Joint cooperative beamforming and artificial noise design for secureAF relay networks with energy-harvesting eavesdroppers

He-hao NIU, Bang-ning ZHANG, Dao-xing GUO, Yu-zhen HUANG, Ming-yue LU

PDF(658 KB)
PDF(658 KB)
Front. Inform. Technol. Electron. Eng ›› 2017, Vol. 18 ›› Issue (6) : 850-862. DOI: 10.1631/FITEE.1601832
Article
Article

Joint cooperative beamforming and artificial noise design for secureAF relay networks with energy-harvesting eavesdroppers

Author information +
History +

Abstract

In this paper, we investigate physical layer security for simultaneous wireless information and power transfer in amplify-and-forward relay networks. We propose a joint robust cooperative beamforming and artificial noise scheme for secure communication and efficient wireless energy transfer. Specifically, by treating the energy receiver as a potential eavesdropper and assuming that only imperfect channel state information can be obtained, we formulate an optimization problem to maximize the worst-case secrecy rate between the source and the legitimate information receiver under both the power constraint at the relays and the wireless power harvest constraint at the energy receiver. Since such a problem is non-convex and hard to tackle, we propose a two-level optimization approach which involves a one-dimensional search and semidefinite relaxation. Simulation results show that the proposed robust scheme achieves better worst-case secrecy rate performance than other schemes.

Keywords

Simultaneous wireless information and power transfer / Physical layer security / Relay networks / Cooperative beamforming / Artificial noise

Cite this article

Download citation ▾
He-hao NIU, Bang-ning ZHANG, Dao-xing GUO, Yu-zhen HUANG, Ming-yue LU. Joint cooperative beamforming and artificial noise design for secureAF relay networks with energy-harvesting eavesdroppers. Front. Inform. Technol. Electron. Eng, 2017, 18(6): 850‒862 https://doi.org/10.1631/FITEE.1601832

