Adaptive secure wireless information and power transfer in delay-constrained multiuser multi-input single-output networks
We focus on the achievable time-averaged secrecy rate-harvested energy region in delay-constrained wireless powered multi-input single-output (MISO) network, where a multi-antenna buffer-aided access point (AP) is supposed to deliver confidential message to multiple single-antenna users. When a user...
Saved in:
Published in | Signal processing Vol. 232; p. 109908 |
---|---|
Main Authors | , , , , , |
Format | Journal Article |
Language | English |
Published |
Elsevier B.V
01.07.2025
|
Subjects | |
Online Access | Get full text |
ISSN | 0165-1684 |
DOI | 10.1016/j.sigpro.2025.109908 |
Cover
Loading…
Abstract | We focus on the achievable time-averaged secrecy rate-harvested energy region in delay-constrained wireless powered multi-input single-output (MISO) network, where a multi-antenna buffer-aided access point (AP) is supposed to deliver confidential message to multiple single-antenna users. When a user is scheduled for receiving messages from the AP, other users are assumed to be potential eavesdroppers and can harvest energy from their received radio signal. To this end, the time-averaged secrecy rate-energy region maximization problem was formulated subject to constraints on average queuing delay and average power consumption. On this basis, a delay-aware adaptive secure transmission (DAAST) scheme is presented to enhance the achieved time-averaged secrecy rate-energy region effectively by jointly optimizing the confidential information and artificial noise signal beams, the user scheduling, and the flow control, while strictly guaranteeing the average queuing delay requirements of all users. Numerical results demonstrate that, by fully exploiting the potential of data buffers, the DAAST scheme is an asymptotically optimal scheme, which can arbitrarily approach the optimal solution. |
---|---|
AbstractList | We focus on the achievable time-averaged secrecy rate-harvested energy region in delay-constrained wireless powered multi-input single-output (MISO) network, where a multi-antenna buffer-aided access point (AP) is supposed to deliver confidential message to multiple single-antenna users. When a user is scheduled for receiving messages from the AP, other users are assumed to be potential eavesdroppers and can harvest energy from their received radio signal. To this end, the time-averaged secrecy rate-energy region maximization problem was formulated subject to constraints on average queuing delay and average power consumption. On this basis, a delay-aware adaptive secure transmission (DAAST) scheme is presented to enhance the achieved time-averaged secrecy rate-energy region effectively by jointly optimizing the confidential information and artificial noise signal beams, the user scheduling, and the flow control, while strictly guaranteeing the average queuing delay requirements of all users. Numerical results demonstrate that, by fully exploiting the potential of data buffers, the DAAST scheme is an asymptotically optimal scheme, which can arbitrarily approach the optimal solution. |
ArticleNumber | 109908 |
Author | Chen, Yang Lan, Xiaolong Chen, Qingchun He, Junjiang Li, Tao Zhang, Lei |
Author_xml | – sequence: 1 givenname: Xiaolong surname: Lan fullname: Lan, Xiaolong email: xiaolonglan@scu.edu.cn organization: School of Cyber Science and Engineering, Sichuan University, Chengdu, 610065, China – sequence: 2 givenname: Yang surname: Chen fullname: Chen, Yang email: yangchen@alu.uestc.edu.cn organization: School of Cyber Science and Engineering, Sichuan University, Chengdu, 610065, China – sequence: 3 givenname: Lei orcidid: 0000-0001-8074-906X surname: Zhang fullname: Zhang, Lei email: zhanglei2018@scu.edu.cn organization: School of Cyber Science and Engineering, Sichuan University, Chengdu, 610065, China – sequence: 4 givenname: Junjiang surname: He fullname: He, Junjiang email: hejunjiang@scu.edu.cn organization: School of Cyber Science and Engineering, Sichuan University, Chengdu, 610065, China – sequence: 5 givenname: Qingchun surname: Chen fullname: Chen, Qingchun email: qcchen@gzhu.edu.cn organization: School of Electronics and Communication Engineering, Guangzhou University, Guangzhou, 510005, China – sequence: 6 givenname: Tao surname: Li fullname: Li, Tao email: litao@scu.edu.cn organization: School of Cyber Science and Engineering, Sichuan University, Chengdu, 610065, China |
