Resource Allocation Strategies for Secure WPCN Multiantenna Multicasting Systems

This paper investigates a secure wireless-powered multiantenna multicasting system, where multiple power beacons (PBs) supply power to a transmitter in order to establish a reliable communication link with multiple legitimate users in the presence of multiple eavesdroppers. The transmitter has to harvest radio frequency (RF) energy from multiple PBs due to the shortage of embedded power supply before establishing its secure communication. We consider two different scenarios. In the first, the PBs and the transmitter belong to the same operator, where we formulate the resource allocation problem as the minimization of the total transmit power subject to the target secure rate constraint. The solution of this problem yields both the optimal power and energy transfer time allocation. Due to the non-convexity of this problem, we propose a two-level approach, where the inner level problem can be recast as a convex optimization framework via conic convex reformulation, while the outer level problem can be handled by using one-dimensional (1D) search. The second scenario considers the case where the transmitter and the PBs belong to different service suppliers. Hence, we formulate the resource allocation problem where we consider incentives for the PBs to assist the transmitter. This leads to the formulation of a Stackelberg game for the secure wireless-powered multiantenna multicasting system. The transmitter has to pay for the energy services from these multiple PBs in order to facilitate secure communications. In this game, the transmitter and the PB are modelled as leader and follower, respectively, in which both of them try to maximize their own utility function. The closed-form Stackelberg equilibrium of the formulated game is then derived. Finally, numerical results are provided to validate our proposed schemes.

[1]  Kee Chaing Chua,et al.  Secrecy wireless information and power transfer with MISO beamforming , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).

[2]  Shlomo Shamai,et al.  A Note on the Secrecy Capacity of the Multiple-Antenna Wiretap Channel , 2007, IEEE Transactions on Information Theory.

[3]  Rui Zhang,et al.  Wireless powered communication networks: an overview , 2015, IEEE Wireless Communications.

[4]  Stéphane Y. Le Goff,et al.  Simultaneous Wireless Information Power Transfer for MISO Secrecy Channel , 2015, IEEE Transactions on Vehicular Technology.

[5]  Vincent W. S. Wong,et al.  Autonomous Demand-Side Management Based on Game-Theoretic Energy Consumption Scheduling for the Future Smart Grid , 2010, IEEE Transactions on Smart Grid.

[6]  Branka Vucetic,et al.  Wireless-powered cooperative communications via a hybrid relay , 2014, 2014 IEEE Information Theory Workshop (ITW 2014).

[7]  Zhu Han,et al.  Physical Layer Security in MIMO Backscatter Wireless Systems , 2016, IEEE Transactions on Wireless Communications.

[8]  Qiang Li,et al.  Spatially Selective Artificial-Noise Aided Transmit Optimization for MISO Multi-Eves Secrecy Rate Maximization , 2013, IEEE Transactions on Signal Processing.

[9]  Nikos D. Sidiropoulos,et al.  Transmit beamforming for physical-layer multicasting , 2006, IEEE Transactions on Signal Processing.

[10]  Markku J. Juntti,et al.  A Conic Quadratic Programming Approach to Physical Layer Multicasting for Large-Scale Antenna Arrays , 2014, IEEE Signal Processing Letters.

[11]  Meixia Tao,et al.  Coordinated Multicast Beamforming in Multicell Networks , 2012, IEEE Transactions on Wireless Communications.

[12]  He Chen,et al.  Harvest-Then-Cooperate: Wireless-Powered Cooperative Communications , 2014, IEEE Transactions on Signal Processing.

[13]  Anant Sahai,et al.  Shannon meets Tesla: Wireless information and power transfer , 2010, 2010 IEEE International Symposium on Information Theory.

[14]  Antti Tölli,et al.  Fast Converging Algorithm for Weighted Sum Rate Maximization in Multicell MISO Downlink , 2012, IEEE Signal Processing Letters.

[15]  Lav R. Varshney,et al.  Transporting information and energy simultaneously , 2008, 2008 IEEE International Symposium on Information Theory.

[16]  Rui Zhang,et al.  MIMO Broadcasting for Simultaneous Wireless Information and Power Transfer , 2013 .

[17]  Caijun Zhong,et al.  Optimum Wirelessly Powered Relaying , 2015, IEEE Signal Processing Letters.

[18]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[19]  Stéphane Y. Le Goff,et al.  Robust Outage Secrecy Rate Optimizations for a MIMO Secrecy Channel , 2015, IEEE Wireless Communications Letters.

