases only when the energy source transfers energy (i.e.,
E(B)) and the attacker can successfully harvest the energy
(i.e., γ). When the attacker accumulates enough energy to
perform the jamming attack, the energy state is reset to zero
or one if it cannot or it can harvest the energy in that slot,
respectively.
D. Performance Measures
To obtain the performance measure of the network, we
obtain the steady state probability of the Markov chain. Let
π(D0,D1, . . . , DD,E,B)denote the steady state probability.
Its vector is denoted by
π, which is obtained from solving
4
E(B) =
λD(E= 0,B)0
λDq>0(E= 1,B)λDq=0(E= 1,B)0
.........
λDq>0(E=E1,B)λDq=0(E=E1,B)0
λDq>0(E=E, B)λDq=0(E=E, B)
,(3)
E(B) =
0λD(E= 0,B)
0λDq>0(E= 1,B)λDq=0(E= 1,B)
.........
0λDq>0(E=E1,B)λDq=0(E=E1,B)
0λ(Dq>0(E=E, B) + Dq=0(E=E, B))
,(4)
P=
E(B= 0) + γE(B= 0) γE(B= 0)
E(B= 1) + γE(B= 1) γE(B= 1)
......
E(B=B1) + γE(B=B1) γE(B=B1)
E(B=B) + γE(B=B)γE(B=B)· · · 0
,
(5)
πP=
πand
π
1= 1, where
1is a vector of ones with
an appropriate size.
The throughput τof the user can be obtained from (6),
where 1(X)is an indicator function, returning 1 if Xis
true and 0 otherwise.
The delay distribution ϕd(i.e., the probability that the
successfully transmitted packet experiences the delay d
time slots) is obtained from
ϕd=ˆ
ϕd
D
d=0 ˆ
ϕd
,(7)
where ˆ
ϕdgiven in (9) is the overall probabil-
ity that the successfully transmitted packet experi-
ences the delay dtime slots. It is the probability
that the head-of-queue packet with the largest delay
dis successfully transmitted. The indicator function
1 (Dd= 1&Dd+1 = 0& · · · &DD= 0) returns one for
the delay variable Dd= 1 (i.e., the head-of-queue packet
has the delay d), where for other larger delay Dd= 0
for d=d+ 1, . . . , D. The delay distribution is obtained
by normalizing this overall probability.
The average delay is obtained from
d=
D
d=0
d.(8)
The attack hit rate his the probability that the jamming
attack successfully corrupts the packet transmission of
the user. The attack hit rate is obtained from (10). It is
obtained similar to that of the throughput, except that
the attacker must accumulate enough energy (i.e., B=
B) and it performs the jamming attack when the user
transmits a packet.
The average energy level of the user is obtained from
(11).
IV. PERFORMANCE EVALUATION
A. Parameter Setting
We consider the wireless energy harvesting network as
shown in Fig. 1 with a user and attacker. The energy storage
of the user has the capacity of 10 levels of energy. Unless
otherwise stated, for the user, the packet arrival probability
is 0.8 and the successful packet transmission probability is
1.0 (i.e., without a jamming attack from the attacker). The
maximum delay limit of the user is 5 time slots. The wireless
energy transfer probability is 0.4. For the attacker, if the wire-
less energy is available, it can harvest one unit of energy with
the probability of 0.5. The attacker requires 3 units of energy
to perform the jamming attack to the user’s transmission.