BookMark | eNp9kM1uwjAQhH2gUoH2DXrwC4TaTmLCpRJC_ZOQemnPlmNvkGmwI68D4u1rSs897cysdrT6ZmTigwdCHjhbcMbl436BbjfEsBBM1DlarVgzIdO8qgsum-qWzBD3jDFeSjYl57XVQ3JHoAhmjEBPLkIPiNT5LsSDTi54qr2lQzhBpClqj10WzlMLvT4XJnjMqfNg6WHskxsxr39V4fwwJorO73oowpguzkM6hfiNd-Sm0z3C_d-ck6-X58_NW7H9eH3frLeFEXWdCs4FayvB6hIqaBpWC2kM19AuDZNtCTx7K3lbyYa1phHSdkxwsxQ5l7qy5ZxU114TA2KETg3RHXQ8K87UBZnaqysydUGmrsjy2dP1DPJvRwdRoXHgDdgMyCRlg_u_4AdUIH6S |
Cites_doi | 10.1109/TIFS.2020.3023277 10.1109/TIFS.2021.3103062 10.1109/TIFS.2017.2663336 10.1002/j.1538-7305.1975.tb02040.x 10.1109/TSP.2018.2835406 10.1109/TWC.2016.2516528 10.1561/1300000001 10.1016/j.sigpro.2020.107934 10.1109/TVT.2017.2700475 10.1109/TIFS.2020.2988567 10.1109/TIFS.2016.2516917 10.1109/TSP.2014.2369001 10.1109/TSP.2011.2146775 10.1109/TVT.2015.2395725 10.1016/j.sigpro.2020.107803 10.1109/TSP.2014.2303422 10.1109/TIFS.2019.2939738 10.1109/TIFS.2016.2566446 10.1109/TIFS.2013.2287046 10.1109/TVT.2020.3038353 10.1109/JSAC.2021.3087225 10.1007/s11134-005-1450-0 10.1109/TIFS.2020.3039047 10.1109/TWC.2014.2314654 10.1109/TCOMM.2019.2959336 10.1109/TWC.2015.2395414 10.1109/COMST.2017.2783901 10.1109/TWC.2015.2477510 10.1109/TWC.2019.2938958 10.1109/TWC.2016.2530068 10.1109/TCOMM.2013.13.120855 10.1109/TWC.2014.041714.131688 10.1109/TWC.2013.031813.120224 10.1109/TVT.2020.2988357 |
ContentType | Journal Article |
Copyright | 2025 |
Copyright_xml | – notice: 2025 |
DBID | AAYXX CITATION |
DOI | 10.1016/j.sigpro.2025.109908 |
DatabaseName | CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
ExternalDocumentID | 10_1016_j_sigpro_2025_109908 S0165168425000234 |
GrantInformation_xml | – fundername: the Fundamental Research Funds for the Central Universities grantid: 202255467 – fundername: the Key Discipline Project of Guangzhou Education Bureau – fundername: National Key Research and Development program of China grantid: 2020YFB1805400 – fundername: the Sichuan University-Dazhou People’s Government Strategic Cooperation Special Fund Project ( grantid: 2022CDDZ-10-SCU – fundername: the Lingnan Yingjie Project by Guangzhou Municipal Government – fundername: National Natural Science Foundation of China ( grantid: 62101358 – fundername: the China Postdoctoral Science Foundation ( grantid: 2020M683345 |
GroupedDBID | --K --M -~X .DC .~1 0R~ 123 1B1 1~. 1~5 4.4 457 4G. 53G 5VS 7-5 71M 8P~ 9JN AABNK AACTN AAEDT AAEDW AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AAXKI AAXUO AAYFN ABBOA ABDPE ABFNM ABFRF ABJNI ABMAC ABWVN ABXDB ACDAQ ACGFO ACGFS ACNNM ACRLP ACRPL ACZNC ADBBV ADEZE ADJOM ADMUD ADNMO ADTZH AEBSH AECPX AEFWE AEIPS AEKER AENEX AFJKZ AFTJW AGHFR AGUBO AGYEJ AHHHB AHJVU AHZHX AIALX AIEXJ AIKHN AITUG AKRWK ALMA_UNASSIGNED_HOLDINGS AMRAJ ANKPU AOUOD ASPBG AVWKF AXJTR AZFZN BJAXD BKOJK BLXMC CS3 DU5 EBS EFJIC EJD EO8 EO9 EP2 EP3 F0J F5P FDB FEDTE FGOYB FIRID FNPLU FYGXN G-Q GBLVA GBOLZ HLZ HVGLF HZ~ IHE J1W JJJVA KOM LG9 M41 MO0 N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. Q38 R2- RIG ROL RPZ SBC SDF SDG SDP SES SEW SPC SPCBC SST SSV SSZ T5K TAE TN5 WUQ XPP ZMT ~02 ~G- AATTM AAYWO AAYXX ACVFH ADCNI AEUPX AFPUW AFXIZ AGCQF AGQPQ AGRNS AIGII AIIUN AKBMS AKYEP APXCP BNPGV CITATION SSH |
ID | FETCH-LOGICAL-c255t-1120b42053e4e880526cc1aeb7c06b3e126cd61b4680bc826df021c7226c6a4d3 |
IEDL.DBID | .~1 |
ISSN | 0165-1684 |
