Energy-Efficient Wireless Powered Secure Transmission With Cooperative Jamming for Public Transportation

In this paper, wireless power transfer and cooperative jamming (CJ) are combined to enhance physical security in public transportation networks. First, a new secure system model with both fixed and mobile jammers is proposed to guarantee secrecy in the worst-case scenario. All jammers are endowed with energy harvesting (EH) capability. Following this, two CJ-based schemes, namely, beamforming-CJ-SR-maximization (B-CJ-SRM) and beamforming-CJ-transmit-power-minimization (B-CJ-TPM), are proposed, where SRM and TPM are short for secrecy rate maximization and transmit power minimization, respectively. They, respectively, maximize the secrecy rate (SR) with transmit power constraint and minimize the transmit power of the BS with SR constraint, by optimizing beamforming vector and artificial noise covariance matrix. To further reduce the complexity of our proposed optimal schemes, their low-complexity (LC) versions, called LC-B-CJ-SRM and LC-B-CJ-TPM are developed. Simulation results show that our proposed schemes, B-CJ-SRM and B-CJ-TPM, achieve significant SR performance improvement over existing zero-forcing and QoSD methods. Additionally, the SR performance of the proposed LC schemes is close to those of their original versions.

[1]  He Chen,et al.  Cooperative Strategies for Wireless-Powered Communications: An Overview , 2018, IEEE Wireless Communications.

[2]  Arkadi Nemirovski,et al.  Lectures on modern convex optimization - analysis, algorithms, and engineering applications , 2001, MPS-SIAM series on optimization.

[3]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[4]  Hyungsik Ju,et al.  Optimal Resource Allocation in Full-Duplex Wireless-Powered Communication Network , 2014, IEEE Transactions on Communications.

[5]  Xiang-Yang Li,et al.  One More Tag Enables Fine-Grained RFID Localization and Tracking , 2018, IEEE/ACM Transactions on Networking.

[6]  Gamantyo Hendrantoro,et al.  Pathloss and shadowing characteristics in indoor environment at 2.4 GHz band , 2015, 2015 International Seminar on Intelligent Technology and Its Applications (ISITIA).

[7]  Liyun Zhang,et al.  Improving Physical Layer Security for MISO Systems via Using Artificial Noise , 2014, GLOBECOM 2014.

[8]  Xiaohui Xie,et al.  Utility-aware data transmission scheme for delay tolerant networks , 2016, Peer Peer Netw. Appl..

[9]  Jun Li,et al.  Low-Complexity and High-Resolution DOA Estimation for Hybrid Analog and Digital Massive MIMO Receive Array , 2017, IEEE Transactions on Communications.

[10]  Feng Shu,et al.  Artificial-Noise-Aided Secure Multicast Precoding for Directional Modulation Systems , 2017, IEEE Transactions on Vehicular Technology.

[11]  Linqing Gui,et al.  DV-Hop Localization With Protocol Sequence Based Access , 2018, IEEE Transactions on Vehicular Technology.

[12]  Kamel Tourki,et al.  Securing Untrusted RF-EH Relay Networks Using Cooperative Jamming Signals , 2017, IEEE Access.

[13]  Ling Tang,et al.  Wireless Power Transfer and Cooperative Jamming for Secrecy Throughput Maximization , 2016, IEEE Wireless Communications Letters.

[14]  J. Magnus,et al.  Matrix Differential Calculus with Applications in Statistics and Econometrics , 1991 .

[15]  Abraham Charnes,et al.  Programming with linear fractional functionals , 1962 .

[16]  Qingqing Wu,et al.  Wireless Powered Cooperative Jamming for Secure OFDM System , 2017, IEEE Transactions on Vehicular Technology.

[17]  R. Negi,et al.  Secret communication using artificial noise , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..

[18]  Kyoung-Jae Lee,et al.  Optimal Beamforming Designs for Wireless Information and Power Transfer in MISO Interference Channels , 2015, IEEE Transactions on Wireless Communications.

[19]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[20]  R. Horst,et al.  DC Programming: Overview , 1999 .

[21]  Daesik Hong,et al.  New OFDM Channel Estimation with Dual-ICI Cancellation in Highly Mobile Channel , 2010, IEEE Transactions on Wireless Communications.

[22]  Fu Xiao,et al.  Surface Coverage Algorithm in Directional Sensor Networks for Three-Dimensional Complex Terrains , 2016 .

[23]  Panlong Yang,et al.  R-TTWD: Robust Device-Free Through-The-Wall Detection of Moving Human With WiFi , 2017, IEEE Journal on Selected Areas in Communications.

[24]  Julian Cheng,et al.  Robust MISO Beamforming With Cooperative Jamming for Secure Transmission From Perspectives of QoS and Secrecy Rate , 2018, IEEE Transactions on Communications.

[25]  J. Magnus,et al.  Matrix Differential Calculus with Applications in Statistics and Econometrics (Revised Edition) , 1999 .

[26]  Feng Shu,et al.  Secure and Precise Wireless Transmission for Random-Subcarrier-Selection-Based Directional Modulation Transmit Antenna Array , 2017, IEEE Journal on Selected Areas in Communications.

[27]  Chao Zhai,et al.  Cooperative Strategies for Wireless-Powered Communications , 2016, ArXiv.

[28]  Qiang Li,et al.  Optimal and Robust Transmit Designs for MISO Channel Secrecy by Semidefinite Programming , 2010, IEEE Transactions on Signal Processing.

[29]  Steven P. Weber,et al.  On Cooperative Relaying Schemes for Wireless Physical Layer Security , 2010, IEEE Transactions on Signal Processing.

[30]  Rui Zhang,et al.  Wireless powered communication: opportunities and challenges , 2014, IEEE Communications Magazine.

[31]  Jun Li,et al.  A Cramer–Rao Lower Bound of CSI-Based Indoor Localization , 2018, IEEE Transactions on Vehicular Technology.

[32]  Jun Li,et al.  Secure SWIPT for Directional Modulation-Aided AF Relaying Networks , 2018, IEEE Journal on Selected Areas in Communications.

[33]  Zhetao Li,et al.  Noise-Tolerant Wireless Sensor Networks Localization via Multinorms Regularized Matrix Completion , 2018, IEEE Transactions on Vehicular Technology.

[34]  Ender Tekin,et al.  The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.

[35]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[36]  Jun Li,et al.  Artificial-Noise-Aided Secure Transmission With Directional Modulation Based on Random Frequency Diverse Arrays , 2016, IEEE Access.