Abstract

In this paper, we consider the secure green-oriented multiuser scheduling for the wireless-powered Internet of Things (IoT) scenario, in which multiple source sensors communicate with a controller assisted by an intermediate sensor with the existence of a passive tapping device. Due to the limited energy, all sensors must acquire energy from external power beacons (PBs). Specifically, for the security improvement, we introduce two multiuser scheduling schemes possessing the optimal PB chosen by the relay, i.e., the best source sensor is scheduled in a random way (BSR), while the best source sensor is decided by the best PB (BSBP). Furthermore, for every scheme, we derive the analytical expressions for the secrecy outage probability (SOP) and investigate the secure energy efficiency (SEE) optimization problem with constricted transmission power in PBs. Simulation results reveal that the BSBP scheme provides better secrecy performance, and elevating the PBs quantity or reducing both the ratio of distance from PBs to source users and the total communication distance to some extent is helpful for improving SEE. In addition, the time-switching factor shows an important effect upon secrecy performance of the considered system.

1. Introduction

As the key architecture of the fifth generation (5G) mobile communication system, the Internet of Things (IoT) has attracted more and more attention [1]. The primary driving thought for the prospective IoT has relation with smart sensors, and wireless sensor networks (WSNs) have been observed as key enablers of IoT applications recently, where multiple sensor nodes are caused by instant or periodic data acquisition in multiple environments [2]. However, among various types of IoT sensors, most of the objects are resource-constrained, battery-powered, and characterized by both of the low energy and poor computation capacity, resulting in the one of the biggest barrier impeding generalization of IoT in the future which is the limitation of energy [3]. Meanwhile, the rapid development of IoT will give rise to the massive deployment of sensor nodes and a vast amount of information exchange, making it unfeasible to flexibly recharge and control the power-constricted devices. Due to the rising power costs, green-oriented methods have inevitably become the dominating design consideration in the IoT system. Fortunately, far-field wireless energy transfer (WET), which enables wireless devices to acquire energy from the broadcast signals for their operation and information exchange, has considered as an appealing method to provide consistent and stable energy to power-constrained users of IoT, particularly when traditional energy harvesting (EH) techniques from reproducible energy sources are inapplicable [4]. Such a new communication type is known as wireless-powered communication (WPC), where the wireless users of IoT are powered through surrounding electromagnetic signals, which is likely to be dedicated wireless transmitters utilized to charge wireless terminals. As such, it can completely eliminate the burden of battery renewal and/or recharging, avoid the interruption caused by the running out of power, and provide networks with theoretically perpetual lifespans [5].

Generally, a basic hurdle of wireless transmission upon the basis of WPC rest with the fast attenuation of radio frequency (RF) signals with distance changing. Moreover, energy amount acquired at wireless-powered devices is fairly restricted, which limits the coverage severely and has become a bottleneck for the widespread application of WPC. Consequently, the design of energy-efficient transmission is of great significance for transforming the green concept into future wireless-powered IoT. Although the harvested energy from RF signals appears to be inefficient and the WPC-based wireless communication seems to be not widely available at the current stage, practical applications for power-constrained devices of IoT have already been investigated, and more feasible applications will be implemented in the near future [68]. Until now, a lot of research efforts have also been devoted to explore the advantages of WPC in most applications of IoT since it could be easily combined with wireless terminals [913]. Specifically, typical wireless-powered communication networks (WPCN) were investigated in [9], where introduction of a dynamic time division multiple access (TDMA) protocol was performed for a multiuser WPCN, and the best time allocation for the downlink WPC and the uplink wireless information transmission (WIT) had been analyzed. Until now, the studies on WPCN have been extended to various communication systems. In particular, a joint wireless power transfer (WPT) and relay selection method were proposed for WPCN in [10], where the source and relays utilize the time-switching-based RF-EH method to acquire energy from a power beacon (PB) with multiple antennas. Differently, secrecy performance discussion of EH wireless sensor networks was examined in [11], where the authors proposed an optimization method, in which a wireless-powered friendly jammer was utilized for improving the secrecy performance of the considered model. Furthermore, the authors in [12] analyzed the secrecy performance of the EH sensor system and proposed a best-relay-and-best-jammer protocol for enhancing the secrecy of a system with the source user and multiple sensor relays harvesting energy from diverse PBs. Recently, inspired by abovementioned works, a secure energy-efficient transmission design for wireless-powered IoT possessing various PBs was investigated in [13], where the authors introduce different relay selection schemes possessing the optimal PB under the selection of the single source and solve the optimization problem of secure energy efficiency (SEE). It is worth mentioning that above works mostly focused on the secrecy performance improvement contributed by relay selection, while ignored the practical scenario with multiusers, which can be considered as the typical application of IoT.

