Secrecy wireless information and power transfer: challenges and opportunities

Wireless information and power transfer (WIPT) enables more sustainable and resilient communications due to the fact that it avoids frequent battery charging and replacement. However, it also suffers from possible information interception due to the open nature of wireless channels. Compared to traditional secure communications, secrecy wireless information and power transfer (SWIPT) has several distinct characteristic features. Wireless power transfer may increase vulnerability to eavesdropping, since a power receiver as a potential eavesdropper usually has a shorter access distance than an information receiver. On the other hand, wireless power transfer can be exploited to enhance wireless security. This article reviews the security issues in various SWIPT scenarios, with an emphasis on revealing the challenges and opportunities for implementing SWIPT. Furthermore, we provide a survey on a variety of physical layer security techniques to improve secrecy performance. In particular, we propose to use massive MIMO techniques to enhance power transfer efficiency and secure information transmission simultaneously. Finally, we discuss several potential research directions to further enhance the security in SWIPT systems.

[1]  Xiaoming Chen,et al.  Optimal Power Allocation for a Massive MIMO Relay Aided Secure Communication , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).

[2]  J. L. Massey,et al.  An introduction to contemporary cryptology , 1988, Proc. IEEE.

[3]  Derrick Wing Kwan Ng,et al.  Secure Massive MIMO Transmission With an Active Eavesdropper , 2015, IEEE Transactions on Information Theory.

[4]  Derrick Wing Kwan Ng,et al.  Multiobjective Resource Allocation for Secure Communication in Cognitive Radio Networks With Wireless Information and Power Transfer , 2016, IEEE Transactions on Vehicular Technology.

[5]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.

[6]  Caijun Zhong,et al.  Multi-antenna relay aided wireless physical layer security , 2015, IEEE Communications Magazine.

[7]  Xiaoming Chen,et al.  Performance Analysis for Physical Layer Security in Multi-Antenna Downlink Networks with Limited CSI Feedback , 2013, IEEE Wireless Communications Letters.

[8]  Kee Chaing Chua,et al.  Secrecy wireless information and power transfer with MISO beamforming , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).

[9]  Ranjan Bose,et al.  Resource Allocation for Secure Multicarrier AF Relay System Under Total Power Constraint , 2015, IEEE Communications Letters.

[10]  Hsiao-Hwa Chen,et al.  Enhancing wireless information and power transfer by exploiting multi-antenna techniques , 2015, IEEE Communications Magazine.

[11]  Derrick Wing Kwan Ng,et al.  Secure and Green SWIPT in Distributed Antenna Networks With Limited Backhaul Capacity , 2014, IEEE Transactions on Wireless Communications.

[12]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[13]  Il-Min Kim,et al.  Joint Secure Beamforming Design at the Source and the Relay for an Amplify-and-Forward MIMO Untrusted Relay System , 2012, IEEE Transactions on Signal Processing.

[14]  A. Lee Swindlehurst,et al.  Cooperative Jamming for Secure Communications in MIMO Relay Networks , 2011, IEEE Transactions on Signal Processing.

[15]  Hyuckjae Lee,et al.  Bounds on Secrecy Capacity Over Correlated Ergodic Fading Channels at High SNR , 2011, IEEE Transactions on Information Theory.

[16]  Thomas L. Marzetta,et al.  Noncooperative Cellular Wireless with Unlimited Numbers of Base Station Antennas , 2010, IEEE Transactions on Wireless Communications.

[17]  Qi Zhang,et al.  Robust Secure Transmission in MISO Simultaneous Wireless Information and Power Transfer System , 2015, IEEE Transactions on Vehicular Technology.

[18]  Erik G. Larsson,et al.  Simultaneous Information and Power Transfer for Broadband Wireless Systems , 2012, IEEE Transactions on Signal Processing.

[19]  Kee Chaing Chua,et al.  Secrecy Wireless Information and Power Transfer With MISO Beamforming , 2013, IEEE Transactions on Signal Processing.

[20]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[21]  Derrick Wing Kwan Ng,et al.  Secure Resource Allocation and Scheduling for OFDMA Decode-and-Forward Relay Networks , 2011, IEEE Transactions on Wireless Communications.

