Joint cooperative beamforming and artificial noise design for secureAF relay networks with energy-harvesting eavesdroppers
He-hao NIU, Bang-ning ZHANG, Dao-xing GUO, Yu-zhen HUANG, Ming-yue LU
Joint cooperative beamforming and artificial noise design for secureAF relay networks with energy-harvesting eavesdroppers
In this paper, we investigate physical layer security for simultaneous wireless information and power transfer in amplify-and-forward relay networks. We propose a joint robust cooperative beamforming and artificial noise scheme for secure communication and efficient wireless energy transfer. Specifically, by treating the energy receiver as a potential eavesdropper and assuming that only imperfect channel state information can be obtained, we formulate an optimization problem to maximize the worst-case secrecy rate between the source and the legitimate information receiver under both the power constraint at the relays and the wireless power harvest constraint at the energy receiver. Since such a problem is non-convex and hard to tackle, we propose a two-level optimization approach which involves a one-dimensional search and semidefinite relaxation. Simulation results show that the proposed robust scheme achieves better worst-case secrecy rate performance than other schemes.
Simultaneous wireless information and power transfer / Physical layer security / Relay networks / Cooperative beamforming / Artificial noise
[1] |
Andrews,J.G., Buzzi,S., Choi,W.,
|
[2] |
Boyd,S., Vandenberghe, L., 2004. Convex Optimization. Cambridge University Press, Cambridge.
|
[3] |
Charnes,A., Cooper, W.W., 1962. Programming with linear fractional functionals. Nav. Res. Logist., 9(3-4):181–186. http://dx.doi.org/10.1002/nav.3800090303
|
[4] |
Chen,X., Ng,D.W.K., Chen,H. , 2016. Secrecy wireless information and power transfer: challenges and opportunities. IEEE Wirel. Commun., 23(2):54–61. http://dx.doi.org/10.1109/MWC.2016.7462485
|
[5] |
Chu,Z., Zhu,Z., Hussein,J., 2016. Robust optimization for AN-aided transmission and power splitting for secure MISO SWIPT system. IEEE Commun. Lett., 20(8):1571–1574. http://dx.doi.org/10.1109/LCOMM.2016.2572684
|
[6] |
Feng,R., Li,Q., Zhang,Q.,
|
[7] |
Feng,Y., Yang,Z., Zhu,W.P.,
|
[8] |
Grant,M., Boyd,S., Ye,Y., 2005. Matlab Software for Disciplined Convex Programming. http://cvxr.com/cvx
|
[9] |
Huang,J., Li,Q., Zhang,Q.,
|
[10] |
Khandaker,M.R.A., Wong, K.K., 2015a. Masked beamforming in the presence of energy-harvesting eavesdroppers. IEEE Trans. Inform. Forens. Secur., 10(1):40–54. http://dx.doi.org/10.1109/TIFS.2014.2363033
|
[11] |
Khandaker,M.R.A., Wong, K.K., 2015b. Robust secrecy beamforming with energy-harvesting eavesdroppers. IEEE Wirel. Commun. Lett., 4(1):10–13. http://dx.doi.org/10.1109/LWC.2014.2358586
|
[12] |
Krikidis,I., Timotheou, S., Nikolaou,S. ,
|
[13] |
Li,J., Petropulu, A.P., Weber,S. , 2011. On cooperative relaying schemes for wireless physical layer security. IEEE Trans. Signal Process., 59(10):4985–4997. http://dx.doi.org/10.1109/TSP.2011.2159598
|
[14] |
Li,Q., Zhang,Q., Qin,J., 2014. Secure relay beamforming for simultaneous wireless information and power transfer in nonregenerative relay networks. IEEE Trans. Veh. Technol., 63(5):2462–2467. http://dx.doi.org/10.1109/TVT.2013.2288318