1.1. Related Works

Remarkably, in an effort to reduce the complexity and the costs of resource-constricted wireless-powered IoT, the multiuser scheduling has drawn wide attention due to the significant potential performance improvement [1419]. Particularly, the authors in [14] explore the largest energy efficiency for multiuser WPCN by joint power control and time allocation while taking account of the initial battery energy level of all the users. Furthermore, the authors in [15] applied the notion of proportional fair scheduling to WPCN and overcome the doubly near fair problem by an opportunistic scheme. Meanwhile, in a multiuser system, the authors in [16] consider multiuser scheduling criteria taking into account cochannel interference in a multicell environment and propose an adaptive scheduling scheme. Then, in a WPCN-based multi-input multioutput (MU-MIMO) multiuser system, [17] proposes a zero-forcing-based transmission method by a downlink energy beamformer to optimize the related parameters. Afterwards, the authors in [18] concentrate on an MIMO-WPCN, in which a dedicated multiantenna PB transfers RF energy to some starve users, and then these users send required information to the destination. And, last but not the least, [19] focuses on the cumulative transmission framework of multiuser scheduling in full-duplex wireless-powered IoT system and designs a novel throughput-oriented scheduling strategy, which models the dynamic charging and discharging procedures for all the devices in IoT as a finite-state Markov chain.

On the contrary, the broadcast characteristics of wireless transmission make the WPT and WIT more vulnerable to malicious attacks, turning secure transmission into a burdensome task [20]. Typically, the upper layer cryptographic techniques are explored for securing the privacy information against intercepting in traditional wireless transmissions [21]. However, conventional cryptographic technology is limited in wireless-powered IoT because of the requirements of high hardware complicacy and massive energy [22]. Furthermore, an eavesdropper (Eve) possessing unlimited computing capacity is likely to make such technology compromised [23]. Fortunately, physical layer security (PLS), as a promising approach to make sure the safety of wireless communication, has been a high-effectiveness supplement to current solutions. As far as wireless PLS is concerned, the fundamental thought is to utilize the features of wireless channels for transmitting information in a reliable manner from the source to the intended receiver and to make sure the privacy of the information, to put in different way, not to be intercepted or eavesdropped [24]. Currently, PLS has been broadly deployed for ensuring security of future wireless networks [25, 26] because it can provide the security of new network architectures such as the IoT. In recent years, some literatures have explored secure communications in multiuser-scheduling-aided WPCN [27, 28]. Specifically, [27] investigates the secrecy performance of dual-hop multiuser relay system by exploiting the maximal ratio transmission (MRT) scheme and proposes a threshold-based multiuser scheduling method. On the contrary, the authors in [28] consider a multiantenna wireless network, in which the base station and the users have been given with multiple antennas. However, it is worth noting that few works have considered the SEE in wireless-powered IoT scenario.