[22]  Derrick Wing Kwan Ng,et al.  Robust Beamforming for Secure Communication in Systems With Wireless Information and Power Transfer , 2013, IEEE Transactions on Wireless Communications.

[23]  Yaming Wang,et al.  Secure Beamforming for MIMO Broadcasting With Wireless Information and Power Transfer , 2014, IEEE Transactions on Wireless Communications.

[24]  Anant Sahai,et al.  Shannon meets Tesla: Wireless information and power transfer , 2010, 2010 IEEE International Symposium on Information Theory.

[25]  Qi Zhang,et al.  Robust AN-Aided Secure Transmission Scheme in MISO Channels with Simultaneous Wireless Information and Power Transfer , 2015, IEEE Signal Processing Letters.

[26]  Xiaoming Chen,et al.  Secure wireless information and power transfer in large-scale MIMO relaying systems with imperfect CSI , 2014, 2014 IEEE Global Communications Conference.

[27]  Derrick Wing Kwan Ng,et al.  Multiobjective Resource Allocation for Secure Communication in Cognitive Radio Networks With Wireless Information and Power Transfer , 2014, IEEE Transactions on Vehicular Technology.

[28]  Steven P. Weber,et al.  On Cooperative Relaying Schemes for Wireless Physical Layer Security , 2010, IEEE Transactions on Signal Processing.

[29]  张旗,et al.  Robust Secure Transmission in MISO Simultaneous Wireless Information and Power Transfer System , 2015 .

[30]  Xiaoming Chen,et al.  Secure Transmission in Wireless Powered Massive MIMO Relaying Systems: Performance Analysis and Optimization , 2016, IEEE Transactions on Vehicular Technology.

[31]  Miguel R. D. Rodrigues,et al.  Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.

[32]  Thomas L. Marzetta,et al.  Multiple-antenna channel hardening and its implications for rate feedback and scheduling , 2004, IEEE Transactions on Information Theory.

[33]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[34]  Vincent K. N. Lau,et al.  Design and analysis of delay-sensitive cross-layer OFDMA systems with outdated CSIT , 2009, IEEE Transactions on Wireless Communications.

[35]  A. Lee Swindlehurst,et al.  Secure Relay and Jammer Selection for Physical Layer Security , 2015, IEEE Signal Processing Letters.

[36]  Qi Zhang,et al.  Power allocation for secure OFDMA systems with wireless information and power transfer , 2014 .

[37]  Erik G. Larsson,et al.  Massive MIMO for next generation wireless systems , 2013, IEEE Communications Magazine.

[38]  Lifeng Wang,et al.  On the security of large scale spectrum sharing networks , 2015, 2015 IEEE International Conference on Communications (ICC).

[39]  Can Emre Koksal,et al.  On the Secrecy Capacity of Block Fading Channels With a Hybrid Adversary , 2013, IEEE Transactions on Information Theory.

[40]  Huiming Wang,et al.  Joint Cooperative Beamforming and Jamming to Secure AF Relay Systems With Individual Power Constraint and No Eavesdropper's CSI , 2013, IEEE Signal Processing Letters.

[41]  Vijay K. Bhargava,et al.  Secure Transmission in Multicell Massive MIMO Systems , 2014, IEEE Transactions on Wireless Communications.

[42]  Ranjan K. Mallik,et al.  Physical Layer Security in Three-Tier Wireless Sensor Networks: A Stochastic Geometry Approach , 2016, IEEE Transactions on Information Forensics and Security.

[43]  Mohamed-Slim Alouini,et al.  On the Jamming Power Allocation for Secure Amplify-and-Forward Relaying via Cooperative Jamming , 2013, IEEE Journal on Selected Areas in Communications.

[44]  Xuemin Shen,et al.  Cooperative networking towards secure communications for CRNs , 2013, 2013 IEEE Wireless Communications and Networking Conference (WCNC).

[45]  Xiaoming Chen,et al.  Large-Scale MIMO Relaying Techniques for Physical Layer Security: AF or DF? , 2015, IEEE Transactions on Wireless Communications.