IngestDate | Tue Jul 01 05:27:52 EDT 2025 Sat Mar 15 15:42:12 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Keywords | Physical layer security Wireless energy transfer Secrecy rate-harvested energy region MISO network |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c255t-1120b42053e4e880526cc1aeb7c06b3e126cd61b4680bc826df021c7226c6a4d3 |
ORCID | 0000-0001-8074-906X |
ParticipantIDs | crossref_primary_10_1016_j_sigpro_2025_109908 elsevier_sciencedirect_doi_10_1016_j_sigpro_2025_109908 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | July 2025 2025-07-00 |
PublicationDateYYYYMMDD | 2025-07-01 |
PublicationDate_xml | – month: 07 year: 2025 text: July 2025 |
PublicationDecade | 2020 |
PublicationTitle | Signal processing |
PublicationYear | 2025 |
Publisher | Elsevier B.V |
Publisher_xml | – name: Elsevier B.V |
References | Wang, Bai, Chen, Han (b3) 2016; 15 He, Liu, Shen, Jiang, Shiratori (b30) 2020; 15 Zhao (b22) 2018; 67 Zhang, Liu, Zhang (b24) 2016; 15 Zhou, Zhang, Ho (b15) 2013; 61 Lan, Zhang, Chen, Cai (b28) 2020; 68 Ren, Lei, Diamantoulakis, Chen, Karagiannidis (b29) 2020; 69 Wyner (b7) 1975; 54 Georgiadis, Neely, Tassiulas (b37) 2006; 1 Liu, Zhang, Chua (b19) 2014; 62 Huang, Chen, Gong, Xu, Han, Chambers (b33) 2021; 39 Cao (b21) 2021; 16 Lu, d. Lamare (b31) 2020; 69 Lan, Ren, Chen, Cai (b26) 2020; 15 Huang, Chen, Wong (b32) 2021; 16 Neely (b36) 2010 Guo, Yang, Liu, Kwak (b38) 2017; 66 Shi, Liu, Xu, Zhang (b16) 2014; 13 Wang, Luo, Yin, Xia (b8) 2013; 8 Ng, Lo, Schober (b23) 2014; 13 Sheng, Tuan, Duong, Poor (b11) 2018; 66 Zhang, Ho (b14) 2013; 12 Neely (b35) 2003 Fan, Yang, Duong, Elkashlan, Karagiannidis (b1) 2016; 15 Wang, Teh, Li (b9) 2017; 12 Lan, Chen, Cai, Fan (b27) 2019; 18 Li, Ma (b13) 2011; 59 Deng, Wang, Elkashlan, Nallanathan, Mallik (b2) 2016; 11 Ruby, Riihonen, Wu, Liu, ElHalawany (b6) 2021; 182 Moosavi, Bui (b4) 2016; 11 Shi, Xu, Wu, Song, Wang (b20) 2015; 14 Perera, Jayakody, Sharma, Chatzinotas, Li (b17) 2018; 20 Nie (b25) 2021; 16 Li (b12) 2015; 63 Xing, Liu, Zhang (b18) 2016; 65 Hu (b10) 2018; 5 Stolay (b34) 2005; 50 Fan, Tang, Jiang (b5) 2021; 178 Hu (10.1016/j.sigpro.2025.109908_b10) 2018; 5 Lu (10.1016/j.sigpro.2025.109908_b31) 2020; 69 Li (10.1016/j.sigpro.2025.109908_b13) 2011; 59 Huang (10.1016/j.sigpro.2025.109908_b33) 2021; 39 Zhao (10.1016/j.sigpro.2025.109908_b22) 2018; 67 Wyner (10.1016/j.sigpro.2025.109908_b7) 1975; 54 Wang (10.1016/j.sigpro.2025.109908_b9) 2017; 12 Shi (10.1016/j.sigpro.2025.109908_b20) 2015; 14 Sheng (10.1016/j.sigpro.2025.109908_b11) 2018; 66 Shi (10.1016/j.sigpro.2025.109908_b16) 2014; 13 Lan (10.1016/j.sigpro.2025.109908_b28) 2020; 68 Neely (10.1016/j.sigpro.2025.109908_b35) 2003 Guo (10.1016/j.sigpro.2025.109908_b38) 2017; 66 Moosavi (10.1016/j.sigpro.2025.109908_b4) 2016; 11 Lan (10.1016/j.sigpro.2025.109908_b26) 2020; 15 Zhou (10.1016/j.sigpro.2025.109908_b15) 2013; 61 Fan (10.1016/j.sigpro.2025.109908_b5) 2021; 178 Wang (10.1016/j.sigpro.2025.109908_b3) 2016; 15 Wang (10.1016/j.sigpro.2025.109908_b8) 2013; 8 He (10.1016/j.sigpro.2025.109908_b30) 2020; 15 Perera (10.1016/j.sigpro.2025.109908_b17) 2018; 20 Ren (10.1016/j.sigpro.2025.109908_b29) 2020; 69 Zhang (10.1016/j.sigpro.2025.109908_b14) 2013; 12 Liu (10.1016/j.sigpro.2025.109908_b19) 2014; 62 Zhang (10.1016/j.sigpro.2025.109908_b24) 2016; 15 Ng (10.1016/j.sigpro.2025.109908_b23) 2014; 13 Nie (10.1016/j.sigpro.2025.109908_b25) 2021; 16 Neely (10.1016/j.sigpro.2025.109908_b36) 2010 Deng (10.1016/j.sigpro.2025.109908_b2) 2016; 11 Li (10.1016/j.sigpro.2025.109908_b12) 2015; 63 Cao (10.1016/j.sigpro.2025.109908_b21) 2021; 16 Fan (10.1016/j.sigpro.2025.109908_b1) 2016; 15 Georgiadis (10.1016/j.sigpro.2025.109908_b37) 2006; 1 Lan (10.1016/j.sigpro.2025.109908_b27) 2019; 18 Stolay (10.1016/j.sigpro.2025.109908_b34) 2005; 50 Huang (10.1016/j.sigpro.2025.109908_b32) 2021; 16 Ruby (10.1016/j.sigpro.2025.109908_b6) 2021; 182 Xing (10.1016/j.sigpro.2025.109908_b18) 2016; 65 |
