Energy Efficiency Optimization for Secure Transmission in MISO Cognitive Radio Network With Energy Harvesting

In this paper, we investigate different secrecy energy efficiency (SEE) optimization problems in a multiple-input single-output underlay cognitive radio (CR) network in the presence of an energy harvesting receiver. In particular, these energy efficient designs are developed with different assumptions of channels state information (CSI) at the transmitter, namely perfect CSI, statistical CSI and imperfect CSI with bounded channel uncertainties. In particular, the overarching objective here is to design a beamforming technique maximizing the SEE while satisfying all relevant constraints linked to interference and harvested energy between transmitters and receivers. We show that the original problems are non-convex and their solutions are intractable. By using a number of techniques, such as non-linear fractional programming and difference of concave (DC) functions, we reformulate the original problems so as to render them tractable. We then combine these techniques with the Dinkelbach’s algorithm to derive iterative algorithms to determine relevant beamforming vectors which lead to the SEE maximization. In doing this, we investigate the robust design with ellipsoidal bounded channel uncertainties, by mapping the original problem into a sequence of semidefinite programs by employing the semidefinite relaxation, non-linear fractional programming and S-procedure. Furthermore, we show that the maximum SEE can be achieved through a search algorithm in the single dimensional space. Numerical results, when compared with those obtained with existing techniques in the literature, show the effectiveness of the proposed designs for SEE maximization.

[1]  Alister G. Burr,et al.  Secrecy rate maximization for MISO multicasting SWIPT system with power splitting scheme , 2016, 2016 IEEE 17th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).

[2]  Quanzhong Li,et al.  Robust Optimization for Energy Efficiency in MIMO Two-Way Relay Networks With SWIPT , 2020, IEEE Systems Journal.

[3]  George K. Karagiannidis,et al.  Secure Communications With Cooperative Jamming: Optimal Power Allocation and Secrecy Outage Analysis , 2017, IEEE Transactions on Vehicular Technology.

[4]  Ekram Hossain,et al.  Evolution toward 5G multi-tier cellular wireless networks: An interference management perspective , 2014, IEEE Wireless Communications.

[5]  Victor C. M. Leung,et al.  Resource Allocation for Secure MISO-NOMA Cognitive Radios Relying on SWIPT , 2018, 2018 IEEE International Conference on Communications (ICC).

[6]  Stéphane Y. Le Goff,et al.  Signal Mapping for Bit-Interleaved Coded Modulation Schemes to Achieve Secure Communications , 2015, IEEE Wireless Communications Letters.

[7]  Fuhui Zhou,et al.  Enhancing PHY Security of MISO NOMA SWIPT Systems with a Practical Non-Linear EH Model , 2018, 2018 IEEE International Conference on Communications Workshops (ICC Workshops).

[8]  Leila Musavian,et al.  Joint Beamforming and User Maximization Techniques for Cognitive Radio Networks Based on Branch and Bound Method , 2010, IEEE Transactions on Wireless Communications.

[9]  Mazen O. Hasna,et al.  Physical Layer Security for TAS/MRC Systems With and Without Co-Channel Interference Over $\eta$–$\mu$ Fading Channels , 2018, IEEE Transactions on Vehicular Technology.

[10]  Inkyu Lee,et al.  Beamforming and Power Splitting Designs for AN-Aided Secure Multi-User MIMO SWIPT Systems , 2017, IEEE Transactions on Information Forensics and Security.

[11]  Norman C. Beaulieu,et al.  Energy-Efficient Optimal Power Allocation for Fading Cognitive Radio Channels: Ergodic Capacity, Outage Capacity, and Minimum-Rate Capacity , 2016, IEEE Transactions on Wireless Communications.

[12]  Bruno Clerckx,et al.  Communications and Signals Design for Wireless Power Transmission , 2016, IEEE Transactions on Communications.

[13]  Quanzhong Li,et al.  Beamforming for Cooperative Secure Transmission in Cognitive Two-Way Relay Networks , 2020, IEEE Transactions on Information Forensics and Security.

[14]  Guoan Zhang,et al.  Optimal Transceiver Designs for Wireless-Powered Full-Duplex Two-Way Relay Networks With SWIPT , 2017, IEEE Access.

[15]  Tianjia Sun,et al.  Wireless Power Transfer for Medical Microsystems , 2013 .

[16]  Leila Musavian,et al.  SINR Balancing Technique for Downlink Beamforming in Cognitive Radio Networks , 2010, IEEE Signal Processing Letters.

[17]  Charles R. Johnson,et al.  Matrix analysis , 1985, Statistical Inference for Engineers and Data Scientists.

[18]  Rose Qingyang Hu,et al.  An energy efficient and spectrum efficient wireless heterogeneous network framework for 5G systems , 2014, IEEE Communications Magazine.

[19]  K. Philips,et al.  A self-calibrating RF energy harvester generating 1V at −26.3 dBm , 2013, 2013 Symposium on VLSI Circuits.

