Secure Relay Beamforming for SWIPT in Amplify-and-Forward Two-Way Relay Networks

In this paper, we investigate the secure relay beamforming problem for simultaneous wireless information and power transfer (SWIPT) in an amplify-and-forward (AF) two-way relay network. We consider scenarios that the eavesdropper's channel state information (CSI) is and is not available. When the eavesdropper's CSI is available, our objective is to maximize the achievable secrecy sum rate under transmit power constraint and energy harvesting constraint. Since the optimization problem is nonconvex, we derive its performance upper bound, which requires 2-D search, where a semidefinite programming is solved in each step. We also propose an upper bound-based rank-one solution by employing the Gaussian randomization method. To reduce computational complexity, we transform the optimization problem into a difference-of-convex programming and propose a sequential parametric convex approximation (SPCA)-based iterative algorithm to find a locally optimal solution. Furthermore, we also propose a zero-forcing (ZF)-based suboptimal solution. Simulation results demonstrate that the upper bound-based rank-one solution archives the performance almost the same as the upper bound that has high computational complexity. The low-complexity SPCA-based locally optimal solution performs close to the upper bound. The ZF-based suboptimal solution has the lowest computational complexity among the proposed solutions. When the eavesdropper's CSI is not available, we propose an artificial noise-aided secure relay beamforming scheme.

[1]  Kee Chaing Chua,et al.  Secrecy wireless information and power transfer with MISO beamforming , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).

[2]  Olav Tirkkonen,et al.  Device-to-Device Communication Underlaying Cellular Communications Systems , 2009, Int. J. Commun. Netw. Syst. Sci..

[3]  Liang Liu,et al.  Joint Transmit Beamforming and Receive Power Splitting for MISO SWIPT Systems , 2013, IEEE Transactions on Wireless Communications.

[4]  Qi Zhang,et al.  Secure Relay Beamforming for Simultaneous Wireless Information and Power Transfer in Nonregenerative Relay Networks , 2014, IEEE Transactions on Vehicular Technology.

[5]  Wing-Kin Ma,et al.  Optimum Performance Boundaries of OSTBC Based AF-MIMO Relay System With Energy Harvesting Receiver , 2013, IEEE Transactions on Signal Processing.

[6]  Bayan S. Sharif,et al.  Wireless Information and Power Transfer in Cooperative Networks With Spatially Random Relays , 2014, IEEE Transactions on Wireless Communications.

[7]  Qi Zhang,et al.  Beamforming in Non-Regenerative Two-Way Multi-Antenna Relay Networks for Simultaneous Wireless Information and Power Transfer , 2014, IEEE Transactions on Wireless Communications.

[8]  Amir Beck,et al.  A sequential parametric convex approximation method with applications to nonconvex truss topology design problems , 2010, J. Glob. Optim..

[9]  Daniel Pérez Palomar,et al.  Rank-Constrained Separable Semidefinite Programming With Applications to Optimal Beamforming , 2010, IEEE Transactions on Signal Processing.

[10]  Eduard A. Jorswieck,et al.  Secrecy Outage in MISO Systems With Partial Channel Information , 2012, IEEE Transactions on Information Forensics and Security.

[11]  Stéphane Y. Le Goff,et al.  Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Cooperative Jammer , 2015, IEEE Transactions on Vehicular Technology.

[12]  Florian Roemer,et al.  Sum-Rate Maximization in Two-Way AF MIMO Relaying: Polynomial Time Solutions to a Class of DC Programming Problems , 2012, IEEE Transactions on Signal Processing.

[13]  Zhi-Quan Luo,et al.  Semidefinite Relaxation of Quadratic Optimization Problems , 2010, IEEE Signal Processing Magazine.

[14]  Abraham Charnes,et al.  Programming with linear fractional functionals , 1962 .

[15]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2007, ISIT.

[16]  Boubakeur Benahmed,et al.  Semismooth Reformulation and Nonsmooth Newton's Method for Solving Nonlinear Semidefinite Programming , 2015, MCO.

[17]  Bayan S. Sharif,et al.  Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Multiple-Antenna Eavesdropper , 2014, IEEE Transactions on Vehicular Technology.

[18]  Kin K. Leung,et al.  On the Application of Cooperative Transmission to Secrecy Communications , 2012, IEEE Journal on Selected Areas in Communications.

[19]  Shuzhong Zhang,et al.  New results on Hermitian matrix rank-one decomposition , 2011, Math. Program..

[20]  Chengwen Xing,et al.  MIMO Beamforming Designs With Partial CSI Under Energy Harvesting Constraints , 2013, IEEE Signal Processing Letters.

[21]  Meixia Tao,et al.  Robust Beamforming for Wireless Information and Power Transmission , 2012, IEEE Wireless Communications Letters.

[22]  Rui Zhang,et al.  MIMO Broadcasting for Simultaneous Wireless Information and Power Transfer , 2013 .

[23]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[24]  R. Horst,et al.  DC Programming: Overview , 1999 .

[25]  Jie Xu,et al.  Multiuser MISO Beamforming for Simultaneous Wireless Information and Power Transfer , 2013, IEEE Transactions on Signal Processing.

[26]  A. Lee Swindlehurst,et al.  Detecting passive eavesdroppers in the MIMO wiretap channel , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[27]  Xiangyun Zhou,et al.  Pilot Contamination for Active Eavesdropping , 2012, IEEE Transactions on Wireless Communications.

[28]  Arkadi Nemirovski,et al.  Lectures on modern convex optimization - analysis, algorithms, and engineering applications , 2001, MPS-SIAM series on optimization.

[29]  Zhu Han,et al.  On the Resilience of Wireless Multiuser Networks to Passive and Active Eavesdroppers , 2013, IEEE Journal on Selected Areas in Communications.

[30]  Wenbo Wang,et al.  Iterative algorithm for secrecy guarantee with null space beamforming in two-way relay networks , 2013, 2013 IEEE Wireless Communications and Networking Conference (WCNC).

[31]  Bruno Clerckx,et al.  Joint Wireless Information and Energy Transfer in a Two-User MIMO Interference Channel , 2013, IEEE Transactions on Wireless Communications.

[32]  Huiming Wang,et al.  Distributed Beamforming for Physical-Layer Security of Two-Way Relay Networks , 2012, IEEE Transactions on Signal Processing.

[33]  Derrick Wing Kwan Ng,et al.  Robust Beamforming for Secure Communication in Systems With Wireless Information and Power Transfer , 2013, IEEE Transactions on Wireless Communications.

[34]  Qingjiang Shi Joint Beamforming And Power Splitting For Multi-User MISO SWIPT System , 2013, ArXiv.