|
[15] |
Li,Q., Yang,Y., Ma,W.K.,
|
[16] |
Li,Q., Zhang,Q., Qin,J., 2016. Secure relay beamforming for SWIPT in amplify-and-forward two-way relay networks. IEEE Trans. Veh. Technol., 65(11):9006–9019. http://dx.doi.org/10.1109/TVT.2016.2519339
|
[17] |
Liu,L., Zhang,R., Chua,K.C., 2013. Secrecy wireless information and power transfer with MISO beamforming. IEEE Global Communications Conf., p.1831–1836. http://dx.doi.org/10.1109/GLOCOM.2013.6831340
|
[18] |
Luo,Z.Q., Sturm,J.F., Zhang,S., 2004. Multivariate nonnegative quadratic mappings. SIAM J. Optim., 14(4):1140–1162. http://dx.doi.org/10.1137/S1052623403421498
|
[19] |
Luo,Z.Q., Ma,W.K., So,A.M.C.,
|
[20] |
Rodriguez,L.J., Tran,N.H., Duong,T.Q.,
|
[21] |
Salem,A., Hamdi,K.A., Rabie,K.M., 2016. Physical layer security with RF energy harvesting in AF multi-antenna relaying networks. IEEE Trans. Commun., 64(7):3025–3038. http://dx.doi.org/10.1109/TCOMM.2016.2573829
|
[22] |
Shi,Q., Xu,W., Wu,J.,
|
[23] |
Son,P.N., Kong,H.Y., 2015. Cooperative communication with energy-harvesting relays under physical layer security. IET Commun., 9(17):2131-2139. http://dx.doi.org/10.1049/iet-com.2015.0186
|
[24] |
Tian,M., Huang,X., Zhang,Q.,
|
[25] |
Wang,C., Wang,H.M., 2015. Robust joint beamforming and jamming for secure AF networks: low-complexity design. IEEE Trans. Veh. Technol., 64(5):2192–2198. http://dx.doi.org/10.1109/TVT.2014.2334640
|
[26] |
Wang,D., Zhang,R., Cheng,X.,
|
[27] |
Wang,D., Zhang,R., Cheng,X.,
|
[28] |
Wang,S.H., Wang,B.Y., 2015. Robust secure transmit design in MIMO channels with simultaneous wireless information and power transfer. IEEE Signal Process. Lett., 22(11):2147–2151. http://dx.doi.org/10.1109/LSP.2015.2464791
|
[29] |
Xing,H., Wong,K.K., Nallanathan,A. , 2015. Secure wireless energy harvesting-enabled AF-relaying SWIPT networks. IEEE Int. Conf. on Communications, p.2307–2312. http://dx.doi.org/10.1109/ICC.2015.7248669
|
[30] |
Xing,H., Liu,L., Zhang,R., 2016. Secrecy wireless information and power transfer in fading wiretap channel. IEEE Trans. Veh. Technol., 65(1):180–190. http://dx.doi.org/10.1109/TVT.2015.2395725
|
[31] |
Xu,J., Liu,L., Zhang,R., 2014. Multiuser MISO beamforming for simultaneous wireless information and power transfer. IEEE Trans. Signal Process., 62(18):4798–4810. http://dx.doi.org/10.1109/TSP.2014.2340817
|
[32] |
Yang,N., Wang,L., Geraci,G.,
|
[33] |
Yang,Y., Li,Q., Ma,W.K.,
|
[34] |
Yang,Y., Li,Q., Ma,W.K.,
|
[35] |
Yuen,C., Elkashlan, M., Qian,Y. ,
|
[36] |
Yuen,C., Elkashlan, M., Qian,Y. ,
|
[37] |
Yuen,C., Elkashlan, M., Qian,Y. ,
|
[38] |
Zhang,G., Li,X., Cui,M.,
|
[39] |
Zhang,R., Ho,C.K., 2013. MIMO broadcasting for simultaneous wireless information and power transfer. IEEE Trans. Wirel. Commun., 12(5):1989–2001. http://dx.doi.org/10.1109/TWC.2013.031813.120224
|
[40] |
Zhang,R., Song,L., Han,Z.,
|
[41] |
Zhang,R., Cheng,X., Yang,L., 2016. Cooperation via spectrum sharing for physical layer security in device-todevice communications underlaying cellular networks. IEEE Trans. Wirel. Commun., 15(8):5651–5663. http://dx.doi.org/10.1109/TWC.2016.2565579
|
[42] |
Zhang,X., 2004. Matrix Analysis and Applications. Tsinghua University Press, Beijing, China (in Chinese).
|
/
〈 | 〉 |