References_xml | – volume: 14 start-page: 2841 year: 2015 end-page: 2853 ident: b20 article-title: Secure beamforming for MIMO broadcasting with wireless information and power transfer publication-title: IEEE Trans. Wirel. Commun. – volume: 63 start-page: 206 year: 2015 end-page: 220 ident: b12 article-title: Robust cooperative beamforming and artificial noise design for physical-layer secrecy in AF multi-antenna multi-relay networks publication-title: IEEE Trans. Signal Process. – volume: 16 start-page: 4101 year: 2021 end-page: 4112 ident: b32 article-title: Multi-agent reinforcement learning-based buffer-aided relay selection in IRS-assisted secure cooperative networks publication-title: IEEE Trans. Inf. Forensics Secur. – volume: 62 start-page: 1850 year: 2014 end-page: 1863 ident: b19 article-title: Secrecy wireless information and power transfer with MISO beamforming publication-title: IEEE Trans. Signal Process. – volume: 178 year: 2021 ident: b5 article-title: Fast secrecy rate optimization for MIMO wiretap channels in the presence of a multiple-antenna eavesdropper publication-title: Signal Process. – volume: 68 start-page: 1432 year: 2020 end-page: 1447 ident: b28 article-title: Energy efficient buffer-aided transmission scheme in wireless powered cooperative NOMA relay network publication-title: IEEE Trans. Commun. – start-page: 1 year: 2010 end-page: 211 ident: b36 article-title: Stochastic network optimization with application to communication and queueing systems publication-title: Synthesis Lectures on Communication Networks – volume: 1 start-page: 1 year: 2006 end-page: 149 ident: b37 article-title: Resource alloaction and cross-layer control in wireless networks publication-title: Found. Trends Netw. – volume: 54 start-page: 1355 year: 1975 end-page: 1387 ident: b7 article-title: The wire-tap channel publication-title: Bell Syst. Tech. J. – volume: 39 start-page: 2514 year: 2021 end-page: 2525 ident: b33 article-title: Buffer-aided relay selection for cooperative hybrid NOMA/OMA networks with asynchronous deep reinforcement learning publication-title: IEEE J. Sel. Areas Commun. – volume: 15 start-page: 3311 year: 2020 end-page: 3324 ident: b26 article-title: Achievable Secrecy Rate Region for buffer-aided multiuser MISO systems publication-title: IEEE Trans. Inf. Forensics Secur. – volume: 66 start-page: 4133 year: 2017 end-page: 4147 ident: b38 article-title: Cross-layer rate control and resource allocation in spectrum-sharing OFDMA small-cell networks with delay constraints publication-title: IEEE Trans. Veh. Technol. – volume: 65 start-page: 180 year: 2016 end-page: 190 ident: b18 article-title: Secrecy wireless information and power transfer in fading wiretap channel publication-title: IEEE Trans. Veh. Technol. – volume: 16 start-page: 786 year: 2021 end-page: 799 ident: b21 article-title: Improving physical layer security of uplink NOMA via energy harvesting jammers publication-title: IEEE Trans. Inf. Forensics Secur. – volume: 13 start-page: 4599 year: 2014 end-page: 4615 ident: b23 article-title: Robust beamforming for secure communication in systems with wireless information and power transfer publication-title: IEEE Trans. Wirel. Commun. – volume: 15 start-page: 3856 year: 2016 end-page: 3867 ident: b1 article-title: Exploiting direct links for physical layer security in multiuser multirelay networks publication-title: IEEE Trans. Wirel. Commun. – volume: 59 start-page: 3799 year: 2011 end-page: 3812 ident: b13 article-title: Optimal and robust transmit designs for MISO channel secrecy by semidefinite programming publication-title: IEEE Trans. Signal Process. – volume: 50 start-page: 401 year: 2005 end-page: 457 ident: b34 article-title: Maximizing queueing nework utility subject to stability:Greedy primal-dual algorithm publication-title: Queueing Syst. – volume: 15 start-page: 1347 year: 2020 end-page: 1362 ident: b30 article-title: Link selection for security-QoS tradeoffs in buffer-aided relaying networks publication-title: IEEE Trans. Inf. Forensics Secur. – volume: 182 year: 2021 ident: b6 article-title: Performance analysis of