1.2. Paper Contributions and Organization

Enlightened by the aforementioned observations, this paper focuses on the secrecy performance analysis of a typical wireless-powered IoT, in which multiple source sensors that perform monitoring or operating tasks in a localized group and an intermediate node performs as relay are powered by multiple dedicated PBs. Furthermore, we propose two multiuser scheduling schemes and compare their secrecy performance for providing the secure energy-efficient transmissions. The main contributions of our work are listed as follows:(i)We explore the PLS in the wireless-powered IoT and propose two green-oriented multiuser scheduling schemes, in which the optimal PB is decided by the relay; meanwhile, the best source is scheduled in a random way (BSR) or chosen by the best PB (BSBP), respectively.(ii)For the two proposed schemes, we obtain the closed-form expressions of the secrecy outage probability (SOP) and solve the SEE optimization problem with constrained transmission power in PB by resorting to the searching method. Compared with the BSR scheme characterized by lower complexity and simpler application, the BSBP scheme can make full use of the power transfer links contributed by diverse PBs and present the better secrecy performance.(iii)Simulation results demonstrate that increasing the number of PBs is favorable to improve the SEE of the studied scenario. Meanwhile, decreasing both the ratio of distance from PBs to the sources and the total communication distance to some extent is advantageous for SEE. Additionally, the time-switching factor has an important effect upon the secrecy performance of the considered system, which is worth designing and optimizing carefully.

The remaining part of this paper is summarized as follows. Section 2 provides details concerning the system model, the process of WPT, signal analysis, and two proposed multiuser scheduling schemes. Section 3 derives the exact SOP of BSR and BSBP schemes, respectively. Then, in Section 4, the SEE optimization research is given. The simulation results are presented in Section 5. Eventually, conclusions of this paper are drawn in Section 6.

2. System and Channel Model

The system model, the process of WPT, signal analysis, and two multiuser scheduling strategies are presented in this section.

2.1. System Model

Consider a dual-hop multiuser uplink WPCN for the IoT application as illustrated in Figure 1, where multiple source users , communicate with the controller D aided by the decode-and-forward (DF) relay, and are overheard by the passive Eve E. Considering the constricted coverage of sensors, we assume the direct link is not available [10]. Meanwhile, owing to the limitation of energy in the IoT system, and R have to gain energy by WPT from a selected , to support data transmission. And, the controller is powered by on-grid power. Apart from that, considering the size and cost limitations, it is assumed that, in each sensor, the destination D and the Eve E are single-antenna and half-duplex devices [12]. It is worth highlighting that the above configurations have numerous practical applications, such as in IoT, where the multiple source sensors upload information via a certain sensor (performs as relay) that is limited to a single antenna due to size limitations and cost.

Furthermore, we consider that each link will be affected by Rayleigh fading. Thus, the power gains of the channel are subject to exponential distribution with parameter , where and . Meanwhile, the additive white Gaussian noise (AWGN) at R and D has zero mean and variance . Compared with the full channel state information (CSI) assumption in [12, 27], where perfect CSI is considered in order to investigate the performance bound, we consider only the statistic CSI can be acquired, which is more practical due to the weak computation ability and small memory of sensors. The specific estimation method for obtaining CSI is shown in [29]. In practice, when the eavesdropper is a member of the network and wants to interpret information that is not passed on to him, the partial CSI of the wiretap link is available.

In order to facilitate mathematical modeling, the channel coefficients of the , , , , , and transmission channels are represented by , , , , , and , respectively, which are independent and distributed in an identical manner (i.i.d.) from one block to next. Meanwhile, the distances of the , , , , , and transmission links are represented by , , , , , and , respectively. Furthermore, it is assumed that the multiple PBs and multiple source users are close in proximity, i.e., a certain clustering protocol in place. This assumption is generally used in the WPCN [12], which brings about the equivalent mean channel power gains of the channels , , , and , respectively. For convenience, we define , , , and for any and .

2.2. Wireless Power Transfer

In the WPT process, the receiver adopts the EH model based on rectangular antenna structure. For the rectangular antenna, the received signal can be converted into a direct current (DC) signal by a rectifier consisting of a passive low-pass filter (LPF) and a Schottky diode [30]. Then, it is considered that the harvested energy by all users at the stage of WPT is entirely used to transmit message in WIT, which is known as the harvest-use (HU) mode as in [31]. This consideration is practical for devices of IoT because they are limited by the size and cost, which leads to the smaller batteries. As for the relaying strategy, the time-switching-based receiver (TSR) protocol is applied in the data transmission, thanks to its high throughput compared with power splitting-based receiver (PSR) protocol [32]. In particular, the duration between two successive data transmission is defined as a transfer time slot T, denotes the time of WPT, and represents the duration of WIT as illustrated in Figure 2, where is the time-switching coefficient. Based on the dual-hop communication, the time window of WIT is divided into two parts, i.e., is for and the remaining is provided for .

