Impact of Wireless Energy Transfer Strategies on the Secrecy Performance of Untrustworthy Relay Networks


The purpose of this study is to investigate the performance of a dual-hop relaying network that contains an unreliable energy-constrained amplify-and-forward relay in regards to secrecy outages. In order to stop the relay from being able to decode confidential messages sent from the source, a technique of jamming based on the destination is utilized. In addition, research is being conducted into three different time-switching-based wireless energy transfer strategies with the goal of providing power to the relay. We are able to derive simple closed-form asymptotic expressions for the probability of a secrecy breach using these three different strategies when the signal-to-noise ratio is high. In addition, we provide analytical expressions for the optimal power allocation factor for the information transmission phase of the process. In the end, Monte Carlo simulations are run in order to validate the theoretical findings through the examination of a variety of illustrative examples.

Did you like this research project?

To get this research project Guidelines, Training and Code... Click Here

PROJECT TITLE : Underwater Ultrasonic Wireless Power Transfer: A Battery-Less Platform for the Internet of Underwater Things ABSTRACT: New maritime applications, including scientific research and business ventures, will be made
PROJECT TITLE : Revenue-Optimal Auction For Resource Allocation in Wireless Virtualization: A Deep Learning Approach ABSTRACT: Virtualization of wireless networks has emerged as an essential component of future cellular networks.
PROJECT TITLE : In-band Secret-Free Pairing for COTS Wireless Devices ABSTRACT: Numerous Internet of Things devices are missing the user interfaces (screens, keyboards) required to enter passwords or change the default passwords.
PROJECT TITLE : Identity-Based Attack Detection and Classification Utilizing Reciprocal RSS Variations in Mobile Wireless Networks ABSTRACT: One of the most dangerous dangers that wireless networks face is that of identity-based
PROJECT TITLE : Lyapunov Optimization Based Trade-Off Policy for Mobile Cloud Offloading in Heterogeneous Wireless Networks ABSTRACT: Mobile cloud computing, also known as MCC, is gaining popularity as a means of enhancing the

Ready to Complete Your Academic MTech Project Work In Affordable Price ?

Project Enquiry