I Introduction
Simultaneous wireless information and power transfer (SWIPT) systems have spurred considerable research interest in both academia and industry [1]. The SWIPT technique provides significant convenience to its users by efficiently utilizing the radio frequency (RF) signal for both information and power transfer [2]. However, SWIPT systems require a special receiver design to support the dual capability of energy harvesting (EH) and information decoding (ID). In the literature, two broad categories of SWIPT receiver architectures have been proposed namely the separated and the integrated receiver architectures [1]. The separated receiver architecture has dedicated separate units for ID and EH. However, this increases the complexity and cost of the receiver hardware [3]. In contrast, the integrated receiver architecture has a unified circuitry to perform ID and EH jointly, which reduces the hardware costs [3].
Varshney et al. in [4] were the first to propose the transmission of information and energy simultaneously. They developed a capacityenergy function to characterize the fundamental tradeoff in performance between simultaneous information and power transfer. In [5], the authors extended the work of [4] to frequencyselective channels with additive white Gaussian noise (AWGN). It was shown in [5] that a nontrivial tradeoff exists for information transfer versus energy transfer via power allocation. A SWIPT system under cochannel interference was studied in [6]. The authors derived optimal designs to achieve outageenergy tradeoffs and rateenergy tradeoffs. In [7] the authors considered the performance of a SWIPT system with imperfect channel state information (CSI) at the transmitter. Networks that employ pure wireless power transfer were studied in [8] and [9]. In [8], the authors studied a hybrid network that overlaid an uplink cellular network with randomly deployed power beacons, which charged mobiles wirelessly. The authors then derived the tradeoffs between different network parameters under an outage constraint on the data links.
The broadcast nature of wireless signals implies that nodes other than the intended receiver may also receive the transmitted message, which results in information leakage. Although cryptographybased techniques are conventionally used to secure transmitted information, the high computational complexity of these techniques consumes a significant amount of energy [10]. Recently, physical layer security (PLS) has been proposed as an alternative for securing wireless communications by exploiting the channel characteristics such as fading, noise, and interferences [11]. The secrecy performance of a cooperative network was investigated in [12, 13]; secrecy for interference limited networks was studied in [14] and for cognitive radio networks in [15, 16, 17]. In[18], the authors analyzed the secrecy performance of a multicast network in which the transmitter broadcasted its information to a set of legitimate users in the presence of multiple eavesdroppers. The authors then proposed power minimization and secrecy rate maximization schemes for the considered multicasting secrecy network. The security of largescale networks has also been characterized in terms of connectivity [19], coverage [20] and capacity [21]. Researchers have also considered socalled artificial noise generation techniques to reduce the signaltointerference ratio of the eavesdropper channel while minimizing the interference to the legitimate link [22, 23]. The authors in [24, 25] studied cooperative jamming, whereby a relay transmitted an interfering signal towards the eavesdropper while the source broadcasted its message. In [26], secure beamforming techniques have been explored to maximize the received power at the legitimate receiver. The PLS techniques are naturally applicable to SWIPT but the design of an optimal PLS techniques for SWIPT systems is a nontrivial task since it needs to also consider the efficiency of the wireless power transfer. In general, if a power receiver is a potential eavesdropper then any increase in the information signal power to improve the power transfer efficiency may also compromise the message secrecy [6]. Therefore, the inherent tradeoff between power efficiency and information security in a SWIPT system merits detailed examination. The authors in [27] investigated the maximization of secrecy throughput for SWIPT systems. In particular, they considered power allocation between EH and ID to provide an optimal secure SWIPT solution. In the same work an analytical expression for the secrecy outage probability was also derived. In [28], the authors investigated the secrecy performance of a SWIPT system with the separated receiver SWIPT architecture employed at the eavesdropper and faded links. In [29] the authors introduced an artificial noiseaided precoding scheme to maximize the secrecy rate. In [30] the authors studied the secrecy capacity of an EH orthogonalfrequencydivisionmultiplexing network. All the subcarriers were allocated an identical power and the powersplitting technique was used to coordinate ID and EH. In [31] the authors analyzed secure beamforming for an amplifyandforward twoway relaying SWIPT network and proposed a zeroforcing based suboptimal solution to maximize the secrecy of the considered network.