B. Numerical Results
We first show the throughput of the user when the packet
arrival probability (i.e., rate) is varied. Figure 3 shows that
first the throughput increases as the packet arrival probability
increases. However, at a certain point, the throughput decreases
and becomes constant. The throughput decreases as more
packets are generated, they will suffer from the jamming from
the attacker. Therefore, the throughput decreases. This increase
and decrease effect does not happen if there is no jamming
attack. That is, the throughput only increases and becomes sat-
urated. We observe that there is the packet arrival probability
5
τ=
1
D0=0
· · ·
1
DD=0
E
E=1
B1
B=0
µπ(D0,D1, . . . , DD,E,B)1 D
d=0
Dd>0,(6)
ˆ
ϕd=
1
D0=0
···
1
DD=0
E
E=1
B1
B=0
µπ(D0,D1, . . . , DD,E,B)1 (Dd= 1&Dd+1 = 0& · · · &DD= 0) ,(9)
h=
1
D0=0
· · ·
1
DD=0
E
E=1
B=B
π(D0,D1, . . . , DD,E,B)1 D
d=0
Dd>0,(10)
e=
1
D0=0
· · ·
1
DD=0
E
E=0
B
B=0
Eπ(D0,D1, . . . , DD,E,B),(11)
0.3 0.4 0.5 0.6 0.7 0.8 0.9
0.25
0.3
0.35
0.4
Energy required to attack=3 units
Energy required to attack=4 units
Energy required to attack=5 units
Packet arrival probability
Throughput
Analysis
Simulation
Without attack
Fig. 3. Throughput of a user under different packet arrival probability.
that yields the highest throughput, which can be obtained from
the proposed analytical model. Additionally, the analytical
results obtained from the queueing model is well validated
by the simulation. Note that when the attacker requires more
units of energy to perform the jamming, the attacker has less
opportunity to attack, and hence the throughput of the user is
higher.
Figure 4 shows the delay distribution of the user under
a jamming attack. As expected, when the packet arrival
probability increases, the probabilities of large delay increase
(e.g., delays of 4 and 5 time slots), while those of the small
delays decrease. Clearly, when the packet arrival probability is
very high (e.g., above 0.7), most of the packets experience the
delay of 5 time slots, and hence the corresponding probability
constantly increases. Figure 4 also shows that the analytical
results are accurately matched with the simulation results.
Figure 5 shows the average packet delay of the user when
the wireless energy transfer probability is varied. As there
is more energy, the user can transmit the packet earlier,
increasing the throughput and reducing the delay. However,
0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9
0
0.2
0.4
0.6
0.8
1
Packet arrival probability
Probability
Delay=1
Delay=2 Delay=3
Delay=4
Delay=5
Analysis
Simulation
Fig. 4. Delay distribution under different packet arrival probability.
0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
1
1.5
2
2.5
3
3.5
4
4.5
5
5.5
6
Energy transfer probability
Average delay
Arrival prob = 0.2 (analysis)
Arrival prob = 0.2 (simulation)
Arrival prob = 0.5 (analysis)
Arrival prob = 0.5 (simulation)
Arrival prob = 0.8 (analysis)
Arrival prob = 0.8 (simulation)
Fig. 5. Average delay under different wireless energy transfer probability.
we observe an interesting result that if the energy transfer
probability is higher than the demand of the user, the average
delay can increase. This is due to the fact that when there is not
6
enough energy, many packets which reach the deadline will
be dropped. By contrast, the rest of packets which have small
delay will have higher chance to be transmitted successfully.
However, if there is enough energy, many packets can be
successfully transmitted, even through their delay is large.
Therefore, the overall delay (i.e., average delay) decreases.
Note that, as expected, when the packet arrival probability
increases, the delay increases.
1 2 3 4 5 6 7
0.34
0.36
0.38
0.4
Maximum delay
Throughput
Analysis
Simulation
No attack
1 2 3 4 5 6 7
0
2
4
6
8
Maximum delay
Average delay
Analysis
Simulation
No attack
Fig. 6. Throughput and average delay under different maximum delay limit.
Next, we show some interesting result when the maximum
delay limit (i.e., deadline) is varied. As shown in Fig. 6,
without attack, as expected, when the delay deadline increases,
the user has more time to transmit a packet, and hence the
throughput slightly increases. However, under the jamming
attack, the throughput of the user decreases. This is due to the
fact that when the maximum delay limit increases, the packet
can remain in the queue of the user longer. The transmission
can be jammed and the packet has to be retransmitted a few
more times, consuming more energy from the storage (i.e.,
average energy level of the user decreases as shown in Fig. 7).
