Secrecy analysis in Simultaneous Wireless Information and Power Transfer (SWIPT) Systems over generalized k-fading channels

Authors

  • Ms. B Jyothsna Associate Professor, Department Of ECE, Bhoj Reddy Engineering College For Women, India. Author
  • Sk. Sama Nehak B. Tech Students, Department Of ECE, Bhoj Reddy Engineering College For Women, India. Author
  • D. Swathi B. Tech Students, Department Of ECE, Bhoj Reddy Engineering College For Women, India. Author
  • V.V. Praveena Kirani B. Tech Students, Department Of ECE, Bhoj Reddy Engineering College For Women, India. Author

Abstract

This project investigates the secrecy performance of 
Simultaneous Wireless Information and Power 
Transfer (SWIPT) systems over generalized-K fading 
channels, which model both small-scale and large
scale fading effects critical to real-world wireless 
environments. Ensuring data confidentiality in 
SWIPT systems is increasingly essential due to the 
risk of eavesdropping during concurrent power and 
information transfer. The analysation of the secrecy 
outage probability (SOP) and effective secrecy 
throughput (EST) under various channel conditions, 
providing closed-form expressions for SOP and 
examining its behaviour in both typical and 
asymptotic signal-to-noise ratio (SNR) regions. 
Additionally, it derives diversity orders for high-SNR 
regimes, offering a clearer understanding of SOP as 
influenced by factors like channel quality, fading 
severity, and eavesdropper capabilities. To further 
assess secrecy, examination of time-switching 
protocols within SWIPT, highlighting trade-offs in 
power and information flow is done. Numerical 
simulations confirm the accuracy of our analytical 
models, demonstrating that system security in SWIPT 
can be optimized through strategic parameter 
tuning. 
Effective secrecy throughput is also investigated to 
capture 
the 
amount of secure transmitted 
information. To derive the diversity order, the 
asymptotic SOP is also analysed when the average 
signal-to-noise ratio is large sufficiently. Finally,

numerical results are used to validate the 
correctness of our derived expressions

Downloads

Download data is not yet available.

References

[1] V.-D. Phan, H. H. Nguyen, and M. L. D. Tran, "A

Study of Physical Layer Security in SWIPT-Based

Decode-and-Forward Relay Networks with Dynamic

Power Splitting," MDPI Sensors, vol. 21, no. 17, pp.

5692, 2021.

[2] Z. Liu, F. R. Yu, Y. Zhang, and J. Lu, "Artificial

Intelligence Empowered Physical Layer Security for

6G:

State-of-the-Art,

Challenges,

and

Opportunities," IEEE Access, vol. 9, pp. 129999

130016, 2021.

[3] M. A. Alhussein, M. R. A. Khandaker, and H.

Tabassum, "Inspiring Physical Layer Security With

RIS," IEEE Trans. Wireless Commun., vol. 20, no. 6,

pp. 3775-3787, 2021.

[4] N. H. M. H. M. Ismail and M. A. A. Aziz, "A

Cross-Layer

Secure

and

Energy-Efficient

Framework for the Internet of Things," IEEE Access,

vol. 9, pp. 5412-5425, 2021.

[5] M. S. Ali, M. A. Imran, and N. Rajatheva, "Deep

Learning Aided Intelligent Reflective Surfaces for

6G: A Survey," ACM Computing Surveys, vol. 56,

no. 6, pp. 1-27, 2023.

[6] M. A. S. Al-Kadi, M. H. M. Ismail, and R. M. H.

Khan, "Reconfigurable Intelligent Surface for

Physical Layer Security in 6G-IoT: Designs, Issues,

and Advances," arXiv preprint, arXiv:2311.08112,

2023.

[7] S. Liu, Z. Zhang, and H. Zhang, "Secure

Simultaneous Information and Power Transfer for

Downlink Multi-user Massive MIMO," arXiv

preprint, arXiv:2008.04352, 2020.

[8] R. S. B. P. A. Jayaraman, "Security-Reliability

Trade-Off Analysis for SWIPT- and AF-Based IoT

Networks with Friendly Jammers," arXiv preprint,

arXiv:2206.04428, 2022

Downloads

Published

2025-06-20

Issue

Section

Articles

How to Cite

Secrecy analysis in Simultaneous Wireless Information and Power Transfer (SWIPT) Systems over generalized k-fading channels . (2025). International Journal of Multidisciplinary Engineering In Current Research, 10(6), 395-403. https://ijmec.com/index.php/multidisciplinary/article/view/833