Secrecy Rate Optimization for RF Powered Two-Hop Untrusted Relay Networks with Non-Linear EH Model

In this letter, we investigate the secure transmission in radio frequency (RF) powered two-hop untrusted relay networks, where the source node and untrusted relay are both wireless powered by an RF power supplier. Specifically, considering the non-linear energy-harvesting (EH) model, the two-process communication protocol is proposed. The secrecy rate is maximized by jointly designing the beamforming vector at source and beamforming matrix at relay, under the constraints of transmit power at RF power supplier and destination. The secrecy rate maximization (SRM) is non-convex, hence we propose an alternative optimization (AO) based iterative algorithm. Numerical results demonstrate that the proposed scheme can significantly increase the secrecy rate compared to the baseline schemes. key words: RF powered networks, non-linear EH model, untrusted relay, secrecy rate, physical layer security

[1]  Fuhui Zhou,et al.  Robust AN-Aided Beamforming Design for Secure MISO Cognitive Radio Based on a Practical Nonlinear EH Model , 2017, IEEE Access.

[2]  Anant Sahai,et al.  Shannon meets Tesla: Wireless information and power transfer , 2010, 2010 IEEE International Symposium on Information Theory.

[3]  Min Dong,et al.  Online Joint Power Control for Two-Hop Wireless Relay Networks With Energy Harvesting , 2018, IEEE Transactions on Signal Processing.

[4]  Yuzhen Huang,et al.  Robust Energy Efficiency Optimization for Secure MIMO SWIPT Systems With Non-Linear EH Model , 2017, IEEE Communications Letters.

[5]  Derrick Wing Kwan Ng,et al.  Practical Non-Linear Energy Harvesting Model and Resource Allocation for SWIPT Systems , 2015, IEEE Communications Letters.

[6]  Cheng Wang,et al.  Power Allocation and Performance Analysis of Cooperative Spatial Modulation in Wireless Relay Networks , 2018, IEEE Access.

[7]  Stephen P. Boyd,et al.  Disciplined Convex Programming , 2006 .

[8]  Theodoros A. Tsiftsis,et al.  Secrecy Rate-Optimum Energy Splitting for an Untrusted and Energy Harvesting Relay Network , 2018, IEEE Access.

[9]  Il-Min Kim,et al.  Joint Secure Beamforming Design at the Source and the Relay for an Amplify-and-Forward MIMO Untrusted Relay System , 2012, IEEE Transactions on Signal Processing.

[10]  Qi Zhang,et al.  Secure Relay Beamforming for SWIPT in Amplify-and-Forward Two-Way Relay Networks , 2016, IEEE Transactions on Vehicular Technology.

[11]  Xiaofeng Tao,et al.  Secure Transmission in SWIPT-Powered Two-Way Untrusted Relay Networks , 2018, IEEE Access.

[12]  Alan J. Laub,et al.  Matrix analysis - for scientists and engineers , 2004 .

[13]  Vipul Gupta,et al.  On Secure Communication Using RF Energy Harvesting Two-Way Untrusted Relay , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[14]  Rose Qingyang Hu,et al.  Wireless Powered Sensor Networks for Internet of Things: Maximum Throughput and Optimal Power Allocation , 2018, IEEE Internet of Things Journal.

[15]  Emre Telatar,et al.  Capacity of Multi-antenna Gaussian Channels , 1999, Eur. Trans. Telecommun..

[16]  Amir Beck,et al.  A sequential parametric convex approximation method with applications to nonconvex truss topology design problems , 2010, J. Glob. Optim..