This can be also observed from the attack hit rate, which is
increasing as the maximum delay limit of the user increases.
Therefore, under the jamming attack, there is an adverse effect
of increasing the maximum delay limit, not only increasing
average delay, but also decreasing throughput.
V. SU MM ARY
We have analyzed the wireless energy harvesting com-
munication network with a legitimate user transmitting data
to a receiver and an attacker performing jamming attack to
the user’s data transmission. The data transmission of the
user is delay constrained that a packet will be dropped if
it cannot be successfully transmitted before the deadline.
We have developed an analytical model based on a Markov
chain for the network capturing the delay state and energy
states of the user and attacker. Various performance measures
(e.g., throughput and delay distribution) have been obtained.
Performance evaluation has revealed some unexpected results.
1 2 3 4 5 6 7
0.05
0.055
0.06
0.065
0.07
Maximum delay
Attack hit rate
Analysis
Simulation
1 2 3 4 5 6 7
0.35
0.4
0.45
0.5
0.55
Maximum delay
Average energy level of user
Analysis
Simulation
No attack
Fig. 7. Attack hit probability and average energy level of a user under different
maximum delay limit.
For example, there is an optimal throughput for the user under
different packet arrival rate under the jamming attack.
ACK NOW LE DG EM EN TS
This work was supported in part by the National Research
Foundation of Korea (NRF) grant funded by the Korean
government (MSIP) (2014R1A5A1011478).
REF ER EN CE S
[1] X. Lu, P. Wang, D. Niyato, D. I. Kim, and Z. Han, “Wireless Network
with RF Energy Harvesting: A Contemporary Survey” (available online
at arXiv: 1406.6470)
[2] E. Bayraktaroglu, C. King, X. Liu, G. Noubir, R. Rajaraman, and
B. Thapa, “On the Performance of IEEE 802.11 under Jamming,” in
Proceedings of IEEE INFOCOM, April 2008.
[3] Y. E. Sagduyu, R. A. Berry, and A. Ephremides, “Jamming games in
wireless networks with incomplete information,” IEEE Communica-
tions Magazine, vol. 49, no. 8, pp. 112-118, August 2011.
[4] K. Firouzbakht, G. Noubir, and M. Salehi, “On the Performance of
Adaptive Packetized Wireless Communication Links Under Jamming,”
IEEE Transactions on Wireless Communications, vol. 13, no. 7, pp.
3481-3495, July 2014.
[5] Z. Lu, W. Wang, and C. Wang, “Modeling, Evaluation and Detection
of Jamming Attacks in Time-Critical Wireless Applications, IEEE
Transactions on Mobile Computing, vol. 13, no. 8, pp. 1746-1759,
August 2014.
[6] Q. Zhu, H. Li, Z. Han, and T. Basar, “A Stochastic Game Model for
Jamming in Multi-Channel Cognitive Radio Systems, in Proceedings
of IEEE International Conference on Communications (ICC), 23-27
May 2010.
[7] Y. Wu, B. Wang, and K. J. R. Liu, “Optimal Defense against Jamming
Attacks in Cognitive Radio Networks Using the Markov Decision
Process Approach,” in Proceedings of Global Telecommunications
Conference (GLOBECOM), 6-10 Dec. 2010.
[8] L. Liu, R. Zhang, and K. C. Chua, “Secrecy wireless information and
power transfer with MISO beamforming, IEEE Transactions on Signal
Processing, vol. 62, no. 7, pp. 1850-1863, April 2014.
[9] B. Zhu, J. Ge, Y. Huang, Y. Yang, and M. Lin, “Rank-Two beamformed
secure multicasting for wireless information and power transfer, IEEE
Signal Processing Letters, vol. 21, no. 2, pp. 199-203, February 2014.