multi-phase cooperative NOMA systems under passive eavesdropping publication-title: Signal Process. – volume: 20 start-page: 264 year: 2018 end-page: 302 ident: b17 article-title: Simultaneous wireless information and power transfer (SWIPT):Recent advances and future challenges publication-title: IEEE Commun. Surv. Tutorials – volume: 5 start-page: 219 year: 2018 end-page: 228 ident: b10 article-title: Cooperative jamming for physical layer security enhancement in internet of things publication-title: IEEE IoT J. – volume: 15 start-page: 3085 year: 2016 end-page: 3096 ident: b24 article-title: Artificial noise aided secrecy information and power transfer in OFDMA systems publication-title: IEEE Trans. Wirel. Commun. – year: 2003 ident: b35 article-title: Dynamic Power Allocation and Routing for Satellite and Wireless Networks with Time Varying Channels – volume: 12 start-page: 1989 year: 2013 end-page: 2001 ident: b14 article-title: MIMO broadcasting for simultaneous wireless information and power transfer publication-title: IEEE Trans. Wirel. Commun. – volume: 61 start-page: 4754 year: 2013 end-page: 4767 ident: b15 article-title: Wireless information and power transfer:Architecture design and rate-energy tradeoff publication-title: IEEE Trans. Commun. – volume: 11 start-page: 1928 year: 2016 end-page: 1939 ident: b4 article-title: Delay-aware optimization of physical layer security in multi-hop wireless body area networks publication-title: IEEE Trans. Inf. Forensics Secur. – volume: 15 start-page: 740 year: 2016 end-page: 752 ident: b3 article-title: Achieving high energy efficiency and physical-layer security in AF relaying publication-title: IEEE Trans. Wirel. Commun. – volume: 66 start-page: 3710 year: 2018 end-page: 3723 ident: b11 article-title: Beamforming optimization for physical layer security in MISO wireless networks publication-title: IEEE Trans. Signal Process. – volume: 16 start-page: 1610 year: 2021 end-page: 1625 ident: b25 article-title: Achievable Rate Region of energy-harvesting based secure two-way buffer-aided relay networks publication-title: IEEE Trans. Inf. Forensics Secur. – volume: 8 start-page: 2007 year: 2013 end-page: 2020 ident: b8 article-title: Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks publication-title: IEEE Trans. Inf. Forensics Secur. – volume: 12 start-page: 1470 year: 2017 end-page: 1482 ident: b9 article-title: Artificial noise aided physical layer security in multi-antenna small-cell networks publication-title: IEEE Trans. Inf. Forensics Secur. – volume: 13 start-page: 3269 year: 2014 end-page: 3280 ident: b16 article-title: Joint transmit beamforming and receive power splitting for MISO SWIPT systems publication-title: IEEE Trans. Wirel. Commun. – volume: 67 start-page: 1087 year: 2018 end-page: 1098 ident: b22 article-title: Artificial noise assisted secure interference networks with wireless power transfer publication-title: IEEE Trans. Veh. Technol. – volume: 11 start-page: 1128 year: 2016 end-page: 1138 ident: b2 article-title: Physical layer security in three-tier wireless sensor networks: A stochastic geometry approach publication-title: IEEE Trans. Inf. Forensics Secur. – volume: 69 start-page: 6485 year: 2020 end-page: 6499 ident: b29 article-title: Buffer-aided secure relay networks with SWIPT publication-title: IEEE Trans. Veh. Technol. – volume: 69 start-page: 15269 year: 2020 end-page: 15283 ident: b31 article-title: Opportunistic relaying and jamming based on secrecy-rate maximization for multiuser buffer-aided relay systems publication-title: IEEE Trans. Veh. Technol. – volume: 18 start-page: 5764 year: 2019 end-page: 5779 ident: b27 article-title: Buffer-aided adaptive wireless powered communication network with finite energy storage and data buffer publication-title: IEEE Trans. Wirel. Commun. – volume: 5 start-page: 219 issue: 1 year: 2018 ident: 10.1016/j.sigpro.2025.109908_b10 article-title: Cooperative jamming for physical layer security