{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T04:08:16Z","timestamp":1760242096131,"version":"build-2065373602"},"reference-count":55,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2018,12,26]],"date-time":"2018-12-26T00:00:00Z","timestamp":1545782400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No. 61771487, 61471393, and 61371122"],"award-info":[{"award-number":["No. 61771487, 61471393, and 61371122"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>This paper investigates secure communications of energy harvesting untrusted relay networks, where the destination assists jamming signal to prevent the untrusted relay from eavesdropping and to improve the forwarding ability of the energy constrained relay. Firstly, the source and the destination transmit the signals to the relay with maximal ratio transmission (MRT) technique or transmit antenna selection (TAS) technique. Then, the destination utilizes maximal ratio combining (MRC) technique or receive antenna selection (RAS) technique to receive the forwarded information. Therefore, four transmission and reception schemes are considered. For each scheme, the closed-form expressions of the secrecy outage probability (SOP) and the connection outage probability (COP) are derived. Besides, the effective secrecy throughput (EST) metric is analyzed to achieve a good tradeoff between security and reliability. In addition, the asymptotic performance of EST is also considered at the high signal-to-noise ratio (SNR). Finally, simulation results illustrate that: (1) the EST of the system with MRT and MRC scheme are superior to other schemes, however, in the high SNR regime, the EST of the system with MRT scheme is inferior to TAS; and (2) for the source node, there exists an optimal number of antennas to maximize the EST of the proposed schemes.<\/jats:p>","DOI":"10.3390\/s19010076","type":"journal-article","created":{"date-parts":[[2018,12,26]],"date-time":"2018-12-26T11:31:21Z","timestamp":1545823881000},"page":"76","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Secure Transmission for Simultaneous Wireless Information and Power Transfer in AF Untrusted Relay Networks"],"prefix":"10.3390","volume":"19","author":[{"given":"Hui","family":"Shi","sequence":"first","affiliation":[{"name":"Army Engineering University of PLA, No. 88 Houbiaoying, Qinhuai District, Nanjing 210007, China"}]},{"given":"Weiwei","family":"Yang","sequence":"additional","affiliation":[{"name":"Army Engineering University of PLA, No. 88 Houbiaoying, Qinhuai District, Nanjing 210007, China"}]},{"given":"Dechuan","family":"Chen","sequence":"additional","affiliation":[{"name":"Wuhan Zhong Yuan Electronics Group Company Ltd., Wuhan 430205, China"}]},{"given":"Yunpeng","family":"Luo","sequence":"additional","affiliation":[{"name":"Army Engineering University of PLA, No. 88 Houbiaoying, Qinhuai District, Nanjing 210007, China"}]},{"given":"Yueming","family":"Cai","sequence":"additional","affiliation":[{"name":"Army Engineering University of PLA, No. 88 Houbiaoying, Qinhuai District, Nanjing 210007, China"}]}],"member":"1968","published-online":{"date-parts":[[2018,12,26]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","article-title":"The wire-tap channel","volume":"53","author":"Wyner","year":"1975","journal-title":"Bell Syst. Tech. J."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/MCOM.2015.7081071","article-title":"Safeguarding 5G wireless communication networks using physical layer security","volume":"53","author":"Yang","year":"2015","journal-title":"IEEE Commun. Mag."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"2547","DOI":"10.1109\/TIT.2008.2011448","article-title":"A Note on the Secrecy Capacity of the Multi-antenna Wiretap Channel","volume":"55","author":"Liu","year":"2009","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"1126","DOI":"10.1109\/TWC.2003.819030","article-title":"End-to-end performance of transmission systems with relays over Rayleigh-fading channels","volume":"2","author":"Hasna","year":"2003","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"1416","DOI":"10.1109\/TWC.2004.833431","article-title":"Exact Symbol Error Probability of a Cooperative Network in a Rayleigh-Fading Environment","volume":"3","author":"Anghel","year":"2004","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Shim, K., Do, N., and An, B. (2017). Performance Analysis of Physical Layer Security of Opportunistic Scheduling in Multiuser Multirelay Cooperative Networks. Sensors, 17.","DOI":"10.3390\/s17020377"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Liau, Q.Y., Leow, C.Y., and Ding, Z. (2016). Physical Layer Security Using Two-Path Successive Relaying. Sensors, 16.","DOI":"10.3390\/s16060846"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1049\/iet-com.2015.0078","article-title":"Destination-based cooperative jamming in untrusted amplify-and-forward relay networks: Resource allocation and performance study","volume":"10","author":"Kuhestani","year":"2016","journal-title":"IET Commun."