[10] Q. Li, Q. Zhang, and J. Qin, “Secure relay beamforming for simultane-
ous wireless information and power transfer in non-regenerative relay
networks,” IEEE Transactions on Vehicular Technology, vol. 63, no. 5,
pp. 2462-2467, Jun 2014.
7
[11] A. Mukherjee and J. Huang, “Deploying multi-antenna energy-
harvesting cooperative jammers in the MIMO wiretap channel, in
Proceedings of IEEE Conference Record of the Forty Sixth Asilomar
Conference on Signals, Systems and Computers (ASILOMAR), pp.
1886-1890, 4-7 November 2012.
[12] D. Niyato, P. Wang, D. I. Kim, Z. Han, and L. Xiao, “Game theoretic
modeling of jamming attack in wireless powered communication
networks,” submitted.
... Moreover, the transmission distance is limited, typically ranging from several feet to tens of feet [8], [10] due to severe propagation attenuation and embedded modulation for an intended receiver. To address these shortcomings, in this paper, we introduce a novel hybrid D2D communication paradigm that integrates ambient backscattering and wireless-powered communications [12]- [14] as a self-sustainable communication method. For communication, the proposed hybrid D2D transmitter harvests energy from ambient RF signals and can select to perform ambient backscattering or wireless-powered communications with the aim of extending the applicability as well as functionality. ...
... Then, by plugging B PTP in (13), C B in (14) and C H in (15) into (16), we have (4). ...
... According to the criteria of STP, C STP can be expressed by C PTP in (16) with B PTP replaced by B STP . One simply notes that the definition of B STP is equivalent to the expression of C B in (14). Hence, we have ...
Article
Full-text available
Self-sustainable communications based on advanced energy harvesting technologies have been under rapid development, which facilitate autonomous operation and energy-efficient transmission. Recently, ambient backscattering that leverages existing RF signal resources in the air has been invented to empower data communication among low-power devices. In this paper, we introduce hybrid device-to-device (D2D) communications by integrating ambient backscattering and wireless-powered communications. The hybrid D2D communications are self-sustainable, as no dedicated external power supply is required. However, since the radio signals for energy harvesting and backscattering come from external RF sources, the performance of the hybrid D2D communications needs to be optimized efficiently. As such, we design two mode selection protocols for the hybrid D2D transmitter, allowing a more flexible adaptation to the environment. We then introduce analytical models to characterize the impacts of the considered environment factors, e.g., distribution, spatial density, and transmission load of the ambient transmitters, on the hybrid D2D communications performance. Extensive simulations show that the repulsion factor among the ambient transmitters has a non-trivial impact on the communication performance. Additionally, we reveal how different mode selection protocols affect the performance metrics.
... Ambient backscatter technique [1] has been introduced as an energy-efficient alternative to low-power communication and networking, e.g., wireless-powered communications [2]- [7]. With the capability to communicate by utilizing the environmental radio frequency (RF) signals, ambient backscatter communication is recognized as a promising solution for Internet-of-things (IoT) to connect the smart objects anytime and anywhere [8], [9]. ...
Preprint
Full-text available
The probability density function (pdf) of the received signal of an ambient backscatter communication system is derived, assuming that on-off keying (OOK) is performed at the tag, and that the ambient radio frequency (RF) signal is white Gaussian. The pdf of the received signal is then utilized to design two different types of non-coherent detectors. The first detector directly uses the received signal to perform a hypothesis test. The second detector first estimates the channel based on the observed signal and then performs the hypothesis test. Test statistics and optimal decision threshold of the detectors are derived. The energy detector is shown to be an approximation of the second detector. For cases where the reader is able to avoid or cancel the direct interference from the RF source (e.g., through successive interference cancellation), a third detector is given as a special case of the first detector. Numerical results show that both the first and the second detectors have the same bit error rate (BER) performance, making the second detector preferable over the first detector due to its computational simplicity.