enhancement in internet of things publication-title: IEEE IoT J. – volume: 16 start-page: 786 year: 2021 ident: 10.1016/j.sigpro.2025.109908_b21 article-title: Improving physical layer security of uplink NOMA via energy harvesting jammers publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2020.3023277 – volume: 16 start-page: 4101 year: 2021 ident: 10.1016/j.sigpro.2025.109908_b32 article-title: Multi-agent reinforcement learning-based buffer-aided relay selection in IRS-assisted secure cooperative networks publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2021.3103062 – volume: 12 start-page: 1470 issue: 6 year: 2017 ident: 10.1016/j.sigpro.2025.109908_b9 article-title: Artificial noise aided physical layer security in multi-antenna small-cell networks publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2017.2663336 – volume: 54 start-page: 1355 issue: 8 year: 1975 ident: 10.1016/j.sigpro.2025.109908_b7 article-title: The wire-tap channel publication-title: Bell Syst. Tech. J. doi: 10.1002/j.1538-7305.1975.tb02040.x – volume: 66 start-page: 3710 issue: 14 year: 2018 ident: 10.1016/j.sigpro.2025.109908_b11 article-title: Beamforming optimization for physical layer security in MISO wireless networks publication-title: IEEE Trans. Signal Process. doi: 10.1109/TSP.2018.2835406 – volume: 15 start-page: 3085 issue: 4 year: 2016 ident: 10.1016/j.sigpro.2025.109908_b24 article-title: Artificial noise aided secrecy information and power transfer in OFDMA systems publication-title: IEEE Trans. Wirel. Commun. doi: 10.1109/TWC.2016.2516528 – volume: 1 start-page: 1 issue: 1 year: 2006 ident: 10.1016/j.sigpro.2025.109908_b37 article-title: Resource alloaction and cross-layer control in wireless networks publication-title: Found. Trends Netw. doi: 10.1561/1300000001 – volume: 182 year: 2021 ident: 10.1016/j.sigpro.2025.109908_b6 article-title: Performance analysis of multi-phase cooperative NOMA systems under passive eavesdropping publication-title: Signal Process. doi: 10.1016/j.sigpro.2020.107934 – volume: 67 start-page: 1087 issue: 2 year: 2018 ident: 10.1016/j.sigpro.2025.109908_b22 article-title: Artificial noise assisted secure interference networks with wireless power transfer publication-title: IEEE Trans. Veh. Technol. doi: 10.1109/TVT.2017.2700475 – volume: 15 start-page: 3311 year: 2020 ident: 10.1016/j.sigpro.2025.109908_b26 article-title: Achievable Secrecy Rate Region for buffer-aided multiuser MISO systems publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2020.2988567 – volume: 11 start-page: 1128 issue: 6 year: 2016 ident: 10.1016/j.sigpro.2025.109908_b2 article-title: Physical layer security in three-tier wireless sensor networks: A stochastic geometry approach publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2016.2516917 – volume: 63 start-page: 206 issue: 1 year: 2015 ident: 10.1016/j.sigpro.2025.109908_b12 article-title: Robust cooperative beamforming and artificial noise design for physical-layer secrecy in AF multi-antenna multi-relay networks publication-title: IEEE Trans. Signal Process. doi: 10.1109/TSP.2014.2369001 – volume: 59 start-page: 3799 issue: 8 year: 2011 ident: 10.1016/j.sigpro.2025.109908_b13 article-title: Optimal and robust transmit designs for MISO channel secrecy by semidefinite programming publication-title: IEEE Trans. Signal Process. doi: 10.1109/TSP.2011.2146775 – volume: 65 start-page: 180 issue: 1 year: 2016 ident: 10.1016/j.sigpro.2025.109908_b18 article-title: Secrecy wireless information and power transfer in fading wiretap channel publication-title: IEEE Trans. Veh. Technol. doi: 10.1109/TVT.2015.2395725 – year: 2003 ident: 10.1016/j.sigpro.2025.109908_b35 – start-page: 1 year: 2010 ident: 10.1016/j.sigpro.2025.109908_b36 article-title: Stochastic network optimization with application to communication and queueing systems – volume: 178 year: 2021 ident: 10.1016/j.sigpro.2025.109908_b5 article-title: Fast secrecy rate optimization for