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Kuhestani, A., Yeoh, P.L., and Mohammadi, A. (2017, January 4\u20138). Optimal Power Allocation and Secrecy Sum Rate in Two-Way Untrusted Relaying. Proceedings of the 2017 IEEE Global Communications Conference GLOBECOM, Singapore.","DOI":"10.1109\/GLOCOM.2017.8254424"},{"key":"ref_10","first-page":"341","article-title":"Joint Relay Selection and Power Allocation in Large-Scale MIMO Systems with Untrusted Relays and Passive Eavesdroppers","volume":"13","author":"Kuhestani","year":"2018","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Mekkawy, T., Yao, R., Xu, F., and Wang, L. (2017, January 7\u20138). Optimal power allocation for achievable secrecy rate in an untrusted relay network with bounded channel estimation error. Proceedings of the 26th Wireless and Optical Communication Conference (WOCC), Newark, NJ, USA.","DOI":"10.1109\/WOCC.2017.7929010"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"962","DOI":"10.1049\/iet-com.2015.0876","article-title":"Optimal power allocation to improve secrecy performance of non-regenerative cooperative systems using an untrusted relay","volume":"10","author":"Kuhestani","year":"2016","journal-title":"IET Commun."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1109\/TVT.2009.2029980","article-title":"Performance Analysis of TDMA Relay Protocols Over Nakagami-m Fading","volume":"59","author":"Atapattu","year":"2010","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"764","DOI":"10.1109\/TCOMM.2010.03.080156","article-title":"Dual-hop systems with noisy relay and interference-limited destination","volume":"58","author":"Zhong","year":"2010","journal-title":"IEEE Trans. Commun."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"2199","DOI":"10.1109\/TVT.2016.2572960","article-title":"Secure Communication via a Wireless Energy Harvesting Untrusted Relay","volume":"66","author":"Kalamkar","year":"2017","journal-title":"IEEE Trans. Vech. Technol."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"2536","DOI":"10.1109\/TSP.2013.2247600","article-title":"Secure Communication Via an Untrusted Non-Regenerative Relay in Fading Channels","volume":"61","author":"Huang","year":"2013","journal-title":"IEEE Trans. Signal Process."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Liu, Y., Li, L., Alexandropoulos, G.C., and Pesavento, M. (2017). Securing Relay Networks with Artificial Noise: An Error Performance-Based Approach. Entropy, 19.","DOI":"10.3390\/e19080384"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"885","DOI":"10.1109\/LCOMM.2010.081910.101121","article-title":"Cooperative Secret Communication with Artificial Noise in Symmetric Interference Channel","volume":"14","author":"Zhu","year":"2010","journal-title":"IEEE Commun. Lett."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Hu, H., Gao, Z., Liao, X., and Leung, V.C.M. (2017). Secure Communications in CIoT Networks with a Wireless Energy Harvesting Untrusted Relay. Sensors, 17.","DOI":"10.3390\/s17092023"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Chen, S., Wang, W., and Zhang, X. (2009, January 5\u20138). Capacity Performance of Amplify-and-Forward MIMO Relay with Transmit Antenna Selection and Maximal-Ratio Combining. Proceedings of the IEEE Wireless Communications and Networking Conference (WCN), Budapest, Hungary.","DOI":"10.1109\/WCNC.2009.4917898"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"310","DOI":"10.1109\/TSP.2011.2172433","article-title":"Joint Secure Beamforming Design at the Source and the Relay for an Amplify-and-Forward MIMO Untrusted Relay System","volume":"60","author":"Jeong","year":"2012","journal-title":"IEEE Trans. Signal Process."