... We propose a novel hybrid transmitter that combines ambient backscatter communications and the wireless powered communications, both of which can harvest RF energy and support self-sustainable communications [4], [22]. On the one hand, a wireless powered transmitter requires a long time to accumulate enough energy for active transmission when the ambient RF signals are not abundant [23]. In this circumstance, ambient backscattering may still be employed as it has ultra-low power consumption. ...
Article
Ambient backscatter communication technology has been introduced recently, and is then quickly becoming a promising choice for self-sustainable communication systems as an external power supply or a dedicated carrier emitter is not required. By leveraging existing RF signal resources, ambient backscatter technology can support sustainable and independent communications and consequently open up a whole new set of applications that facilitate Internet-of-Things (IoT). In this article, we study an integration of ambient backscatter with wireless powered communication networks (WPCNs). We first present an overview of backscatter communication systems with an emphasis on the emerging ambient backscatter technology. Then we propose a novel hybrid transmitter design by combining the advantages of both ambient backscatter and wireless powered communications. Furthermore, in the cognitive radio environment, we introduce a multiple access scheme to coordinate the hybrid data transmissions. The performance evaluation shows that the hybrid transmitter outperforms traditional designs. In addition, we discuss some open issues related to the ambient backscatter networking.
... Secure communication: The current protocols support plain communication between a charger and a charging device. They are susceptible to jamming attacks [349], [350] (e.g., to block the communication between the charger and the charging device), eavesdropping attacks (e.g., to steal charging device's and charger's identity) and man-in-the-middle attacks (e.g., malicious device manipulates or falsifies charging status). The security features have to be developed in the communication protocols, taking unique wireless charging characteristics (e.g., in-band communication in Qi) into account. ...
... We write K ∼ Gin(α, ρ) when K is an α-DPP with Ginibre kernel defined in (8) and density ρ. ...
Chapter
This article provides information on the general, circuit diagrams, and fundamentals of a wireless charging system, and provides information on wireless charging technologies for inductive coupling, magnetic resonance coupling, and radiofrequency/microwave propagation, from fundamental understanding to specific applications. Also, on the basis of the conducted research, detailed information is provided on the developed wireless charging technology or a device for wireless transmission of electrical energy, which is widely used in practice.
Article
Harvesting wireless power to energize miniature devices has been envisioned as a promising solution to sustain future-generation energy-sensitive networks, e.g., Internet-of-Things systems. However, due to the limited computing and communication capabilities, wirelessly powered networks (WPNs) may be incapable of employing complex security practices, e.g., encryption, which may incur considerable computation and communication overheads. This challenge makes securing energy harvesting communications an arduous task and, thus, limits the use of WPNs in many high-security applications. In this context, security at the physical layer (PHY) that exploits the intrinsic properties of the wireless medium to achieve secure communication has emerged as an alternative paradigm. This article first introduces the fundamental principles of primary PHY attacks, covering jamming, eavesdropping, and detection of covert, and then presents an overview of the prevalent countermeasures to secure both active and passive communications in WPNs. Furthermore, a number of open research issues are identified to inspire possible future research.
Article
Full-text available
The recent advanced wireless energy harvesting technology has enabled wireless-powered communications to accommodate wireless data services in a self-sustainable manner. However, wireless-powered communications rely on active RF signals to communicate, and result in high power consumption. On the other hand, ambient backscatter technology that passively reflects existing RF signal sources in the air to communicate has the potential to facilitate an implementation with ultralow power consumption. In this paper, we introduce a hybrid D2D communication paradigm by integrating ambient backscattering with wireless-powered communications. The hybrid D2D communications are self-sustainable, as no dedicated external power supply is required. However, since the radio signals for energy harvesting and for backscattering come from the ambient, the performance of the hybrid D2D communications depends largely on environment factors, e.g., distribution, spatial density, and transmission load of ambient energy sources. Therefore, we design two mode selection protocols for the hybrid D2D transmitter, allowing a more flexible adaptation to the environment. We then introduce analytical models to characterize the impacts of the considered environment factors on the hybrid D2D communication performance. Together with extensive simulations, our analysis shows that the communication performance benefits from larger repulsion, transmission load and density of ambient energy sources. Further, we investigate how different mode selection mechanisms affect the communication performance.