MIMO wiretap channels in the presence of a multiple-antenna eavesdropper publication-title: Signal Process. doi: 10.1016/j.sigpro.2020.107803 – volume: 62 start-page: 1850 issue: 7 year: 2014 ident: 10.1016/j.sigpro.2025.109908_b19 article-title: Secrecy wireless information and power transfer with MISO beamforming publication-title: IEEE Trans. Signal Process. doi: 10.1109/TSP.2014.2303422 – volume: 15 start-page: 1347 year: 2020 ident: 10.1016/j.sigpro.2025.109908_b30 article-title: Link selection for security-QoS tradeoffs in buffer-aided relaying networks publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2019.2939738 – volume: 11 start-page: 1928 issue: 9 year: 2016 ident: 10.1016/j.sigpro.2025.109908_b4 article-title: Delay-aware optimization of physical layer security in multi-hop wireless body area networks publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2016.2566446 – volume: 8 start-page: 2007 issue: 12 year: 2013 ident: 10.1016/j.sigpro.2025.109908_b8 article-title: Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2013.2287046 – volume: 66 start-page: 4133 issue: 5 year: 2017 ident: 10.1016/j.sigpro.2025.109908_b38 article-title: Cross-layer rate control and resource allocation in spectrum-sharing OFDMA small-cell networks with delay constraints publication-title: IEEE Trans. Veh. Technol. – volume: 69 start-page: 15269 issue: 12 year: 2020 ident: 10.1016/j.sigpro.2025.109908_b31 article-title: Opportunistic relaying and jamming based on secrecy-rate maximization for multiuser buffer-aided relay systems publication-title: IEEE Trans. Veh. Technol. doi: 10.1109/TVT.2020.3038353 – volume: 39 start-page: 2514 issue: 8 year: 2021 ident: 10.1016/j.sigpro.2025.109908_b33 article-title: Buffer-aided relay selection for cooperative hybrid NOMA/OMA networks with asynchronous deep reinforcement learning publication-title: IEEE J. Sel. Areas Commun. doi: 10.1109/JSAC.2021.3087225 – volume: 50 start-page: 401 issue: 4 year: 2005 ident: 10.1016/j.sigpro.2025.109908_b34 article-title: Maximizing queueing nework utility subject to stability:Greedy primal-dual algorithm publication-title: Queueing Syst. doi: 10.1007/s11134-005-1450-0 – volume: 16 start-page: 1610 year: 2021 ident: 10.1016/j.sigpro.2025.109908_b25 article-title: Achievable Rate Region of energy-harvesting based secure two-way buffer-aided relay networks publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2020.3039047 – volume: 13 start-page: 4599 issue: 8 year: 2014 ident: 10.1016/j.sigpro.2025.109908_b23 article-title: Robust beamforming for secure communication in systems with wireless information and power transfer publication-title: IEEE Trans. Wirel. Commun. doi: 10.1109/TWC.2014.2314654 – volume: 68 start-page: 1432 issue: 3 year: 2020 ident: 10.1016/j.sigpro.2025.109908_b28 article-title: Energy efficient buffer-aided transmission scheme in wireless powered cooperative NOMA relay network publication-title: IEEE Trans. Commun. doi: 10.1109/TCOMM.2019.2959336 – volume: 14 start-page: 2841 issue: 5 year: 2015 ident: 10.1016/j.sigpro.2025.109908_b20 article-title: Secure beamforming for MIMO broadcasting with wireless information and power transfer publication-title: IEEE Trans. Wirel. Commun. doi: 10.1109/TWC.2015.2395414 – volume: 20 start-page: 264 issue: 1 year: 2018 ident: 10.1016/j.sigpro.2025.109908_b17 article-title: Simultaneous wireless information and power transfer (SWIPT):Recent advances and future challenges publication-title: IEEE Commun. Surv. Tutorials doi: 10.1109/COMST.2017.2783901 – volume: 15 start-page: 740 issue: 1 year: 2016 ident: 10.1016/j.sigpro.2025.109908_b3 article-title: Achieving high energy efficiency and physical-layer security in AF relaying publication-title: IEEE Trans. Wirel. Commun. doi: 10.1109/TWC.2015.2477510 – volume: 18 start-page: 5764 issue: 12 year: 2019 ident: 10.1016/j.sigpro.2025.109908_b27 article-title: Buffer-aided adaptive wireless powered communication network with