{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T02:48:55Z","timestamp":1760237335115,"version":"build-2065373602"},"reference-count":22,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2020,3,30]],"date-time":"2020-03-30T00:00:00Z","timestamp":1585526400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","doi-asserted-by":"publisher","award":["PTDC\/EEI-TEL\/30588\/2017","UIDB\/EEA\/50008\/2020"],"award-info":[{"award-number":["PTDC\/EEI-TEL\/30588\/2017","UIDB\/EEA\/50008\/2020"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Copelabs","award":["UIDB\/04111\/2020"],"award-info":[{"award-number":["UIDB\/04111\/2020"]}]},{"name":"\u0420\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0439 \u0424\u043e\u043d\u0434 \u0424\u0443\u043d\u0434\u0430\u043c\u0435\u043d\u0442\u0430\u043b\u044c\u043d\u044b\u0445 \u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u0439 (\u0420\u0424\u0424\u0418)","award":["No 19-37-50083\\19"],"award-info":[{"award-number":["No 19-37-50083\\19"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Electronics"],"abstract":"<jats:p>This article is focused on implementing simultaneous wireless information and power transmission as a physical layer security measure by using artificial noise. A series of high energy precoded symbols is simultaneously transmitted along with the information symbols over a Rayleigh frequency selective fading channel. The high energy precoded symbols act as an artificial noise for the eavesdroppers. The energy symbols are precoded on the basis of a legitimate user\u2019s channel matrix to form a null space vector, which eliminates the interference of energy symbols at the information symbol receiver antennas, while allowing the rectenna to harvest energy from the superimposed information and energy symbols. We analyze the secrecy rate and error rate performance at the receiver under different circumstances, and we show that the performance of the legitimate user can be improved by using the iterative block decision feedback equalization method at the receiver.<\/jats:p>","DOI":"10.3390\/electronics9040587","type":"journal-article","created":{"date-parts":[[2020,3,31]],"date-time":"2020-03-31T13:27:19Z","timestamp":1585661239000},"page":"587","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Secure Information Transmission with Self Jamming SWIPT"],"prefix":"10.3390","volume":"9","author":[{"given":"Akashkumar","family":"Rajaram","sequence":"first","affiliation":[{"name":"Faculty of Science and Technology, New University of Lisbon, 2829-516 Caparica, Portugal"},{"name":"School of Computer Science and Robotics, National Research Tomsk Polytechnic University, 634050 Tomsk, Russia"},{"name":"COPELABS, Universidade Lus\u00f2fona de Humanidades e Tecnologias, 1749-024 Lisboa, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8520-7267","authenticated-orcid":false,"given":"Rui","family":"Dinis","sequence":"additional","affiliation":[{"name":"Faculty of Science and Technology, New University of Lisbon, 2829-516 Caparica, Portugal"},{"name":"COPELABS, Universidade Lus\u00f2fona de Humanidades e Tecnologias, 1749-024 Lisboa, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7004-2930","authenticated-orcid":false,"given":"Dushnatha Nalin K.","family":"Jayakody","sequence":"additional","affiliation":[{"name":"School of Computer Science and Robotics, National Research Tomsk Polytechnic University, 634050 Tomsk, Russia"},{"name":"School of Engineering, Sri Lanka Technological Campus, 10500 Padukka City, Sri Lanka"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7315-8739","authenticated-orcid":false,"given":"Marko","family":"Beko","sequence":"additional","affiliation":[{"name":"COPELABS, Universidade Lus\u00f2fona de Humanidades e Tecnologias, 1749-024 Lisboa, Portugal"},{"name":"UNINOVA, Monte da Caparica, 2829-516 Caparica, Portugal"}]}],"member":"1968","published-online":{"date-parts":[[2020,3,30]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Jayakody, D.N.K., Thompson, J., Chatzinotas, S., and Durrani, S. (2017). Wireless Information and Power Transfer: A New Green Communications Paradigm, Springer.","DOI":"10.1007\/978-3-319-56669-6"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"264","DOI":"10.1109\/COMST.2017.2783901","article-title":"Simultaneous wireless information and power transfer (swipt): Recent advances and future challenges","volume":"20","author":"Perera","year":"2018","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Rajaram, A., Khan, R., Tharranetharan, S., Jayakody, D., Dinis, R., and Panic, S. (2019). Novel SWIPT Schemes for 5G Wireless Networks. Sensors, 19.","DOI":"10.3390\/s19051169"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"9678","DOI":"10.1109\/ACCESS.2018.2886297","article-title":"Receiver Design to Employ Simultaneous Wireless Information and Power Transmission with Joint CFO and Channel Estimation","volume":"7","author":"Rajaram","year":"2019","journal-title":"IEEE Access"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Tang, X., Cai, Y., Yang, W., Yang, W., Chen, D., and Hu, J. (2018). Secure transmission of cooperative