Article
Wireless charging is a technology of transmitting power through an air gap to electrical devices for the purpose of energy replenishment. The recent progress in wireless charging techniques and development of commercial products have provided a promising alternative way to address the energy bottleneck of conventionally portable battery-powered devices. However, the incorporation of wireless charging into the existing wireless communication systems also brings along a series of challenging issues with regard to implementation, scheduling, and power management. In this article, we present a comprehensive overview of wireless charging techniques, the developments in technical standards, and their recent advances in network applications. In particular, with regard to network applications , we review the mobile charger dispatch strategies, static charger scheduling strategies and wireless charger deployment strategies. Additionally, we discuss open issues and challenges in implementing wireless charging technologies. Finally, we envision some practical future network applications of wireless charging.
Technical Report
Full-text available
In wireless powered networks, a user can make a request and use the wireless energy transferred from an energy source for its data transmission. However, due to broadcast nature of wireless energy transfer (e.g., RF energy), a malicious node (i.e., an attacker) can also intercept the energy and use it to perform an attack by jamming the data transmission of the user. We consider such a jamming attack where the user and attacker are aware of each other. We formulate a game theoretic model to analyze the energy request and data transmission policy of the user and the attack policy of the attacker when the user and the attacker both want to maximize their own rewards. We use an iterative algorithm designed based on the best response dynamics to obtain the solution defined in terms of the constrained Nash equilibrium. The numerical results show not only the convergence of the proposed algorithm, but also the optimal reward of the user under different energy cost constraints. Index Terms—Wireless powered networks, wireless jamming, constrained stochastic game. I. INTRODUCTION Wireless powered networks utilize different techniques (e.g., RF, inductive coupling, and magnetic resonance coupling) to transfer wireless energy from a source to a user's device [1]. The user uses that energy for data transmission. However, in the network, a malicious node (i.e., an attacker) may exist to perform jamming attack, disrupting data transmission of the user [2]. The attacker may receive and utilize the energy transferred from the source for the attack. Hence, the network faces the problem of energy transfer as it not only incurs higher cost, but also facilitates the attacker to perform more attacks. The user has to optimize his/her data transmission strategy and also the wireless energy transfer policy. Likewise, given the available wireless energy, the attacker can optimize its attack strategy. In wireless energy harvesting and wireless powered net-works, most of the work related to security is to analyze and optimize secrecy rate [3], [4], [5], [6], [7], [8]. For example, the authors of [3] optimized beamforming of the nodes in the network with passive eavesdroppers. The objective is to minimize transmit power given that the receiver can harvest RF energy from the transmission. The authors of [7] introduced secure relay beamforming (SRB) scheme for simultaneous wireless information and power transfer (SWIPT). The scheme is to maximize secrecy rate under harvested energy and transmit power of the relay. However, none of the work consid-ered a jamming attack in wireless energy harvesting/transfer
Article
Full-text available
Radio frequency (RF) energy transfer and harvesting techniques have recently become alternative methods to power the next generation wireless networks. As this emerging technology enables proactive energy replenishment of wireless devices, it is advantageous in supporting applications with quality of service (QoS) requirement. In this paper, we present an extensive literature review on the research progresses in wireless networks with RF energy harvesting capability, referred to as RF energy harvesting networks (RF-EHNs). First, we present an overview of the RF-EHNs including system architecture, RF energy harvesting techniques and existing applications. Then, we present the background in circuit design as well as the state-of-the-art circuitry implementations, and review the communication protocols specially designed for RF-EHNs. We also explore various key design issues in the development of RF-EHNs according to the network types, i.e., single-hop network, multi-antenna network, relay network and cognitive radio network. Finally, we envision some open research directions.