[20]  A. Lee Swindlehurst,et al.  Full Rank Solutions for the MIMO Gaussian Wiretap Channel With an Average Power Constraint , 2012, IEEE Transactions on Signal Processing.

[21]  Sennur Ulukus,et al.  Achievable Rates in Gaussian MISO Channels with Secrecy Constraints , 2007, 2007 IEEE International Symposium on Information Theory.

[22]  Hyungsik Ju,et al.  Throughput Maximization in Wireless Powered Communication Networks , 2013, IEEE Trans. Wirel. Commun..

[23]  Qiang Li,et al.  Multicast Secrecy Rate Maximization for MISO Channels with Multiple Multi-Antenna Eavesdroppers , 2011, 2011 IEEE International Conference on Communications (ICC).

[24]  Athina P. Petropulu,et al.  On Ergodic Secrecy Rate for Gaussian MISO Wiretap Channels , 2011, IEEE Transactions on Wireless Communications.

[25]  Muhammad R. A. Khandaker,et al.  Masked Beamforming in the Presence of Energy-Harvesting Eavesdroppers , 2015, IEEE Transactions on Information Forensics and Security.

[26]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[27]  Arumugam Nallanathan,et al.  Enhancing Secrecy Rate in Cognitive Radio Networks via Stackelberg Game , 2016, IEEE Transactions on Communications.

[28]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[29]  H. Vincent Poor,et al.  Secrecy Rate Optimization for Secure Multicast Communications , 2016, IEEE Journal of Selected Topics in Signal Processing.

[30]  Hyungsik Ju,et al.  User cooperation in wireless powered communication networks , 2014, 2014 IEEE Global Communications Conference.

[31]  Stéphane Y. Le Goff,et al.  Secrecy Rate Optimizations for a MISO Secrecy Channel with Multiple Multiantenna Eavesdroppers , 2016, IEEE Transactions on Wireless Communications.

[32]  Adeel Razi,et al.  Secrecy Sum-Rates for Multi-User MIMO Regularized Channel Inversion Precoding , 2012, IEEE Transactions on Communications.

[33]  Kaibin Huang,et al.  Enabling Wireless Power Transfer in Cellular Networks: Architecture, Modeling and Deployment , 2012, IEEE Transactions on Wireless Communications.

[34]  Xiangyun Zhou,et al.  Cutting the last wires for mobile communications by microwave power transfer , 2014, IEEE Communications Magazine.

[35]  Qiang Li,et al.  Optimal and Robust Transmit Designs for MISO Channel Secrecy by Semidefinite Programming , 2010, IEEE Transactions on Signal Processing.

[36]  Derrick Wing Kwan Ng,et al.  Robust Beamforming for Secure Communication in Systems With Wireless Information and Power Transfer , 2013, IEEE Transactions on Wireless Communications.

[37]  Qi Zhang,et al.  Optimal Power Allocation for Multicarrier Secure Communications in Full-Duplex Decode-and-Forward Relay Networks , 2014, IEEE Communications Letters.

[38]  Stéphane Y. Le Goff,et al.  Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Cooperative Jammer , 2015, IEEE Transactions on Vehicular Technology.

[39]  Muhammad R. A. Khandaker,et al.  Robust Power-Splitting SWIPT Beamforming for Broadcast Channels , 2016, IEEE Communications Letters.

[40]  Chong-Yung Chi,et al.  Outage Constrained Robust Transmit Optimization for Multiuser MISO Downlinks: Tractable Approximations by Conic Optimization , 2011, IEEE Transactions on Signal Processing.

[41]  Meixia Tao,et al.  Massive MIMO Multicasting in Noncooperative Cellular Networks , 2013, IEEE Journal on Selected Areas in Communications.

[42]  Stéphane Y. Le Goff,et al.  Secrecy rate optimization for a MIMO secrecy channel based on Stackelberg game , 2014, 2014 22nd European Signal Processing Conference (EUSIPCO).

[43]  Caijun Zhong,et al.  Robust Resource Allocation for Secrecy Wireless Powered Communication Networks , 2016, IEEE Communications Letters.

[44]  Daniel Pérez Palomar,et al.  Rank-Constrained Separable Semidefinite Programming With Applications to Optimal Beamforming , 2010, IEEE Transactions on Signal Processing.

[45]  Gordon P. Wright,et al.  Technical Note - A General Inner Approximation Algorithm for Nonconvex Mathematical Programs , 1978, Oper. Res..

[46]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[47]  A. Lee Swindlehurst,et al.  Detecting passive eavesdroppers in the MIMO wiretap channel , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).