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Chen, X., Chen, J., and Liu, T. (2014, January 8\u201312). Secure wireless information and power transfer in large-scale MIMO relaying systems with imperfect CSI. Proceedings of the IEEE Global Communications Conference (GLOBECOM), Austin, TX, USA.","DOI":"10.1109\/GLOCOM.2014.7037455"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"7274","DOI":"10.1109\/TVT.2015.2490099","article-title":"Destination Aided Cooperative Jamming for Dual-Hop Amplify-and-Forward MIMO Untrusted Relay Systems","volume":"65","author":"Xiong","year":"2016","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"2628","DOI":"10.1109\/TIFS.2018.2825944","article-title":"Artificial Noise Aided Secure Precoding for MIMO Untrusted Two-Way Relay Systems with Perfect and Imperfect Channel State Information","volume":"13","author":"Li","year":"2018","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"578","DOI":"10.1109\/ACCESS.2016.2646387","article-title":"Precoding Design of MIMO Amplify-and-Forward Communication System with an Energy Harvesting Relay and Possibly Imperfect CSI","volume":"5","author":"Benkhelifa","year":"2017","journal-title":"IEEE Access"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"7888","DOI":"10.1109\/TVT.2017.2681942","article-title":"Energy Efficiency Maximization Precoding Design for SWIPT in MIMO Two-Way Relay Networks","volume":"66","author":"Rostampoor","year":"2017","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Seah, W.K.G., Zhi, A.E., and Tan, H. (2009, January 17\u201320). Wireless sensor networks powered by ambient energy harvesting (WSN-HEAP)\u2014Survey and challenges. Proceedings of 2009 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology, Aalborg, Denmark.","DOI":"10.1109\/WIRELESSVITAE.2009.5172411"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1109\/MPRV.2005.9","article-title":"Energy Scavenging for Mobile and Wireless Electronics","volume":"4","author":"Paradiso","year":"2005","journal-title":"IEEE Pervasive Comput."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"1410","DOI":"10.1109\/JPROC.2013.2250891","article-title":"RF Energy Harvesting and Transport for Wireless Sensor Network Applications: Principles and Requirements","volume":"101","author":"Visser","year":"2013","journal-title":"Proc. IEEE"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"757","DOI":"10.1109\/COMST.2014.2368999","article-title":"Wireless Networks with RF Energy Harvesting: A Contemporary Survey","volume":"17","author":"Lu","year":"2015","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"3622","DOI":"10.1109\/TWC.2013.062413.122042","article-title":"Relaying Protocols for Wireless Energy Harvesting and Information Processing","volume":"12","author":"Nasir","year":"2013","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Kalamkar, S.S., and Banerjee, A. (2015, January 6\u201310). Interference-Assisted Wireless Energy Harvesting in Cognitive Relay Network with Multiple Primary Transceivers. Proceedings of 2015 IEEE Global Communications Conference (GLOBECOM), San Diego, CA, USA.","DOI":"10.1109\/GLOCOM.2015.7417417"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"410","DOI":"10.1109\/TWC.2014.2349892","article-title":"Distributed Power Splitting for SWIPT in Relay Interference Channels Using Game Theory","volume":"14","author":"Chen","year":"2014","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"1607","DOI":"10.1109\/TCOMM.2015.2415480","article-title":"Wireless-Powered Relays in Cooperative Communications: Time-Switching Relaying Protocols and Throughput Analysis","volume":"63","author":"Nasir","year":"2015","journal-title":"IEEE Trans. Commun."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"3828","DOI":"10.1109\/TVT.2015.2443875","article-title":"Outage Performance of Cognitive Relay Networks With Wireless Information and Power Transfer","volume":"65","author":"Yang","year":"2016","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"1989","DOI":"10.1109\/TWC.2013.031813.120224","article-title":"MIMO Broadcasting for Simultaneous Wireless Information and Power Transfer","volume":"12","author":"Zhang","year":"2013","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"4754","DOI":"10.1109\/TCOMM.2013.13.120855","article-title":"Wireless Information and Power Transfer: Architecture Design and Rate-Energy Tradeoff","volume":"61","author":"Zhou","year":"2013","journal-title":"IEEE Trans. Commun."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Tran, D.D., Tran, H.V., and Ha, D.B. (2016, January 18\u201321). Performance Analysis of Two-Way Relaying System with RF-EH and Multiple Antennas. Proceedings of the IEEE 84th Vehicular Technology Conference (VTC-Fall), Montreal, QC, Canada.","DOI":"10.1109\/VTCFall.2016.7881156"},{"key":"ref_39","first-page":"2015","article-title":"Throughput Maximization for Hybrid Backscatter Assisted Cognitive Wireless Powered Radio Networks","volume":"5","author":"Bin","year":"2018","journal-title":"IEEE IoT."