Article
Full-text available
For simultaneous wireless information and power transfer (SWIPT), the secure communication is an important issue. In this correspondence, we study the secure relay beamforming (SRB) scheme for SWIPT in a non-regenerative multiantenna relay network. We propose a constrained concave convex procedure (CCCP) based iterative algorithm which is able to achieve a local optimum where the secrecy rate is maximized while the relay transmit power and energy harvesting constraints are satisfied. Simulation results have shown that our proposed CCCP based iterative algorithm achieves larger secrecy rate while has lower computational complexity than the convectional SRB schemes. Since the CCCP based iterative algorithm is still complex, we propose a semidefinite programming (SDP) based non-iterative suboptimal algorithm and a closed-form suboptimal algorithm. It is shown that when the maximum transmit power of the relay to noise power ratio is high, the SDP based non-iterative suboptimal algorithm performs close to the CCCP based iterative algorithm.
Article
Full-text available
We employ a game theoretic approach to formulate communication between two nodes over a wireless link in the presence of an adversary. We define a constrained, two-player, zero-sum game between a transmitter/receiver pair with adaptive transmission parameters and an adversary with average and maximum power constraints. In this model, the transmitter's goal is to maximize the achievable expected performance of the communication link, defined by a utility function, while the jammer's goal is to minimize the same utility function. Inspired by capacity/rate as a performance measure, we define a general utility function and a payoff matrix which may be applied to a variety of jamming problems. We show the existence of a threshold such that if the jammer's average power exceeds this threshold, the expected payoff of the transmitter at Nash Equilibrium (NE) is the same as the case when the jammer uses its maximum allowable power all the time. We provide analytical and numerical results for transmitter and jammer optimal strategies and a closed form expression for the expected value of the game at the NE. As a special case, we investigate the maximum achievable transmission rate of a rate-adaptive, packetized, wireless AWGN communication link under different jamming scenarios and show that randomization can significantly assist a smart jammer with limited average power.
Article
Full-text available
The dual use of radio signals for simultaneous wireless information and power transfer (SWIPT) has recently drawn significant attention. To meet the practical requirement that energy receivers (ERs) operate with significantly higher received power as compared to information receivers (IRs), ERs need to be deployed in more proximity to the transmitter than IRs. However, due to the broadcast nature of wireless channels, one critical issue arises that the messages sent to IRs can be eavesdropped by ERs, which possess better channels from the transmitter. In this paper, we address this new secrecy communication problem in a multiuser multiple-input single-output (MISO) SWIPT system where one multi-antenna transmitter sends information and energy simultaneously to an IR and multiple ERs, each with one single antenna. To optimally design transmit beamforming vectors and their power allocation, two problems are investigated with different aims: the first problem maximizes the secrecy rate for IR subject to individual harvested energy constraints of ERs, while the second problem maximizes the weighted sum-energy transferred to ERs subject to a secrecy rate constraint for IR. We solve these two non-convex problems optimally by reformulating each of them into a two-stage problem. First, by fixing the signal-to-interference-plus-noise ratio (SINR) target for ERs (for the first problem) or IR (for the second problem), we obtain the optimal beamforming and power allocation solution by applying the technique of semidefinite relaxation (SDR). Then, the original problems are solved by a one-dimension search over the optimal SINR target for ERs or IR. Furthermore, for each of the two studied problems, suboptimal solutions of lower complexity are also proposed in which the information and energy beamforming vectors are separately designed with their power allocation.