Then, we consider the scenario that a particular PB is activated, while other PBs remain silent in order to reduce the computational complexity and energy consumption, because PB selection is an green-oriented WPT scheme [12]. To be more specific, the PB with the best link for the channel is chosen to implement WPT for and R. The index of certain PB can be expressed aswhere is power gain of the link from the selected to R. Furthermore, the harvested energy at and R can be expressed as follows [33]:where denotes the EH efficiency factor, which is mainly determined by the EH circuitry and frequencies (e.g., 15 MHz–2.5 GHz) [34]; represents the transmit power of the PBs; θ is the path loss exponent; and are power gains of the channels from the selected to and R, respectively; and . Note that we neglect the harvested energy from the noise since the source users and the relay sensor are passive, and their received noise powers are much smaller than the received powers contributed by the PBs [35].

Lemma 1. If , , is the random variable subject to the exponential i.i.d, the probability density function (PDF) and the cumulative distribution function (CDF) of can be expressed byin which x denotes the independent variable, and is the average channel gain.

According to Lemma 1, the PDF of can be derived aswhere and is an expectation operator.

Assuming that the channel fading factors are still unchanged within a transfer time slot, the transmit power of and R are represented as follows [36]:

From (6) and (7), it is assumed that the SNRs at R and E in the first hop are denoted as and , while the SNRs at D and E in the latter hop are represented as and . And the SNRs can be given aswhere is the index of the chosen source sensor (i.e., scheduled user), , , and . Comparably, , , and are given as where , denotes the variance of AWGN at E, and , , and .

2.3. Multiuser Scheduling Scheme

Then, when the best PB is determined, we pay attention to the two multiuser scheduling schemes, one is a straightforward scheme with the lower complexity, in which the best source is scheduled randomly from multiple users (BSR), and another is a joint PB and source user selection scheme, in which the best source is chosen by the optimal PB (BSBP).

2.3.1. The BSR Scheme

For reduction of the complexity and costs of considered networks, the source user is scheduled randomly among the candidates in the BSR scheme. It is worth noting that , , , , and are exponentially distributed with parameters , , , , and , respectively.

Remark 1. The BSR scheme is applicable for the delay-sensitive and resource-constricted scenarios owing to its lower complexity of computation. However, the BSR scheme fails to have the diversity gain contributed by diverse users, which hinders the secrecy improvement of communication systems.

2.3.2. The BSBP Scheme

Aiming to obtain the diversity gain, the best user is chosen from the perspective of in this scheme. Specifically, based on the CSI of the channels, the index of the scheduled source can be drawn as

Therefore, , , , and are exponentially distributed with parameters , , , and , respectively, while the PDF of can be drawn according to Lemma 1:where .

Remark 2. According to the (10) and (11), we find that the BSBP scheme is able to obtain the diversity gain contributed by multiple users. Note that this scheme schedules the source user, taking into account the selection of PB adequately. As a result, this scheme can decline the interruption probability of information communication for source sensors in an effective way, which is beneficial to energy-limited IoT applications.

3. Secrecy Outage Probability Analysis

In the system, we consider that and R use the different codebooks to improve secrecy performance. In line with [37], the secrecy capacity of the scenario can be indicated aswhere and denote the achievable secrecy capacity of the dual-hop, respectively, which is presented to bewhere the reason why the factor is that, the communication time of every hop is during a transmission slot, . Therefore, the secrecy capacity can be updated as

Regarding evaluation of the secrecy performance, the SOP is used as the figure of merit, which is regarded as an important indicator of PLS generally. From the perspective of information theory, the transmission incurs secrecy outage if is less than a predetermined secrecy rate threshold . Specifically, the SOP of every scheme can be shown as where , is the secrecy capacity of each scheme, and is the probability.