References

[1]
Andrews,J.G., Buzzi,S., Choi,W., , 2014. What will 5G be? IEEE J. Sel. Areas Commun., 32(6):1065–1082. http://dx.doi.org/10.1109/JSAC.2014.2328098
[2]
Boyd,S., Vandenberghe, L., 2004. Convex Optimization. Cambridge University Press, Cambridge.
[3]
Charnes,A., Cooper, W.W., 1962. Programming with linear fractional functionals. Nav. Res. Logist., 9(3-4):181–186. http://dx.doi.org/10.1002/nav.3800090303
[4]
Chen,X., Ng,D.W.K., Chen,H. , 2016. Secrecy wireless information and power transfer: challenges and opportunities. IEEE Wirel. Commun., 23(2):54–61. http://dx.doi.org/10.1109/MWC.2016.7462485
[5]
Chu,Z., Zhu,Z., Hussein,J., 2016. Robust optimization for AN-aided transmission and power splitting for secure MISO SWIPT system. IEEE Commun. Lett., 20(8):1571–1574. http://dx.doi.org/10.1109/LCOMM.2016.2572684
[6]
Feng,R., Li,Q., Zhang,Q., , 2015. Robust secure transmission in MISO simultaneous wireless information and power transfer system. IEEE Trans. Veh. Technol., 64(1):400–405. http://dx.doi.org/10.1109/TVT.2014.2322076
[7]
Feng,Y., Yang,Z., Zhu,W.P., , 2017. Robust cooperative secure beamforming for simultaneous wireless information and power transfer in amplify-and-forward relay networks. IEEE Trans. Veh. Technol., 66(3):2354–2366. http://dx.doi.org/10.1109/TVT.2016.2578313
[8]
Grant,M., Boyd,S., Ye,Y., 2005. Matlab Software for Disciplined Convex Programming. http://cvxr.com/cvx
[9]
Huang,J., Li,Q., Zhang,Q., , 2014. Relay beamforming for amplify-and-forward multi-antenna relay networks with energy harvesting constraint. IEEE Signal Process. Lett., 21(4):454–458. http://dx.doi.org/10.1109/LSP.2014.2305737
[10]
Khandaker,M.R.A., Wong, K.K., 2015a. Masked beamforming in the presence of energy-harvesting eavesdroppers. IEEE Trans. Inform. Forens. Secur., 10(1):40–54. http://dx.doi.org/10.1109/TIFS.2014.2363033
[11]
Khandaker,M.R.A., Wong, K.K., 2015b. Robust secrecy beamforming with energy-harvesting eavesdroppers. IEEE Wirel. Commun. Lett., 4(1):10–13. http://dx.doi.org/10.1109/LWC.2014.2358586
[12]
Krikidis,I., Timotheou, S., Nikolaou,S. , , 2014. Simultaneous wireless information and power transfer in modern communication systems. IEEE Commun. Mag., 52(11):104–110. http://dx.doi.org/10.1109/MCOM.2014.6957150
[13]
Li,J., Petropulu, A.P., Weber,S. , 2011. On cooperative relaying schemes for wireless physical layer security. IEEE Trans. Signal Process., 59(10):4985–4997. http://dx.doi.org/10.1109/TSP.2011.2159598
[14]
Li,Q., Zhang,Q., Qin,J., 2014. Secure relay beamforming for simultaneous wireless information and power transfer in nonregenerative relay networks. IEEE Trans. Veh. Technol., 63(5):2462–2467. http://dx.doi.org/10.1109/TVT.2013.2288318
[15]
Li,Q., Yang,Y., Ma,W.K., , 2015. Robust cooperative beamforming and artificial noise design for physical-layer secrecy in AF multi-antenna multi-relay networks. IEEE Trans. Signal Process., 63(1):206–220. http://dx.doi.org/10.1109/TSP.2014.2369001
[16]
Li,Q., Zhang,Q., Qin,J., 2016. Secure relay beamforming for SWIPT in amplify-and-forward two-way relay networks. IEEE Trans. Veh. Technol., 65(11):9006–9019. http://dx.doi.org/10.1109/TVT.2016.2519339
[17]
Liu,L., Zhang,R., Chua,K.C., 2013. Secrecy wireless information and power transfer with MISO beamforming. IEEE Global Communications Conf., p.1831–1836. http://dx.doi.org/10.1109/GLOCOM.2013.6831340
[18]
Luo,Z.Q., Sturm,J.F., Zhang,S., 2004. Multivariate nonnegative quadratic mappings. SIAM J. Optim., 14(4):1140–1162. http://dx.doi.org/10.1137/S1052623403421498
[19]
Luo,Z.Q., Ma,W.K., So,A.M.C., , 2010. Semidefinite relaxation of quadratic optimization problems. IEEE Signal Process. Mag., 27(3):20–34. http://dx.doi.org/10.1109/MSP.2010.936019
[20]
Rodriguez,L.J., Tran,N.H., Duong,T.Q., , 2015. Physical layer security in wireless cooperative relay networks: state of the art and beyond. IEEE Commun. Mag., 53(12):32–39. http://dx.doi.org/10.1109/MCOM.2015.7355563
[21]
Salem,A., Hamdi,K.A., Rabie,K.M., 2016. Physical layer security with RF energy harvesting in AF multi-antenna relaying networks. IEEE Trans. Commun., 64(7):3025–3038. http://dx.doi.org/10.1109/TCOMM.2016.2573829
[22]
Shi,Q., Xu,W., Wu,J., , 2015. Secure beamforming for MIMO broadcasting with wireless information and power transfer. IEEE Trans. Wirel. Commun., 14(5):2841–2853. http://dx.doi.org/10.1109/TWC.2015.2395414
