Optimization for Maximizing Sum Secrecy Rate in MU-MISO SWIPT Systems

In this paper, we consider the sum secrecy rate maximization problem in multiuser multiple-input single-output (MU-MISO) systems in the presence of multiple energy harvesters (EHs) which also have potential to wire-tap the information users (IUs). To facilitate delivering secure information to the IUs and increase the total harvested energy by the EHs simultaneously, we optimize the transmit beamforming vectors to direct the information signals toward the IUs and artificial noise (AN) toward the EHs. We assume that each EH relies on itself to decode the information signal intended for an individual IU. Therefore, the corresponding problem is to maximize the worst-case sum secrecy rate under transmit power and energy harvesting constraints. The problem is optimally solved by transforming it into a convex iterative program using a change of variables, semi-definite relaxation (SDR), and linearization of quadratic terms. We prove that rank-one optimal solutions for the IUs beamforming covariance matrices can be obtained from the optimal relaxed unconstrained solution. Also, we provide three suboptimal solutions based on null space projection and power control of the beamforming vectors for the low and high harvested energy constrained regions. A special case of cooperative EHs in which the EHs can collaboratively cancel the signal of all IUs except the one they intend to eavesdrop is also investigated, and the optimal solution is derived in a comparable way as in noncooperative EHs case. Our simulation results reveal an understanding of how the tradeoff between the AN and information signal can jointly improve both the sum secrecy rate and the total harvested energy. We also show that, within the low total harvested energy region, the suboptimal solution in which the AN is projected in the null space of the IUs channels outperforms the suboptimal solution which ignores AN alignment at the IUs, and vice versa over the high total harvested energy region; and the suboptimal solution that combines both of them achieves close to optimal performance.

[1]  Alister G. Burr,et al.  Secrecy rate maximization for MISO multicasting SWIPT system with power splitting scheme , 2016, 2016 IEEE 17th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).

[2]  Qi Zhang,et al.  Cooperative Jamming Aided Robust Secure Transmission for Wireless Information and Power Transfer in MISO Channels , 2015, IEEE Transactions on Communications.

[3]  Hui Yu,et al.  Robust Beamforming Design for Sum Secrecy Rate Optimization in MU-MISO Networks , 2015, IEEE Transactions on Information Forensics and Security.

[4]  Meng Zhang,et al.  Artificial Noise Aided Secrecy Information and Power Transfer in OFDMA Systems , 2016, IEEE Transactions on Wireless Communications.

[5]  Bruno Clerckx,et al.  Joint Wireless Information and Energy Transfer in a Two-User MIMO Interference Channel , 2013, IEEE Transactions on Wireless Communications.

[6]  Erik G. Larsson,et al.  Simultaneous Information and Power Transfer for Broadband Wireless Systems , 2012, IEEE Transactions on Signal Processing.

[7]  Qingling Zhang,et al.  Eigenvalue Inequalities for Matrix Product , 2006, IEEE Transactions on Automatic Control.

[8]  Mudhakar Srivatsa,et al.  Limitations of Generating a Secret Key Using Wireless Fading Under Active Adversary , 2012, IEEE/ACM Transactions on Networking.

[9]  K. Mayaram,et al.  Efficient Far-Field Radio Frequency Energy Harvesting for Passively Powered Sensor Networks , 2008, IEEE Journal of Solid-State Circuits.

[10]  Yongming Huang,et al.  Secure Beamforming for SWIPT in Multiuser MISO Broadcast Channel With Confidential Messages , 2015, IEEE Communications Letters.

[11]  Bin Wu,et al.  Outage constrained secrecy rate maximization using artificial-noise aided beamforming and cooperative jamming , 2016, 2016 IEEE International Conference on Communications (ICC).

[12]  Meng Zhang,et al.  IT ] 3 S ep 2 01 5 Secrecy Wireless Information and Power Transfer in OFDMA Systems , 2018 .

[13]  Derrick Wing Kwan Ng,et al.  Robust Beamforming for Secure Communication in Systems With Wireless Information and Power Transfer , 2013, IEEE Transactions on Wireless Communications.

[14]  Yingbin Liang,et al.  Secure Communications via Physical-Layer and Information-Theoretic Techniques [Scanning the Issue] , 2015, Proc. IEEE.

[15]  David P. Williamson,et al.  Approximation algorithms for MAX-3-CUT and other problems via complex semidefinite programming , 2001, STOC '01.

[16]  Yi Hong,et al.  Unshared Secret Key Cryptography , 2014, IEEE Transactions on Wireless Communications.

[17]  Kim-Chuan Toh,et al.  SDPT3 — a Matlab software package for semidefinite-quadratic-linear programming, version 3.0 , 2001 .

[18]  Muhammad R. A. Khandaker,et al.  Masked Beamforming in the Presence of Energy-Harvesting Eavesdroppers , 2015, IEEE Transactions on Information Forensics and Security.

[19]  Xinmiao Zhang,et al.  Wireless Security and Cryptography: Specifications and Implementations , 2007 .

[20]  David Tse,et al.  Fundamentals of Wireless Communication , 2005 .

[21]  マチアス ウェクリン,et al.  Apparatus for transmitting electrical energy inductively , 2003 .

[22]  Meisam Razaviyayn,et al.  Successive Convex Approximation: Analysis and Applications , 2014 .

[23]  Takehiro Imura,et al.  Maximizing Air Gap and Efficiency of Magnetic Resonant Coupling for Wireless Power Transfer Using Equivalent Circuit and Neumann Formula , 2011, IEEE Transactions on Industrial Electronics.

[24]  W. X. Zhong,et al.  Recent progress in mid-range wireless power transfer , 2012, 2012 IEEE Energy Conversion Congress and Exposition (ECCE).

[25]  Arkadi Nemirovski,et al.  Lectures on modern convex optimization - analysis, algorithms, and engineering applications , 2001, MPS-SIAM series on optimization.

[26]  Naofal Al-Dhahir,et al.  Artificial-Noise-Aided Secure MIMO Full-Duplex Relay Channels With Fixed-Power Transmissions , 2016, IEEE Communications Letters.

[27]  Meng Zhang,et al.  Energy Harvesting for Physical-Layer Security in OFDMA Networks , 2015, IEEE Transactions on Information Forensics and Security.

[28]  Joonhyuk Kang,et al.  Joint transceiver design for secure communication with power transfer , 2014, 2014 IEEE 25th Annual International Symposium on Personal, Indoor, and Mobile Radio Communication (PIMRC).

[29]  Joonhyuk Kang,et al.  Secure Transmission in Downlink Cellular Network with a Cooperative Jammer , 2013, IEEE Wireless Communications Letters.

[30]  Prasant Mohapatra,et al.  Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks , 2010, 2010 Proceedings IEEE INFOCOM.

[31]  Wenxing Zhong,et al.  A Critical Review of Recent Progress in Mid-Range Wireless Power Transfer , 2014, IEEE Transactions on Power Electronics.

[32]  Akbar M. Sayeed,et al.  Secure wireless communications: Secret keys through multipath , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.

[33]  Kee Chaing Chua,et al.  Secrecy wireless information and power transfer with MISO beamforming , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).

[34]  M. Hata,et al.  Empirical formula for propagation loss in land mobile radio services , 1980, IEEE Transactions on Vehicular Technology.