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"6259","DOI":"10.1109\/TVT.2015.2478029","article-title":"Joint Relay and Jammer Selection Improves the Physical Layer Security in the Face of CSI Feedback Delays","volume":"65","author":"Wang","year":"2016","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1109\/LCOMM.2017.2760255","article-title":"Secrecy Outage Analysis over Correlated Composite Nakagami-m\/Gamma Fading Channels","volume":"22","author":"Alexandropoulos","year":"2018","journal-title":"IEEE Commun. Lett."},{"key":"ref_42","first-page":"1","article-title":"Secure Energy Harvesting Communications with Relay Selection over Nakagami-m Fading Channels","volume":"23","author":"Cheng","year":"2017","journal-title":"Mob. Netw. Appl."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"774","DOI":"10.1109\/TGCN.2018.2835409","article-title":"Transmit Precoding and Receive Power Splitting for Harvested Power Maximization in MIMO SWIPT Systems","volume":"2","author":"Mishra","year":"2018","journal-title":"IEEE Trans. Green Commun. Netw."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"214","DOI":"10.1109\/LWC.2017.2765320","article-title":"Jointly Optimal Spatial Channel Assignment and Power Allocation for MIMO SWIPT Systems","volume":"7","author":"Mishra","year":"2017","journal-title":"IEEE Wirel. Commun. Lett."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"7495","DOI":"10.1109\/TVT.2017.2657629","article-title":"Secure Communications with Cooperative Jamming Optimal Power Allocation and Secrecy Outage Analysis","volume":"6","author":"Cumanan","year":"2017","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"12074","DOI":"10.1109\/ACCESS.2018.2794507","article-title":"Secure Energy Harvesting Relay Networks with Unreliable Backhaul Connections","volume":"6","author":"Cheng","year":"2018","journal-title":"IEEE Access"},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"5039","DOI":"10.1109\/TCOMM.2015.2494012","article-title":"Cooperative Beamforming and User Selection for Improving the Security of Relay-Aided Systems","volume":"63","author":"Hoang","year":"2015","journal-title":"IEEE Trans. Commun."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1109\/TCOMM.2017.2756884","article-title":"Full-Duplex Secure Communications in Cellular Networks With Downlink Wireless Power Transfer","volume":"66","author":"Chen","year":"2018","journal-title":"IEEE Trans. Commun."},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"3691","DOI":"10.1109\/TCOMM.2017.2708110","article-title":"Joint Transceiver Design for Secure Downlink Communications Over an Amplify and Forward MIMO Relay","volume":"65","author":"Cai","year":"2017","journal-title":"IEEE Trans. Commun."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"8009","DOI":"10.1109\/TWC.2016.2610965","article-title":"Secure Multiuser Scheduling in Downlink Dual-Hop Regenerative Relay Networks Over Nakagami-m Fading Channels","volume":"15","author":"Yang","year":"2016","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"443","DOI":"10.1109\/TSP.2013.2292031","article-title":"Energy Efficiency Optimization in Relay-Assisted MIMO Systems with Perfect and Statistical CSI","volume":"62","author":"Alessio","year":"2014","journal-title":"IEEE Trans. Signal Process."},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"2758","DOI":"10.1109\/TCOMM.2014.2342230","article-title":"An Optimal Full-Duplex AF Relay for Joint Analog and Digital Domain Self-Interference Cancellation","volume":"62","author":"Kang","year":"2014","journal-title":"IEEE Trans. Commun."},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"7055","DOI":"10.1109\/ACCESS.2017.2762738","article-title":"Physical Layer Security in Cognitive Untrusted Relay Networks","volume":"6","author":"Chen","year":"2017","journal-title":"IEEE Access"},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"2562","DOI":"10.1109\/TWC.2015.2504581","article-title":"Cognitive Relay Networks with Energy Harvesting and Information Transfer: Design, Analysis, and Optimization","volume":"15","author":"Wang","year":"2016","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_55","unstructured":"Gradshteyn, I.S., and Ryzhik, I.M. (2007). Table of Integrals, Series, and Products, Elsevier\/Academic Press. [7th ed.]."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/19\/1\/76\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T15:36:08Z","timestamp":1760196968000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/19\/1\/76"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,26]]},"references-count":55,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2019,1]]}},"alternative-id":["s19010076"],"URL":"https:\/\/doi.org\/10.3390\/s19010076","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2018,12,26]]}}}