finite energy storage and data buffer publication-title: IEEE Trans. Wirel. Commun. doi: 10.1109/TWC.2019.2938958 – volume: 15 start-page: 3856 issue: 6 year: 2016 ident: 10.1016/j.sigpro.2025.109908_b1 article-title: Exploiting direct links for physical layer security in multiuser multirelay networks publication-title: IEEE Trans. Wirel. Commun. doi: 10.1109/TWC.2016.2530068 – volume: 61 start-page: 4754 issue: 11 year: 2013 ident: 10.1016/j.sigpro.2025.109908_b15 article-title: Wireless information and power transfer:Architecture design and rate-energy tradeoff publication-title: IEEE Trans. Commun. doi: 10.1109/TCOMM.2013.13.120855 – volume: 13 start-page: 3269 issue: 6 year: 2014 ident: 10.1016/j.sigpro.2025.109908_b16 article-title: Joint transmit beamforming and receive power splitting for MISO SWIPT systems publication-title: IEEE Trans. Wirel. Commun. doi: 10.1109/TWC.2014.041714.131688 – volume: 12 start-page: 1989 issue: 5 year: 2013 ident: 10.1016/j.sigpro.2025.109908_b14 article-title: MIMO broadcasting for simultaneous wireless information and power transfer publication-title: IEEE Trans. Wirel. Commun. doi: 10.1109/TWC.2013.031813.120224 – volume: 69 start-page: 6485 issue: 6 year: 2020 ident: 10.1016/j.sigpro.2025.109908_b29 article-title: Buffer-aided secure relay networks with SWIPT publication-title: IEEE Trans. Veh. Technol. doi: 10.1109/TVT.2020.2988357 |
SSID | ssj0001360 |
Score | 2.4490638 |
Snippet | We focus on the achievable time-averaged secrecy rate-harvested energy region in delay-constrained wireless powered multi-input single-output (MISO) network,... |
SourceID | crossref elsevier |
SourceType | Index Database Publisher |
StartPage | 109908 |
SubjectTerms | MISO network Physical layer security Secrecy rate-harvested energy region Wireless energy transfer |
Title | Adaptive secure wireless information and power transfer in delay-constrained multiuser multi-input single-output networks |
URI | https://dx.doi.org/10.1016/j.sigpro.2025.109908 |
Volume | 232 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07T8MwELaqssCAeIryqDywuo0TxwljVVEVEF2gUrfIr6CgKo1oOnTht-OzE1EkxMBmR7YUne278_m77xC6DYSgTMiQKB0nhCUmImnKcpJb63ynozCNFQT0n2d8OmePi3jRQeM2FwZglY3u9zrdaevmy7CR5rAqiuELJOJQ94zkWFuAE5SxBHb54PMb5kEjlykMgwmMbtPnHMZrXbxZPWVviWE8cE9E6e_macfkTI7QYeMr4pH_nWPUMeUJOthhEDxF25EWFWgsvIbAucFAPby02gs3jKggdyxKjSsoh4Zr56faRlFi4IfcEgUOItSJMBo7dCGELXyLFGW1qTFEE5aGrDY19EqPG1-fofnk_nU8JU01BaLstaEm1rEKJAvtoTPMpFDJgCtFhZGJCriMDLV9zalkPA2ksrcOnVv7rxLrnykumI7OUbdcleYCYQaMQCwRlOfWIbBLDY-REWeGmzinMuoh0goxqzxpRtaiyd4zL_QMhJ55ofdQ0ko6-7H4mdXrf868_PfMK7QPPY-8vUbd-mNjbqx_Ucu-20B9tDd6eJrOvgCiJtIl |
linkProvider | Elsevier |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07T8MwED6VdgAGxFOUpwdW0zwcJ4xVBUrpY6GVukWJ46CgKo1oOvTf47MTVCTEwGYnsRSdk8-fz3ffATxYcWyzOHGoSD2fMl-6NAhYRjO1Oj-lrhN4Ah36kykP5-x14S1aMGhyYTCsssZ-g-karesrvdqavTLPe2-YiGPrYySt2sL2oIPqVF4bOv3hKJx-A7Lt6mRhfJ7igCaDTod5rfN3BVVqo-h4j_qUKPh9hdpZdV6O4aimi6Rv3ugEWrI4hcMdEcEz2PbTuETQImv0nUuC6sNLBWCkFkVF05O4SEmJFdFIpamqauQFQYnILRXIEbFUhEyJDjBEz4Vp0bwoNxVBh8JS0tWmwl5hQsfX5zB_eZ4NQloXVKBC7RwqqriVlTBH_XeSyQCLGXAh7FgmvrB44kpb9VNuJ4wHViLUxiPNFAUQvqJogscsdS-gXawKeQmEoSgQ82ObZ4oTqNnG80iXM8mll9mJ2wXaGDEqjW5G1ASUfUTG6BEaPTJG74LfWDr6Mf-RgvY_R179e-Q97IezyTgaD6ejazjAOyYQ9wba1edG3iq6USV39ef0Bd651NY |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Adaptive+secure+wireless+information+and+power+transfer+in+delay-constrained+multiuser+multi-input+single-output+networks&rft.jtitle=Signal+processing&rft.au=Lan%2C+Xiaolong&rft.au=Chen%2C+Yang&rft.au=Zhang%2C+Lei&rft.au=He%2C+Junjiang&rft.date=2025-07-01&rft.issn=0165-1684&rft.volume=232&rft.spage=109908&rft_id=info:doi/10.1016%2Fj.sigpro.2025.109908&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_sigpro_2025_109908 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0165-1684&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0165-1684&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0165-1684&client=summon |