zero-forcing jamming for two-user SWIPT sensor networks. Sensors, 18.","DOI":"10.3390\/s18020331"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1109\/COMST.2019.2933899","article-title":"A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements and Future Directions","volume":"22","author":"Khan","year":"2019","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Ng, D.W.K., Xiang, L., and Schober, R. (2013, January 8\u201311). Multi-objective beamforming for secure communication in systems with wireless information and power transfer. Proceedings of the 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), London, UK.","DOI":"10.1109\/PIMRC.2013.6666095"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","article-title":"The wire-tap channel","volume":"54","author":"Wyner","year":"1975","journal-title":"Bell Syst. Tech. J."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"451","DOI":"10.1109\/TIT.1978.1055917","article-title":"The Gaussian wire-tap channel","volume":"24","author":"Hellman","year":"1978","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"4961","DOI":"10.1109\/TIT.2011.2158487","article-title":"The Secrecy Capacity of the MIMO Wiretap Channel","volume":"57","author":"Oggier","year":"2011","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"2180","DOI":"10.1109\/TWC.2008.060848","article-title":"Guaranteeing Secrecy using Artificial Noise","volume":"7","author":"Goel","year":"2008","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/ACCESS.2018.2845839","article-title":"Exploiting the Reciprocal Channel for Discrete Jamming to Secure Wireless Communications Against Multiple-Antenna Eavesdropper","volume":"6","author":"Anjos","year":"2018","journal-title":"IEEE Access"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Anjos, G., Castanheira, D., Silva, A., and Gameiro, A. (2017, January 29\u201331). Exploiting Reciprocal Channel Estimations for Jamming to Secure Wireless Communications. Proceedings of the 2017 International Wireless Days Conference, Porto, Portugal.","DOI":"10.1109\/WD.2017.7918129"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"3603","DOI":"10.1109\/ACCESS.2016.2636239","article-title":"Physical Layer Security Jamming: Theoretical Limits and Practical Designs in Wireless Networks","volume":"5","author":"Cumanan","year":"2017","journal-title":"IEEE Access"},{"key":"ref_15","unstructured":"He, B., Zhou, X., and Abhayapala, T.D. (2013). Wireless physical layer security with imperfect channel state information: A survey. arXiv."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Chou, T., Draper, S.C., and Sayeed, A.M. (2010, January 13\u201318). Impact of channel sparsity and correlated eavesdropping on secret key generation from multipath channel randomness. Proceedings of the 2010 IEEE International Symposium on Information Theory, Austin, TX, USA.","DOI":"10.1109\/ISIT.2010.5513556"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"961","DOI":"10.1109\/LCOMM.2017.2649496","article-title":"On the Key Generation From Correlated Wireless Channels","volume":"21","author":"Zhang","year":"2017","journal-title":"IEEE Commun. Lett."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"1144","DOI":"10.1049\/el:20020767","article-title":"Block iterative DFE for single carrier modulation","volume":"38","author":"Benvenuto","year":"2002","journal-title":"Electron. Lett."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/1687-1499-2013-292","article-title":"Performance Evaluation of IB-DFE based Strategies for SC-FDMA Systems","volume":"2013","author":"Silva","year":"2013","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"2500","DOI":"10.1109\/TCOMM.2015.2434383","article-title":"Efficient Transmitter and Receiver Designs for SC-FDMA Based Heterogeneous Networks","volume":"63","author":"Castanheira","year":"2015","journal-title":"IEEE Trans. Commun."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"1240","DOI":"10.1109\/TCOMM.2014.022514.130681","article-title":"Iterative Frequency-Domain Detection for IA-Precoded MC-CDMA Systems","volume":"62","author":"Silva","year":"2014","journal-title":"IEEE Trans. Commun."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Dinis, R., Lam, C.T., and Falconer, D. (April, January 31). Joint frequency-domain equalization and channel estimation using superimposed pilots. Proceedings of the 2008 Wireless Communications and Networking Conference, Las Vegas, NV, USA.","DOI":"10.1109\/WCNC.2008.84"}],"container-title":["Electronics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2079-9292\/9\/4\/587\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T09:13:34Z","timestamp":1760174014000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2079-9292\/9\/4\/587"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,30]]},"references-count":22,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2020,4]]}},"alternative-id":["electronics9040587"],"URL":"https:\/\/doi.org\/10.3390\/electronics9040587","relation":{},"ISSN":["2079-9292"],"issn-type":[{"type":"electronic","value":"2079-9292"}],"subject":[],"published":{"date-parts":[[2020,3,30]]}}}