Performance analysis of delay-constrained wireless energy harvesting communication networks under jamming attacks
- Authors
- Niyato D.[Niyato D.]; Wang P.[Wang P.]; Kim D.I.[Kim D.I.]; Han Z.[Han Z.]; Xiao L.[Xiao L.]
- Issue Date
- 2015
- Keywords
- delay-constrained; jamming attack; Wireless harvesting communication networks
- Citation
- 2015 IEEE Wireless Communications and Networking Conference, WCNC 2015, pp.1823 - 1828
- Journal Title
- 2015 IEEE Wireless Communications and Networking Conference, WCNC 2015
- Start Page
- 1823
- End Page
- 1828
- URI
- https://scholarworks.bwise.kr/skku/handle/2021.sw.skku/48206
- DOI
- 10.1109/WCNC.2015.7127745
- Abstract
- In wireless energy harvesting communication networks, a user receives wireless energy released by an ambient or dedicated energy source, and uses that energy for delay constrained data transmission. However, such data transmission can be susceptible to a jamming attack from a nearby attacker also harvesting from the wireless energy source. In this paper, we consider such a scenario and present performance analysis. In particular, we develop an analytical model for the network based on a Markov chain to obtain various performance measures for the user including throughput and delay distribution. The performance evaluation shows some interesting results. For example, under the jamming attack, there is a maximum achievable throughput of the user. We also validate the analytical model using simulation. © 2015 IEEE.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - Information and Communication Engineering > School of Electronic and Electrical Engineering > 1. Journal Articles
![qrcode](https://api.qrserver.com/v1/create-qr-code/?size=55x55&data=https://scholarworks.bwise.kr/skku/handle/2021.sw.skku/48206)
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.