[20]  Alister G. Burr,et al.  On Energy Harvesting of Hybrid TDMA-NOMA Systems , 2019, 2019 IEEE Global Communications Conference (GLOBECOM).

[21]  Abraham Charnes,et al.  Programming with linear fractional functionals , 1962 .

[22]  Octavia A. Dobre,et al.  A Multiobjective Optimization Approach for Optimal Link Adaptation of OFDM-Based Cognitive Radio Systems with Imperfect Spectrum Sensing , 2014, IEEE Transactions on Wireless Communications.

[23]  Derrick Wing Kwan Ng,et al.  Simultaneous wireless information and power transfer in modern communication systems , 2014, IEEE Communications Magazine.

[24]  Alister G. Burr,et al.  Robust Beamforming for AN Aided MISO SWIPT System with Unknown Eavesdroppers and Non-Linear EH Model , 2018, 2018 IEEE Globecom Workshops (GC Wkshps).

[25]  Inkyu Lee,et al.  Joint optimization of AN-aided beamforming and power splitting designs for MISO secrecy channel with SWIPT , 2016, 2016 IEEE International Conference on Communications (ICC).

[26]  Aharon Ben-Tal,et al.  Lectures on modern convex optimization , 1987 .

[27]  Alister G. Burr,et al.  Energy Efficient Beamforming Design for MISO Non-Orthogonal Multiple Access Systems , 2019, IEEE Transactions on Communications.

[28]  Caijun Zhong,et al.  Wireless Information and Power Transfer With Full Duplex Relaying , 2014, IEEE Transactions on Communications.

[29]  Chong-Yung Chi,et al.  Outage Constrained Robust Transmit Optimization for Multiuser MISO Downlinks: Tractable Approximations by Conic Optimization , 2011, IEEE Transactions on Signal Processing.

[30]  Le Thi Hoai An,et al.  Recent Advances in DC Programming and DCA , 2013, Trans. Comput. Collect. Intell..

[31]  Fei Yuan,et al.  Multi-Objective Resource Allocation in a NOMA Cognitive Radio Network With a Practical Non-Linear Energy Harvesting Model , 2018, IEEE Access.

[32]  Quang Duong,et al.  Wireless Information and Power Transfer: Theory and Practice , 2019 .

[33]  Alister G. Burr,et al.  Secure energy efficiency optimization for MISO cognitive radio network with energy harvesting , 2017, 2017 9th International Conference on Wireless Communications and Signal Processing (WCSP).

[34]  Zhi Chen,et al.  Robust energy-efficient transmit design for misome wiretap channels , 2016, 2016 IEEE Global Conference on Signal and Information Processing (GlobalSIP).

[35]  Werner Dinkelbach On Nonlinear Fractional Programming , 1967 .

[36]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[37]  A. Lee Swindlehurst,et al.  Detecting passive eavesdroppers in the MIMO wiretap channel , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[38]  Adnan Yazici,et al.  Robust Design for MISO SWIPT System with Artificial Noise and Cooperative Jamming , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[39]  Derrick Wing Kwan Ng,et al.  Robust Resource Allocation for MIMO Wireless Powered Communication Networks Based on a Non-Linear EH Model , 2016, IEEE Transactions on Communications.

[40]  Anant Sahai,et al.  Shannon meets Tesla: Wireless information and power transfer , 2010, 2010 IEEE International Symposium on Information Theory.

[41]  Erik G. Larsson,et al.  Energy Efficiency of the Cell-Free Massive MIMO Uplink With Optimal Uniform Quantization , 2019, IEEE Transactions on Green Communications and Networking.

[42]  H. Vincent Poor,et al.  Secrecy Rate Optimization for Secure Multicast Communications , 2016, IEEE Journal of Selected Topics in Signal Processing.

[43]  Inkyu Lee,et al.  Secure Beamforming Designs for Secrecy MIMO SWIPT Systems , 2018, IEEE Wireless Communications Letters.

[44]  Derrick Wing Kwan Ng,et al.  Practical Non-Linear Energy Harvesting Model and Resource Allocation for SWIPT Systems , 2015, IEEE Communications Letters.

[45]  Stéphane Y. Le Goff,et al.  Secrecy Rate Optimizations for a MISO Secrecy Channel with Multiple Multiantenna Eavesdroppers , 2016, IEEE Transactions on Wireless Communications.

[46]  Derrick Wing Kwan Ng,et al.  Robust beamforming for SWIPT systems with non-linear energy harvesting model , 2016, 2016 IEEE 17th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).

[47]  Rose Qingyang Hu,et al.  Energy-Efficient Resource Sharing for Mobile Device-to-Device Multimedia Communications , 2014, IEEE Transactions on Vehicular Technology.

[48]  Xiang Li,et al.  Optimal Energy-Efficient Transmission in Multiuser Systems with Hybrid Energy Harvesting Transmitter , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[49]  Lajos Hanzo,et al.  Artificial Noise Aided Secure Cognitive Beamforming for Cooperative MISO-NOMA Using SWIPT , 2018, IEEE Journal on Selected Areas in Communications.

