{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T13:32:49Z","timestamp":1761744769262,"version":"3.41.2"},"reference-count":43,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2018,6,7]],"date-time":"2018-06-07T00:00:00Z","timestamp":1528329600000},"content-version":"vor","delay-in-days":157,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"EU","award":["H2020-MSCA-RISE-2015"],"award-info":[{"award-number":["H2020-MSCA-RISE-2015"]}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Wireless Communications and Mobile Computing"],"published-print":{"date-parts":[[2018,1]]},"abstract":"<jats:p>Physical layer security (PLS) has been shown to hold promise as a new paradigm for securing wireless links. In contrast with the conventional cryptographic techniques, PLS methods exploit the random fading in wireless channels to provide link security. As the channel dynamics prevent a constant rate of secure communications between the legitimate terminals, the outage probability of the achievable secrecy rate is used as a measure of the secrecy performance. This work investigates the secrecy outage probability of a simultaneous wireless information and power transfer (SWIPT) system, which operates in the presence of multiple eavesdroppers that also have the energy harvesting capability. The loss in secrecy performance due to eavesdropper collusion, i.e., information sharing between the eavesdroppers to decode the secret message, is also analyzed. We derive closed\u2010form expressions for the secrecy outage probability for Nakagami\u2010<jats:italic>m<\/jats:italic> fading on the links and imperfect channel estimation at the receivers. Our analysis considers different combinations of the separated and the integrated SWIPT receiver architectures at the receivers. Numerical results are provided to validate our analysis.<\/jats:p>","DOI":"10.1155\/2018\/8747420","type":"journal-article","created":{"date-parts":[[2018,6,7]],"date-time":"2018-06-07T23:36:06Z","timestamp":1528414566000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["On the Secrecy Performance of SWIPT Receiver Architectures with Multiple Eavesdroppers"],"prefix":"10.1155","volume":"2018","author":[{"given":"Furqan","family":"Jameel","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9532-2288","authenticated-orcid":false,"given":"Shurjeel","family":"Wyne","sequence":"additional","affiliation":[]},{"given":"Syed","family":"Junaid Nawaz","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2097-3443","authenticated-orcid":false,"given":"Junaid","family":"Ahmed","sequence":"additional","affiliation":[]},{"given":"Kanapathippillai","family":"Cumanan","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2018,6,7]]},"reference":[{"key":"e_1_2_8_1_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6957150"},{"key":"e_1_2_8_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2013.2281026"},{"key":"e_1_2_8_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/tcomm.2013.13.120855"},{"key":"e_1_2_8_4_2","doi-asserted-by":"crossref","unstructured":"VarshneyL. R. Transporting information and energy simultaneously Proceedings of the IEEE International Symposium on Information Theory (ISIT \u203208) July 2008 Toronto Canada IEEE 1612\u20131616 https:\/\/doi.org\/10.1109\/isit.2008.4595260 2-s2.0-52349088816.","DOI":"10.1109\/ISIT.2008.4595260"},{"key":"e_1_2_8_5_2","doi-asserted-by":"crossref","unstructured":"GroverP.andSahaiA. Shannon meets tesla: wireless information and power transfer Proceedings of the IEEE International Symposium on Information Theory (ISIT \u203210) June 2010 Austin Tex USA 2363\u20132367 https:\/\/doi.org\/10.1109\/isit.2010.5513714 2-s2.0-77955669496.","DOI":"10.1109\/ISIT.2010.5513714"},{"key":"e_1_2_8_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2012.113012.120500"},{"key":"e_1_2_8_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/wcl.2012.053112.120212"},{"key":"e_1_2_8_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/twc.2013.122313.130727"},{"key":"e_1_2_8_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2013.072613.130323"},{"key":"e_1_2_8_10_2","doi-asserted-by":"crossref","unstructured":"De MeulenaerG. GossetF. StandaertF. andPereiraO. On the energy cost of communication and cryptography in wireless sensor networks Proceedings of the 4th IEEE International Conference on Wireless and Mobile Computing Networking and Communication (WiMob \u203208) October 2008 Avignon France 580\u2013585 https:\/\/doi.org\/10.1109\/WiMob.2008.16 2-s2.0-56749174919.","DOI":"10.1109\/WiMob.2008.16"},{"key":"e_1_2_8_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2636239"},{"key":"e_1_2_8_12_2","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.2681"},{"key":"e_1_2_8_13_2","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/9580639"},{"key":"e_1_2_8_14_2","doi-asserted-by":"crossref","unstructured":"HeX.andYenerA. Secure degrees of freedom for Gaussian channels with interference: Structured codes outperform gaussian signaling Proceedings of the 2009 IEEE Global Telecommunications Conference GLOBECOM 2009 December 2009 usa 2-s2.0-77951565555.","DOI":"10.1109\/GLOCOM.2009.5425429"},{"key":"e_1_2_8_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2013.111213.130235"},{"key":"e_1_2_8_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2013.6523805"},{"key":"e_1_2_8_17_2","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2011.0638"},{"key":"e_1_2_8_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2016.2600518"},{"key":"e_1_2_8_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2165946"},{"key":"e_1_2_8_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2111370"},{"key":"e_1_2_8_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2012.2184692"},{"key":"e_1_2_8_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2011.2178067"},{"key":"e_1_2_8_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2010.2092774"},{"key":"e_1_2_8_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2657629"},{"key":"e_1_2_8_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2248730"},{"key":"e_1_2_8_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2012.2227313"},{"key":"e_1_2_8_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2017.2691159"},{"key":"e_1_2_8_28_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.aeue.2017.04.017"},{"key":"e_1_2_8_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2015.2449315"},{"key":"e_1_2_8_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2016.2516528"},{"key":"e_1_2_8_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2013.2288318"},{"key":"e_1_2_8_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2016.7462485"},{"key":"e_1_2_8_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2017.2691347"},{"key":"e_1_2_8_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2016.2607705"},{"key":"e_1_2_8_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2010.2040667"},{"key":"e_1_2_8_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.872984"},{"key":"e_1_2_8_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2003.815071"},{"key":"e_1_2_8_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/twc.2014.2378261"},{"key":"e_1_2_8_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2017.2772244"},{"key":"e_1_2_8_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2686984"},{"volume-title":"Table of integrals, series, and products","year":"2014","author":"Gradshteyn I. S.","key":"e_1_2_8_41_2"},{"key":"e_1_2_8_42_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2027522"},{"key":"e_1_2_8_43_2","doi-asserted-by":"publisher","DOI":"10.1109\/26.403769"}],"container-title":["Wireless Communications and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2018\/8747420.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2018\/8747420.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2018\/8747420","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T07:33:08Z","timestamp":1723015988000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2018\/8747420"}},"subtitle":[],"editor":[{"given":"Gonzalo","family":"Vazquez-Vilar","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2018,1]]},"references-count":43,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,1]]}},"alternative-id":["10.1155\/2018\/8747420"],"URL":"https:\/\/doi.org\/10.1155\/2018\/8747420","archive":["Portico"],"relation":{},"ISSN":["1530-8669","1530-8677"],"issn-type":[{"type":"print","value":"1530-8669"},{"type":"electronic","value":"1530-8677"}],"subject":[],"published":{"date-parts":[[2018,1]]},"assertion":[{"value":"2017-12-04","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-05-02","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-06-07","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"8747420"}}