Physical layer security of energy harvesting machine-to-machine communication system

Furqan Jameel, Muhammad Awais Javed, Dushantha Nalin K. Jayakody

Research output: Chapter in Book/Report/Conference proceedingChapter

3 Citations (Scopus)


Machine-to-machine (M2M) communication is emerging as a new paradigm to realize the concept of smart cities. In this chapter, we provide a comprehensive introduction to M2M communications, discuss its applications, and highlight its critical challenges. The chapter also provides a discussion of the energy harvesting techniques and their importance in modern wireless communication systems. Here, we mainly focus on RF energy harvesting due to its dual use in energy harvesting and information transfer. Next, a detailed discussion on recent trends of physical layer security (PLS) is presented. Using this basic knowledge of PLS and RF energy harvesting, we analyze the secrecy performance of an M2M communication system under the imperfect knowledge of wireless channel state. Later, the chapter provides a comparison of two jamming techniques, namely, full duplex (FD) jamming and dedicated jamming. It is shown that the dedicated jamming performs better than the FD jamming at the cost of introducing an additional node with additional power requirements. The results also show that by increasing the energy harvesting duration of devices, the FD destination-assisted jamming can also perform very close to dedicated jamming.

Original languageEnglish
Title of host publication5G Enabled Secure Wireless Networks
PublisherSpringer International Publishing
Number of pages31
ISBN (Electronic)9783030035082
ISBN (Print)9783030035075
Publication statusPublished - 1 Jan 2019


  • Energy harvesting
  • Full duplex
  • Machine-to-machine
  • Physical layer security

ASJC Scopus subject areas

  • Engineering(all)
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Physical layer security of energy harvesting machine-to-machine communication system'. Together they form a unique fingerprint.

Cite this