Loading…
Physical Layer Security of Cognitive Ambient Backscatter Communications for Green Internet-of-Things
The future sixth generation (6G) wireless communication networks will face the challenges of large-scale connections green communication. To meet these requirements, cognitive ambient backscatter communication (C-AmBC) has been proposed as a new spectrum paradigm for the green Internet-of-Things (Io...
Saved in:
Published in: | IEEE transactions on green communications and networking 2021-09, Vol.5 (3), p.1066-1076 |
---|---|
Main Authors: | , , , , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | The future sixth generation (6G) wireless communication networks will face the challenges of large-scale connections green communication. To meet these requirements, cognitive ambient backscatter communication (C-AmBC) has been proposed as a new spectrum paradigm for the green Internet-of-Things (IoT) with stringent energy and spectrum constraints, in which the backscatter device (BD) can achieve communications by simultaneously sharing both spectrum and radio-frequency (RF) sources. However, due to the broadcasting nature of wireless communication channels, BD is vulnerable to eavesdropping from unlicensed eavesdroppers. To address this, this paper proposes a framework of C-AmBC networks in the presence of an unlicensed eavesdropper. Specifically, we investigate the reliability and security of the proposed framework by invoking the outage probability (OP) and intercept probability (IP) with analytical derivations. In addition, the asymptotic behaviors are conducted for the OP in the high signal-to-noise ratio (SNR) regime and IP in the high main-to-eavesdropper ratio (MER) regime. Extensive analytical and computer simulated performance evaluation results show that: 1) when the considered system is under high SNR, the OP of the legitimate user and BD tends to be a non-zero fixed constant, indicating that the existence of error floors for the diversity orders; 2) the performance trade-off of reliability and security can be optimized by adjusting various parameters of the considered system; 3) with the increase of MER, the security of the legitimate user increases, while that of BD decreases. |
---|---|
ISSN: | 2473-2400 2473-2400 |
DOI: | 10.1109/TGCN.2021.3062060 |