3.1. Derivation for the BSR Scheme

According to the BSR scheme, each source user of the system has the same opportunity to participate in the transmission. Therefore, the exact SOP of the BSR scheme should be formulated aswhere is the SOP when the source user is decided and represents the modified Bessel function of the second kind [38].

Proof. See Appendix A.

3.2. Derivation for the BSBP Scheme

Furthermore, according to (16), the closed-form expression of SOP for BSBP scheme is calculated as

Proof. See Appendix B.

4. Secure Energy Efficiency Maximization

Generally, security improvement comes at the expense of more energy consumption frequently. With regard to energy-limited IoT applications, recklessly pursuing secrecy improvement has a negative effect on the performance of networks. Consequently, it is of great significance to make sure the safe communication in the application of IoT with low energy cost. From the above, the SEE is utilized as the proper metric for evaluation of the secrecy performance [39]. Mathematically, the SEE of above discussed schemes can be given aswhere denotes the SEE of each scheme, represents the total power cost at PBs, κ denotes the power factor, and and stand for the fixed power and transmit power at PBs, respectively. Consider that the harvested energy by the sensors is fully used for data transmission, while the power consumption of the circuity is ignored.

To find the best transmit power of PBs and the time-switching factor, the SEE maximization problem can be considered aswhere denotes the maximum transmit power of PBs. Obviously, the solving process of the exact expressions for and α is rather tedious. Instead, by using the searching method, the optimal and α can be derived on the basis of simulation and numerical analysis. It ought to be highlighted that equation (20) is of more practical importance to the IoT scenarios.

5. Numerical Results and Discussion

In this section, some numerical outcomes are provided for validation of the abovementioned secrecy analysis and for discussion of the joint effect of corresponding parameters upon the secrecy performance of the two proposed multiuser scheduling schemes. Consistent with [40], the simulation is conducted on a linear topology, in which the multiuser sensors in a localized group as well as multiple PBs, relay R, and controller D are arranged horizontally. Unless otherwise stated, we use the following parameters in accordance with [10] throughout this section. In particular, we set  dB, the predetermined secrecy rate  bits/s/Hz, the energy conversion efficiency , the distances are set to  m, , and . Moreover, we set the number of the users , the power coefficient , the path loss exponent , and  mW. It is obvious that the theoretical results agree exactly with the simulation results, which validates the correctness of our derivations. It is worth noting that all the numerical results in this section come from the simulation environment of MATLAB, which are all true experimental results. Combining the parameter setting in the article with the program code, all the results can be reproduced.

Figure 3 describes the SOP of the proposed multiuser scheduling schemes versus for different M with , . Overall, it can be seen in this figure that the proposed BSBP scheme can achieve better secrecy performance than the BSR scheme in the whole range of with different M, which indicates that the BSBP scheme is more effective to improve the secrecy performance of the considered system. Furthermore, the number of PBs contributes to the improvement of SOP. This is attributed to the fact that more PBs are able to provide larger diversity gain for improving SOP.

Figure 4 shows the SEE of the system with BSR/BSBP scheme versus for different M with and . It is illustrated in this figure that the function of SEE and is unimodal function. The reason is that increasing brings about the improvement of SEE in low energy consumption, but it has a negative impact on the SEE in high energy consumption. Furthermore, as expected, the SEE of BSBP scheme outperforms that of the BSR scheme in the whole region, which demonstrates the advantage of BSBP in improving the secrecy performance. In addition, by increasing the number of PBs, the better security can be achieved, which can be understood through the following discussion. Furthermore, Figure 5 depicts the SEE of two multiuser scheduling strategies versus α with and  dB in consideration of various M. Obviously, the function of SEE and α is also unimodal function. This is due to the fact that when α is small, the harvested energy is commonly insufficient for the operation of multiple source sensors and relay sensor, while if α is large excessively, the duration of information communication will be restricted seriously, which will result in high transmission interruption probability. On the contrary, similar to Figure 4, the BSBP scheme always provides the best SEE performance with varying α and M, which validates the advantage of proposed BSBP scheme again.

