Relay Cooperative Beamforming Algorithm Based on Probabilistic Constraint in SWIPT Secrecy Networks

We explore physical layer security of simultaneous wireless information and power transfer (SWIPT) relay network in this paper. Modeling channel error between relay and eavesdroppers (Eves) as random channel state information (CSI) error, we present an algorithm to optimize secret rate of SWIPT in the constraints of relay forward power, receiver signal-to-interference-plus-noise ratio (SINR) and Eves SINR. A slack variable is introduced to decompose original non-convex problem into upper and lower sub-problems, meanwhile, Bernstein-type inequality is used to convert probability constraint of lower sub-problems to linear matrix inequality constraints. Simulation experiments show that the proposed algorithm obtains higher secret rate than that of zero-forcing algorithm and worst-case algorithm.

[1]  Kee Chaing Chua,et al.  Secrecy wireless information and power transfer with MISO beamforming , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).

[2]  Feng Shu,et al.  Covert Transmission With a Self-Sustained Relay , 2018, IEEE Transactions on Wireless Communications.

[3]  Zouheir Rezki,et al.  Energy Efficient Resource Allocation for Cognitive Radios: A Generalized Sensing Analysis , 2015, IEEE Transactions on Wireless Communications.

[4]  Inkyu Lee,et al.  Outage Constrained Robust Beamforming for Secure Broadcasting Systems With Energy Harvesting , 2016, IEEE Transactions on Wireless Communications.

[5]  Rui Zhang,et al.  Wireless Powered Cooperative Jamming for Secrecy Multi-AF Relaying Networks , 2015, IEEE Transactions on Wireless Communications.

[6]  Rui Zhang,et al.  MIMO Broadcasting for Simultaneous Wireless Information and Power Transfer , 2011, IEEE Transactions on Wireless Communications.

[7]  Xiaobo Zhou,et al.  Robust Beamforming Design for Secure DM-Based Relay Networks With Self-Sustained Jammers , 2019, IEEE Access.

[8]  Bin Li,et al.  Probabilistic-constrained robust secure transmission for energy harvesting over MISO channels , 2017, Science China Information Sciences.

[9]  Jeffrey G. Andrews,et al.  The Guard Zone in Wireless Ad hoc Networks , 2007, IEEE Transactions on Wireless Communications.

[10]  Yaming Wang,et al.  Secure Beamforming for MIMO Broadcasting With Wireless Information and Power Transfer , 2014, IEEE Transactions on Wireless Communications.

[11]  Yi Hong,et al.  On the Performance of Low-Altitude UAV-Enabled Secure AF Relaying With Cooperative Jamming and SWIPT , 2019, IEEE Access.

[12]  S. Zionts,et al.  Programming with linear fractional functionals , 1968 .

[13]  Qiang Li,et al.  Cooperative Secure Beamforming for AF Relay Networks With Multiple Eavesdroppers , 2013, IEEE Signal Processing Letters.

[14]  Derrick Wing Kwan Ng,et al.  Practical Non-Linear Energy Harvesting Model and Resource Allocation for SWIPT Systems , 2015, IEEE Communications Letters.

[15]  A. Lee Swindlehurst,et al.  Detecting passive eavesdroppers in the MIMO wiretap channel , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[16]  Tiejun Lv,et al.  Secure Wireless Information and Power Transfer in Heterogeneous Networks , 2017, IEEE Access.

[17]  Hsiao-Hwa Chen,et al.  Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges , 2017, IEEE Communications Surveys & Tutorials.

[18]  Anant Sahai,et al.  Shannon meets Tesla: Wireless information and power transfer , 2010, 2010 IEEE International Symposium on Information Theory.

[19]  Lajos Hanzo,et al.  Cooperative Secure Transmission Relying on Optimal Power Allocation in the Presence of Untrusted Relays, A Passive Eavesdropper and Hardware Impairments , 2019, IEEE Access.

[20]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[21]  Phee Lep Yeoh,et al.  Covert Communication and Secure Transmission Over Untrusted Relaying Networks in the Presence of Multiple Wardens , 2020, IEEE Transactions on Communications.

[22]  Chong-Yung Chi,et al.  Outage Constrained Robust Transmit Optimization for Multiuser MISO Downlinks: Tractable Approximations by Conic Optimization , 2011, IEEE Transactions on Signal Processing.

[23]  Zhu Han,et al.  Wireless Networks With RF Energy Harvesting: A Contemporary Survey , 2014, IEEE Communications Surveys & Tutorials.

[24]  Lav R. Varshney,et al.  Transporting information and energy simultaneously , 2008, 2008 IEEE International Symposium on Information Theory.

[25]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[26]  H. Vincent Poor,et al.  Fundamentals of Wireless Information and Power Transfer: From RF Energy Harvester Models to Signal and System Designs , 2018, IEEE Journal on Selected Areas in Communications.

[27]  Yan Zhang,et al.  Secure Transmission for Heterogeneous Cellular Networks With Wireless Information and Power Transfer , 2018, IEEE Systems Journal.