Loading…

Physical Layer Security of Cognitive Ambient Backscatter Communications for Green Internet-of-Things

The future sixth generation (6G) wireless communication networks will face the challenges of large-scale connections green communication. To meet these requirements, cognitive ambient backscatter communication (C-AmBC) has been proposed as a new spectrum paradigm for the green Internet-of-Things (Io...

Full description

Saved in:
Bibliographic Details
Published in:IEEE transactions on green communications and networking 2021-09, Vol.5 (3), p.1066-1076
Main Authors: Li, Xingwang, Zheng, Yike, Khan, Wali Ullah, Zeng, Ming, Li, Dong, Ragesh, G. K., Li, Lihua
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:The future sixth generation (6G) wireless communication networks will face the challenges of large-scale connections green communication. To meet these requirements, cognitive ambient backscatter communication (C-AmBC) has been proposed as a new spectrum paradigm for the green Internet-of-Things (IoT) with stringent energy and spectrum constraints, in which the backscatter device (BD) can achieve communications by simultaneously sharing both spectrum and radio-frequency (RF) sources. However, due to the broadcasting nature of wireless communication channels, BD is vulnerable to eavesdropping from unlicensed eavesdroppers. To address this, this paper proposes a framework of C-AmBC networks in the presence of an unlicensed eavesdropper. Specifically, we investigate the reliability and security of the proposed framework by invoking the outage probability (OP) and intercept probability (IP) with analytical derivations. In addition, the asymptotic behaviors are conducted for the OP in the high signal-to-noise ratio (SNR) regime and IP in the high main-to-eavesdropper ratio (MER) regime. Extensive analytical and computer simulated performance evaluation results show that: 1) when the considered system is under high SNR, the OP of the legitimate user and BD tends to be a non-zero fixed constant, indicating that the existence of error floors for the diversity orders; 2) the performance trade-off of reliability and security can be optimized by adjusting various parameters of the considered system; 3) with the increase of MER, the security of the legitimate user increases, while that of BD decreases.
ISSN:2473-2400
2473-2400
DOI:10.1109/TGCN.2021.3062060