Performance analysis of delay-constrained wireless energy harvesting communication networks under jamming attacks

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

6 Scopus citations

Abstract

In wireless energy harvesting communication networks, a user receives wireless energy released by an ambient or dedicated energy source, and uses that energy for delay constrained data transmission. However, such data transmission can be susceptible to a jamming attack from a nearby attacker also harvesting from the wireless energy source. In this paper, we consider such a scenario and present performance analysis. In particular, we develop an analytical model for the network based on a Markov chain to obtain various performance measures for the user including throughput and delay distribution. The performance evaluation shows some interesting results. For example, under the jamming attack, there is a maximum achievable throughput of the user. We also validate the analytical model using simulation.

Original languageEnglish
Title of host publication2015 IEEE Wireless Communications and Networking Conference, WCNC 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1823-1828
Number of pages6
ISBN (Electronic)9781479984060
DOIs
StatePublished - 17 Jun 2015
Event2015 IEEE Wireless Communications and Networking Conference, WCNC 2015 - New Orleans, United States
Duration: 9 Mar 201512 Mar 2015

Publication series

Name2015 IEEE Wireless Communications and Networking Conference, WCNC 2015

Conference

Conference2015 IEEE Wireless Communications and Networking Conference, WCNC 2015
Country/TerritoryUnited States
CityNew Orleans
Period9/03/1512/03/15

Keywords

  • delay-constrained
  • jamming attack
  • Wireless harvesting communication networks

Fingerprint

Dive into the research topics of 'Performance analysis of delay-constrained wireless energy harvesting communication networks under jamming attacks'. Together they form a unique fingerprint.

Cite this