In the SWIPT literature most investigations have considered only the separated receiver architecture [27, 29, 30, 31]. Furthermore, multiple eavesdroppers when considered are often assumed to operate independently, whereas in many practical scenarios these eavesdroppers may collaborate to enhance their secret message decoding capability [32]. Finally, the achievable secrecy rate may degrade significantly under imperfect channel estimation at the legitimate receiver, whereas imperfect CSI at the eavesdropper can prove beneficial for the system’s secrecy performance. To the best of the authors’ knowledge, a comparative analysis of the secrecy performance of the separated and integrated SWIPT architectures with eavesdropper cooperation and imperfect CSI has not been performed previously. Specifically, the main contributions of the submitted work are listed as follows:

We derive closedform expressions for the secrecy outage probability with imperfect CSI knowledge at the receivers and different combinations of the separated and the integrated SWIPT architectures at the legitimate and the eavesdropping receivers.

The tradeoff between secrecy performance and harvested energy is investigated.

The loss in secrecy performance due to eavesdropper cooperation is analyzed and compared with the noncooperative case.
The remainder of this paper is organized as follows. Section II presents the system model. In Section III the closedform expressions for the outage probability are derived for different receiver architectures. Section IV provides numerical results along with relevant discussion. In Section V, some concluding remarks are given.
Ii System Model
We consider the downlink of a SWIPT system as shown in Fig. 1 in which the Access Point (AP) transmits a secure message to the legitimate receiver S, which has simultaneous EH and ID capability. This transmission is also received by eavesdropping nodes that are admitted into the network for EHonly but exploit their SWIPT receiver architectures in an attempt to intercept the secret communication between AP and S [33]. Since the eavesdroppers, denoted by , are also part of the network  the AP is assumed to have CSI for the main channel to node S as well as for the wiretap channels [33]. All nodes are considered to be equipped with single antennas.^{1}^{1}1Analysis for multiantenna nodes [34] will be reported in future work. Our analysis considers two types of receiver architectures for both S and , i.e., the conventional separated receiver and the integrated receiver architecture [3] shown in Fig. 2. In the separated receiver, the RF signal after powersplitting (PS) is fed to separate circuitry for ID and EH, whereas in the integrated receiver PS between EH and ID takes place after the rectifier. The rectifier of the integrated receiver also downconverts the RF signal for ID, i.e., the downconversion operation is integrated with the energy receiver in this architecture. For both receiver types, the fractional powers received for ID and EH are denoted by and , respectively.
Consider that the AP transmits signal with power . The signal received at S can then be written as
(1) 
where represents the channel gain estimated by S and
denotes the zeromean variance
additive white Gaussian noise (AWGN) due to the receiver electronics at S. Additionally, is the path loss, where denotes the distance between AP and S and is the path loss exponent. Furthermore, is the carrier wavelength and and are the antenna gains at AP and S, respectively.Since S employs PS architecture, the received signal is further divided into two streams for ID and EH. The signal at the information decoder of S is given as
(2) 
where is the power splitting factor at S and is the signal processing noise at S, also distributed normally as . Since fraction of received power is used for energy harvesting, thus the amount of harvested energy at S, ignoring small amount of energy stored by antenna and signal processing noise, can be written as [3]
(3) 
where represents the power conversion efficiency at S. The AP transmission is also picked up by the eavesdroppers, the signal received at the information decoder of the th eavesdropper is written as
(4) 
where represents the channel gain estimated by the th eavesdropper. Furthermore, represents the thermal noise distributed as and is the signal processing noise distributed as , at the th eavesdropper. Here the noise statistics are assumed identical due to all eavesdroppers using the same type of hardware. For a tractable analysis, we consider and . Similar to (3), the amount of harvested energy at the th eavesdropper can be written as [3]
(5) 
where is the power conversion efficiency at the th eavesdropper. Moreover, without loss of generality, we consider throughout this work. Finally, the receiver nodes make an erroneous channel estimate due to their hardware impairments modeled as [35, 36]
(6) 
where , represents the true channel amplitude gain. The parameter is a measure of estimation accuracy with for a perfect estimate. Additionally,
is a normal random variable distributed as
. Now by substituting (6) into (2) we can express the signal received at S as(7) 
and substituting (6) into (4) we can express the signal received at th eavesdropper as
(8) 
Using the above equations, the instantaneous signaltonoise ratio (SNR) of the main channel can be written as
(9) 
and the SNR for the th wiretap channel can be expressed as
(10) 
where and . For subsequent analysis, is considered.