[23]
Son,P.N., Kong,H.Y., 2015. Cooperative communication with energy-harvesting relays under physical layer security. IET Commun., 9(17):2131-2139. http://dx.doi.org/10.1049/iet-com.2015.0186
[24]
Tian,M., Huang,X., Zhang,Q., , 2015. Robust AN-aided secure transmission scheme in MISO channels with simultaneous wireless information and power transfer. IEEE Signal Process. Lett., 22(6):723–727. http://dx.doi.org/10.1109/LSP.2014.2368695
[25]
Wang,C., Wang,H.M., 2015. Robust joint beamforming and jamming for secure AF networks: low-complexity design. IEEE Trans. Veh. Technol., 64(5):2192–2198. http://dx.doi.org/10.1109/TVT.2014.2334640
[26]
Wang,D., Zhang,R., Cheng,X., , 2016a. Capacityenhancing full-duplex relay networks based on power splitting (PS-) SWIPT. IEEE Trans. Veh. Technol., 66(6):5445–5450. http://dx.doi.org/10.1109/TVT.2016.2616147
[27]
Wang,D., Zhang,R., Cheng,X., , 2016b. Relay selection in two-way full-duplex energy-harvesting relay networks. IEEE Global Communications Conf., p.1–6. http://dx.doi.org/10.1109/GLOCOM.2016.7842211
[28]
Wang,S.H., Wang,B.Y., 2015. Robust secure transmit design in MIMO channels with simultaneous wireless information and power transfer. IEEE Signal Process. Lett., 22(11):2147–2151. http://dx.doi.org/10.1109/LSP.2015.2464791
[29]
Xing,H., Wong,K.K., Nallanathan,A. , 2015. Secure wireless energy harvesting-enabled AF-relaying SWIPT networks. IEEE Int. Conf. on Communications, p.2307–2312. http://dx.doi.org/10.1109/ICC.2015.7248669
[30]
Xing,H., Liu,L., Zhang,R., 2016. Secrecy wireless information and power transfer in fading wiretap channel. IEEE Trans. Veh. Technol., 65(1):180–190. http://dx.doi.org/10.1109/TVT.2015.2395725
[31]
Xu,J., Liu,L., Zhang,R., 2014. Multiuser MISO beamforming for simultaneous wireless information and power transfer. IEEE Trans. Signal Process., 62(18):4798–4810. http://dx.doi.org/10.1109/TSP.2014.2340817
[32]
Yang,N., Wang,L., Geraci,G., , 2015. Safeguarding 5G wireless communication networks using physical layer security. IEEE Commun. Mag., 53(4):20–27. http://dx.doi.org/10.1109/MCOM.2015.7081071
[33]
Yang,Y., Li,Q., Ma,W.K., , 2013a. Cooperative secure beamforming for AF relay networks with multiple eavesdroppers. IEEE Signal Process. Lett., 20(1):35-38. http://dx.doi.org/10.1109/LSP.2012.2227313
[34]
Yang,Y., Li,Q., Ma,W.K., , 2013b. Optimal joint cooperative beamforming and artificial noise design for secrecy rate maximization in AF relay networks. IEEE 14th Workshop on Signal Processing Advances in Wireless Communications, p.360–364. http://dx.doi.org/10.1109/SPAWC.2013.6612072
[35]
Yuen,C., Elkashlan, M., Qian,Y. , , 2015a. Energy harvesting communications: part 1. IEEE Commun. Mag., 53(4):68–69. http://dx.doi.org/10.1109/MCOM.2015.7081077
[36]
Yuen,C., Elkashlan, M., Qian,Y. , , 2015b. Energy harvesting communications: part 2. IEEE Commun. Mag., 53(6):54–55. http://dx.doi.org/10.1109/MCOM.2015.7120017
[37]
Yuen,C., Elkashlan, M., Qian,Y. , ., 2015c. Energy harvesting communications: part 3. IEEE Commun. Mag., 53(8):90–91. http://dx.doi.org/10.1109/MCOM.2015.7180513
[38]
Zhang,G., Li,X., Cui,M., , 2016. Signal and artificial noise beamforming for secure simultaneous wireless information and power transfer multiple-input multipleoutput relaying systems. IET Commun., 10(7):796–804. http://dx.doi.org/10.1049/iet-com.2015.0482
[39]
Zhang,R., Ho,C.K., 2013. MIMO broadcasting for simultaneous wireless information and power transfer. IEEE Trans. Wirel. Commun., 12(5):1989–2001. http://dx.doi.org/10.1109/TWC.2013.031813.120224
[40]
Zhang,R., Song,L., Han,Z., , 2012. Physical layer security for two-way untrusted relaying with friendly jammers. IEEE Trans. Veh. Technol., 61(8):3693–3704. http://dx.doi.org/10.1109/TVT.2012.2209692
[41]
Zhang,R., Cheng,X., Yang,L., 2016. Cooperation via spectrum sharing for physical layer security in device-todevice communications underlaying cellular networks. IEEE Trans. Wirel. Commun., 15(8):5651–5663. http://dx.doi.org/10.1109/TWC.2016.2565579
[42]
Zhang,X., 2004. Matrix Analysis and Applications. Tsinghua University Press, Beijing, China (in Chinese).

RIGHTS & PERMISSIONS

2017 Zhejiang University and Springer-Verlag Berlin Heidelberg
PDF(658 KB)

Accesses

Citations

Detail

Sections
Recommended

/