Conference Paper
Full-text available
In this paper, we study the performance of the IEEE 802.11 MAC protocol under a range of jammers that covers both channel-oblivious and channel-aware jamming. We study two channel-oblivious jammers: a periodic jammer that jams deterministically at a specified rate, and a memoryless jammer whose signals arrive according to a Poisson process. We also develop new models for channel-aware jamming, including a reactive jammer that only jams non-colliding transmissions and an omniscient jammer that optimally adjusts its strategy according to current states of the participating nodes. Our study comprises of a theoretical analysis of the saturation throughput of 802.11 under jamming, an extensive simulation study, and a testbed to conduct real world experimentation of jamming IEEE 802.11 using GNU Radio and USRP platform. In our theoretical analysis, we use a discrete-time Markov chain analysis to derive formulae for the saturation throughput of IEEE 802.11 under memoryless, reactive and omniscient jamming. One of our key results is a characterization of optimal omniscient jamming that establishes a lower bound on the saturation throughput of 802.11 under arbitrary jammer attacks. We validate the theoretical analysis by means of Qualnet simulations. Finally, we measure the real-world performance of periodic and memoryless jammers using our GNU radio jammer prototype.
Article
In this letter, we investigate secure multicasting for simultaneous wireless information and power transfer (SWIPT) in the presence of multiple energy receivers who have potential to eavesdrop on the messages of information receivers. Under both, signal-interference-noise ratio (SINR) and harvested energy constraints, we propose a novel secure multicast design to minimize the total power by using the techniques of rank-two beamformed Alamouti coding and semidefinite relaxation (SDR). The sufficient conditions are derived under which the proposed secure multicast design is optimal. We also present the corresponding rank-two Gaussian randomization procedure to obtain a suboptimal solution when SDR is not tight. Simulation results are then provided to demonstrate the efficacy of the proposed design in power saving.
Article
Recently, wireless networking for emerging cyber-physical systems, in particular the smart grid, has been drawing increasing attention in that it has broad applications for time-critical message delivery among electronic devices on physical infrastructures. However, the shared nature of wireless channels unavoidably exposes the messages in transit to jamming attacks, which broadcast radio interference to affect the network availability of electronic equipments. An important, yet open research question is how to model and detect jamming attacks in such wireless networks, where communication traffic is more time-critical than that in conventional data-service networks, such as cellular and WiFi networks. In this paper, we aim at modeling and detecting jamming attacks against time-critical wireless networks with applications to the smart grid. In contrast to communication networks where packets-oriented metrics, such as packet loss and throughput are used to measure the network performance, we introduce a new metric, message invalidation ratio, to quantify the performance of time-critical applications. Our modeling approach is inspired by the similarity between the behavior of a jammer who attempts to disrupt the delivery of a time-critical message and the behavior of a gambler who intends to win a gambling game. Therefore, by gambling-based modeling and real-time experiments, we find that there exists a phase transition phenomenon for successful time-critical message delivery under a variety of jamming attacks. That is, as the probability that a packet is jammed increases from 0 to 1, the message invalidation ratio first increases slightly, then increases dramatically to 1. Based on analytical and experimental results, we design the Jamming Attack Detection based on Estimation (JADE) scheme to achieve robust jamming detection, and implement JADE in a wireless network for power substations in the smart grid.
Conference Paper
We consider the deployment of an energy harvesting (EH) cooperative jammer (CJ) to increase the security of a three-terminal wiretap channel with a passive eavesdropper, all users being equipped with multiple antennas. We first investigate the optimal offline EH CJ policy with complete non-causal information of energy arrivals and changes in channel state and show that it has an efficiently-computable global optimum. Subsequently, an online CJ policy with causal side information and probabilistic energy constraints is presented and transformed into a conservative convex program with deterministic constraints. The impact of CJ on the secrecy rate of the MIMO wiretap channel is also quantified. Numerical examples for a range of energy arrival and array parameters show that EH cooperative jammers are generally effective in augmenting the security of the wiretap channel.