Iii Secrecy Outage Analysis
In this section closed form expressions for the secrecy outage probability are derived separately for four different cases that are based on the receiver types used at S and . Specifically, denotes outage probability for the case of separated receiver architectures at S and , denotes the outage for separated receiver at S and integrated receiver at , is the outage for integrated receiver at S and separated receiver at , and denotes outage probability for the case of integrated receivers at both S and . Each of these four cases are discussed first for the noncooperative eavesdropping scenario and later for cooperation among the eavesdroppers.
Iiia Noncooperative Eavesdroppers
In this scenario, the worstcase of the eavesdropper with the maximum SNR is considered to decode the message. The instantaneous SNR of the wiretap link can be rewritten as
(11) 
where
[37]with probability density function (PDF) expressed as
.
Then, the cumulative distribution function (CDF) for the instantaneous SNR of the wiretap link (i.e. random variable
falling below an arbitrary value ), is given as(12) 
Now using statistical independence of the wiretap channels and the CDF of a Gamma random variable [38], we obtain
(13) 
The corresponding PDF can be written as
(14) 
where represents the average SNR of the wiretap link and is the Nakagamim fading severity parameter for the wiretap link.
The PDF of the instantaneous SNR of the main link can be obtained as [37]
(15) 
The corresponding CDF is given as [37]
(16) 
where is the average SNR of the main link and represents the Nakagamim fading severity parameter for the main link.
IiiA1 Separated Receivers at S and
The achievable rates for the main and wiretap links can be written as and , respectively [3]. The achievable secrecy rate is defined as the nonnegative difference between the achievable rates of the main channel and wiretap channel, which is expressed as . A secrecy outage event occurs when falls below some target rate [39, 40]. The secrecy outage probability is then written as
(17) 
Now using (14) and (15) in (17) and with the help of [41, (8.352.4)], we obtain
(18) 
where
Furthermore, is the upper incomplete Gamma function and is the Gamma function [41]. The function can be readily evaluated using any computational software.
IiiA2 Separated Receiver at S and Integrated Receiver at
In this case the achievable rate for the main link is . On the wiretap link, the integrated receiver’s ID channel can be modeled as a freespace optical intensity channel [3]. The asymptotic highSNR achievable rate for this channel is expressed as , assuming that the signal processing noise dominates the antenna noise [3, 42]. Then using the approach of (17), we obtain
(19) 
where . Substituting (14) and (15) in (19) and using [41, (8.352.4)], we get
(20) 
where .
IiiA3 Integrated Receiver at S and Separated Receiver at
In this case, the main link has an asymptotic achievable rate of [3, 42], whereas the achievable rate for the wiretapper is . Then using a similar approach to (17) and after some manipulations, the outage probability is given as
(21) 
Substituting (13) and (15) in (21) and using the binomial theorem, we get
(22) 
where involves a single integral and can be readily evaluated in any computational software. Furthermore, and .
IiiA4 Integrated Receivers at S and
IiiB Cooperative Eavesdroppers
For the case of cooperative eavesdropping, the eavesdroppers share information to form a virtual antenna array for receive beamforming such that a singleinput multipleoutput (SIMO) channel exists between the AP and the eavesdroppers [19]. The combined message ensures the maximum achievable rate of the wiretap link. In this case the instantaneous SNR of the combined wiretap signal can be written as
(25) 
The PDF of can be written as [43]
(26) 
The CDF of the sum of independent, identicallydistributed Gamma random variables is expressed as [38]
(27) 
Comments
There are no comments yet.