Figure 6 presents the SEE of the two proposed strategies versus and M with and  dB. It can be observed that when the group of PBs is closer to multiple source users and the number of PBs is much more relative, the two proposed strategies achieve the best efficiency. Meanwhile, the BSBP scheme is more effective when M is larger, which can be explained as the abovementioned discussion.

Figure 7 plots the impact of and on the optimization of SEE by the searching method with BSR/BSBP scheme for  dB. As shown clearly in the figure, the proposed multiuser scheduling schemes are more effective when and are smaller. As a matter of fact, the condition makes it possible for the sensors to acquire plenty of energy more readily, of which effect is equivalent to increasing or expand α.

6. Conclusion

In this paper, the secrecy performance analysis of wireless-powered IoT possessing diverse PBs has been investigated. Specifically, the two green-oriented multiuser scheduling schemes to promote the secrecy performance of the networks are proposed. For each scheme, the analytical closed-form expression of SOP is obtained, while the optimization problem of SEE is solved by resorting to the searching method. To shed light on future applications of wireless-powered IoT, simulation results are presented to demonstrate the accuracy of our analysis, and the secrecy performance of the two proposed schemes is discussed, subject to various important parameters of the system.

Appendix

A. Proof of Formula (17)

According to (16), is given by

Then, in line with (15) and (16), we havewhere is the CDF of , which can be given with the help of (A.1) by

Furthermore, and can be derived aided by the Eq. (3.351.3) in [38], and the expression is listed as follows:

Finally, by substituting (A.4) and (A.5) into (A.3) and performing some mathematical manipulations, (17) can be derived.

B. Proof of Formula (18)

Similar with in (A.1), can be shown as

Meanwhile, according to (15) and (16), we findwhere is the CDF of , and it can be expressed with the help of (A.1) as

After that, and can be obtained using the Eq. (3.351.3) in [38] and the expression listed below:

Finally, by substituting (B.4) and (B.5) into (B.3) and performing some mathematical manipulations, (18) can be derived.

Data Availability

The data used to support the findings of this study are included within the article.

Conflicts of Interest

The authors declare that there are no conflicts of interest regarding the publication of this paper.

Acknowledgments

This work was supported by the National Natural Science Foundation of China under Grant numbers 61501508 and 61671476.

Supplementary Materials

The supplementary materials mainly include three folders. First of all, the folder named “Additional materials,” which contains some pictures, is provided to illustrate the authenticity and reproducibility of our experimental results. It is worth noting that the above results are derived from the experimental environment of MATLAB and can be obtained by appropriately adjusting the simulation program that is given later. Then, the folder “Code” gives some simulation programs, on the basis of which we can reproduce our research results. Specific procedures and related instructions can be found in the simulation program. Furthermore, the M file in the folder “code”, named WPCCN6_SEE_gammaB, is the main program. Based on the main program, by changing the different performance indicators, i.e., SOP or SEE required, Figures 3 and 4 in our manuscript can be derived. Meanwhile, other M files in the folder “code” are the callable programs. On the contrary, the files named “WPCCN_fig0.fig” and “WPCCN_fig1.fig” in the folder “code” are the numerical results of the simulation experiment, which had been given in our paper, i.e., Figures 3 and 4. Finally, the folder named “ReadMe” is a document explaining the simulation program, which can also be seen as a simple explanation of the supplementary material. It is worth noting that all the numerical results in our paper come from the simulation environment of MATLAB, which all are true experimental results. The specific experimental parameters are given in Section 5. Combining the parameter setting in the article with the program code, all the results can be reproduced. All program codes in the folder “code” are our original, which are refused to forward to others. If anyone has any questions, please contact us via email. The mailbox address is [email protected]. (Supplementary Materials)