Energy-Efficient and Secure Beamforming for Self-Sustainable Relay-Aided Multicast Networks

The relay-aided multicast network is considered, where an NT -antenna source multicasts confidential messages to N single-antenna legitimate users via a self-sustainable M-antenna regenerative relay. In particular, the relay is powered by the energy harvested from the radio signal of the source, and there are K unauthorized eavesdroppers wiretapping the channel. Assuming the knowledge of statistical channel state information of eavesdroppers, we aim to minimize the source transmission power via energy-efficient beamforming, subject to the signal-to-noise ratios of legitimate users/relay, the power constraint at the relay, and the outage constraints of the eavesdroppers. An efficient algorithm is developed by using the iterative first-order Taylor expansion and successive convex approximation, where the original nonconvex problem is transformed and solved.

[1]  Bo Hu,et al.  Joint transceiver design for simultaneous wireless information and power transfer in multi-user MIMO interference networks , 2014, 2014 Sixth International Conference on Wireless Communications and Signal Processing (WCSP).

[2]  J. Magnus,et al.  Matrix Differential Calculus with Applications in Statistics and Econometrics , 1991 .

[3]  Derrick Wing Kwan Ng,et al.  Secure layered transmission in multicast systems with wireless information and power transfer , 2013, 2014 IEEE International Conference on Communications (ICC).

[4]  Antti Tölli,et al.  Fast Converging Algorithm for Weighted Sum Rate Maximization in Multicell MISO Downlink , 2012, IEEE Signal Processing Letters.

[5]  Derrick Wing Kwan Ng,et al.  Resource allocation for secure communication in systems with wireless information and power transfer , 2013, 2013 IEEE Globecom Workshops (GC Wkshps).

[6]  H. Vincent Poor,et al.  Power Allocation Strategies in Energy Harvesting Wireless Cooperative Networks , 2013, IEEE Transactions on Wireless Communications.

[7]  Kee Chaing Chua,et al.  Wireless Information and Power Transfer: A Dynamic Power Splitting Approach , 2013, IEEE Transactions on Communications.

[8]  Bo Hu,et al.  Optimal Transceiver Design for SWIPT in $K$-User MIMO Interference Channels , 2016, IEEE Transactions on Wireless Communications.

[9]  Tiejun Lv,et al.  Secrecy communication of wireless information and power transfer system with green relay , 2015, 2015 IEEE International Conference on Communication Workshop (ICCW).

[10]  Muhammad R. A. Khandaker,et al.  SWIPT in MISO Multicasting Systems , 2014, IEEE Wireless Communications Letters.

[11]  Hongbo Zhu,et al.  Large System Secrecy Rate Analysis for SWIPT MIMO Wiretap Channels , 2016, IEEE Transactions on Information Forensics and Security.

[12]  Hsiao-Hwa Chen,et al.  Secrecy wireless information and power transfer: challenges and opportunities , 2015, IEEE Wireless Communications.

[13]  Sriram Vishwanath,et al.  On the secrecy rate of interference networks using structured codes , 2009, 2009 IEEE International Symposium on Information Theory.

[14]  Derrick Wing Kwan Ng,et al.  Power efficient and secure multiuser communication systems with wireless information and power transfer , 2014, 2014 IEEE International Conference on Communications Workshops (ICC).

[15]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.