UCL Discovery
UCL home » Library Services » Electronic resources » UCL Discovery

Deep Learning Aided Secure Transmission in Wirelessly Powered Untrusted Relaying in the Face of Hardware Impairments

Shahiri, V; Forouzesh, M; Behroozi, H; Kuhestani, A; Wong, KK; (2024) Deep Learning Aided Secure Transmission in Wirelessly Powered Untrusted Relaying in the Face of Hardware Impairments. IEEE Open Journal of the Communications Society 10.1109/OJCOMS.2024.3381951. (In press). Green open access

[thumbnail of Deep_Learning_Aided_Secure_Transmission_in_Wirelessly_Powered_Untrusted_Relaying_in_the_Face_of_Hardware_Impairments.pdf]
Preview
Text
Deep_Learning_Aided_Secure_Transmission_in_Wirelessly_Powered_Untrusted_Relaying_in_the_Face_of_Hardware_Impairments.pdf - Published Version

Download (2MB) | Preview

Abstract

Limited power and computational resources make the employment of complex classical encryption schemes unrealistic in resource-limited networks, e.g., the Internet of Things (IoT). To this end, physical layer security (PLS) has shown great potential in securing such resource-limited networks. To further combat the power scarcity in IoT nodes, radio frequency (RF) based energy harvesting (EH) is an attractive energy source while relaying can enhance the energy efficiency and extend the range of data transmission. Additionally, due to deploying low-cost hardware, imperfections in the RF chain of IoT transceivers are common. Against this background, in this paper, we investigate an untrusted EH relay-aided secure communication with RF impairments. Specifically, the relay simultaneously receives the desired signal from the source and the jamming from the destination in the first phase. Hence the relay is unable to extract the confidential desired signal. The resultant composite signal is then amplified by the relay in the second phase by using the energy harvested from the composite signal followed by its transmission to the destination. Since the destination is the original source of the jamming, its effect can be readily subtracted from the composite signal to recover the original desired signal of the source. Moreover, in the face of hardware impairments (HWIs) in all nodes, maintaining optimal power management both at the source and destination may impose excessive computations on an IoT node. We solve this problem by deep learning (DL) based optimal power management maximizing the secrecy rate based on the instantaneous channel coefficients. We show that our learning-based scheme can reach the accuracy of the exhaustive search method despite its considerably lower computational complexity. Moreover, we developed an optimization framework for judiciously sharing HWIs across the nodes, so that we attain the maximum secrecy rate. To derive an efficient solution, we utilize a majorization-minimization (MM) algorithm, which is a particular instance in the family of successive convex approximation (SCA) methods. The simulation results show that the proposed HWI aware design considerably improves the secrecy rate.

Type: Article
Title: Deep Learning Aided Secure Transmission in Wirelessly Powered Untrusted Relaying in the Face of Hardware Impairments
Open access status: An open access version is available from UCL Discovery
DOI: 10.1109/OJCOMS.2024.3381951
Publisher version: http://dx.doi.org/10.1109/ojcoms.2024.3381951
Language: English
Additional information: © Copyright 2024 IEEE. Published under a Creative Commons License (https://creativecommons.org/licenses/by-nc-nd/4.0/).
Keywords: Deep learning, Energy harvesting, Hardware impairments, Majorization-minimization, Physical layer security, Untrusted relaying
UCL classification: UCL
UCL > Provost and Vice Provost Offices > UCL BEAMS
UCL > Provost and Vice Provost Offices > UCL BEAMS > Faculty of Engineering Science
UCL > Provost and Vice Provost Offices > UCL BEAMS > Faculty of Engineering Science > Dept of Electronic and Electrical Eng
URI: https://discovery.ucl.ac.uk/id/eprint/10190508
Downloads since deposit
5Downloads
Download activity - last month
Download activity - last 12 months
Downloads by country - last 12 months

Archive Staff Only

View Item View Item