[50]  Zhi Chen,et al.  Outage Constrained Robust Energy Efficiency Optimization for MISO Wiretap Channels , 2017, 2017 IEEE 85th Vehicular Technology Conference (VTC Spring).

[51]  Hsiao-Hwa Chen,et al.  Energy-Spectrum Efficiency Tradeoff for Video Streaming over Mobile Ad Hoc Networks , 2013, IEEE Journal on Selected Areas in Communications.

[52]  K. Cumanan,et al.  SINR Balancing Technique and its Comparison to Semidefinite Programming Based QoS Provision for Cognitive Radios , 2009, VTC Spring 2009 - IEEE 69th Vehicular Technology Conference.

[53]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[54]  Zhu Han,et al.  Achieving High Energy Efficiency and Physical-Layer Security in AF Relaying , 2016, IEEE Transactions on Wireless Communications.

[55]  Zhilan Xiong,et al.  Multiuser spatial multiplexing techniques with constraints on interference temperature for cognitive radio networks , 2010 .

[56]  Hani Mehrpouyan,et al.  Beamforming for Simultaneous Wireless Information and Power Transfer in Two-Way Relay Channels , 2016, IEEE Access.

[57]  Ruiyang Xu,et al.  Outage Constrained Robust Transmit Design for Secure Cognitive Radio With Practical Energy Harvesting , 2018, IEEE Access.

[58]  Xinyu Da,et al.  Energy Efficiency Design for Secure MISO Cognitive Radio Network Based on a Nonlinear EH Model , 2018 .

[59]  Derrick Wing Kwan Ng,et al.  Multiobjective Resource Allocation for Secure Communication in Cognitive Radio Networks With Wireless Information and Power Transfer , 2016, IEEE Transactions on Vehicular Technology.

[60]  Bayan S. Sharif,et al.  Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Multiple-Antenna Eavesdropper , 2014, IEEE Transactions on Vehicular Technology.

[61]  K. Cumanan,et al.  A New Design Paradigm for MIMO Cognitive Radio with Primary User Rate Constraint , 2012, IEEE Communications Letters.

[62]  Octavia A. Dobre,et al.  Energy Efficiency–Spectral Efficiency Tradeoff: A Multiobjective Optimization Approach , 2016, IEEE Transactions on Vehicular Technology.

[63]  Octavia A. Dobre,et al.  Joint Information and Jamming Beamforming for Secrecy Rate Maximization in Cognitive Radio Networks , 2016, IEEE Transactions on Information Forensics and Security.

[64]  George K. Karagiannidis,et al.  Physical Layer Security Jamming: Theoretical Limits and Practical Designs in Wireless Networks , 2017, IEEE Access.

[65]  Arkadi Nemirovski,et al.  Lectures on modern convex optimization - analysis, algorithms, and engineering applications , 2001, MPS-SIAM series on optimization.

[66]  Hubregt J. Visser,et al.  RF Energy Harvesting and Transport for Wireless Sensor Network Applications: Principles and Requirements , 2013, Proceedings of the IEEE.

[67]  Stéphane Y. Le Goff,et al.  Robust Outage Secrecy Rate Optimizations for a MIMO Secrecy Channel , 2015, IEEE Wireless Communications Letters.

[68]  Octavia A. Dobre,et al.  Robust Energy-Efficient Design for MISO Non-Orthogonal Multiple Access Systems , 2019, IEEE Transactions on Communications.

[69]  Stéphane Y. Le Goff,et al.  Simultaneous Wireless Information Power Transfer for MISO Secrecy Channel , 2015, IEEE Transactions on Vehicular Technology.

[70]  E. Yaz Linear Matrix Inequalities In System And Control Theory , 1998, Proceedings of the IEEE.

[71]  Inkyu Lee,et al.  Robust Designs of Beamforming and Power Splitting for Distributed Antenna Systems With Wireless Energy Harvesting , 2018, IEEE Systems Journal.

[72]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[73]  Mani B. Srivastava,et al.  Emerging techniques for long lived wireless sensor networks , 2006, IEEE Communications Magazine.

[74]  Zhi Chen,et al.  Energy efficiency optimization for MISO wiretap channels with statistical and imperfect CSI , 2017, 2017 IEEE 18th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).

[75]  Zhiguo Ding,et al.  Robust secrecy rate optimisations for multiuser multiple-input-single-output channel with device-to-device communications , 2015, IET Commun..

[76]  Shuguang Cui,et al.  Joint offloading and computing optimization in wireless powered mobile-edge computing systems , 2017, 2017 IEEE International Conference on Communications (ICC).

[77]  Tharmalingam Ratnarajah,et al.  Beamforming Design for Full-Duplex MIMO Interference Channels–QoS and Energy-Efficiency Considerations , 2016, IEEE Transactions on Communications.

[78]  Lav R. Varshney,et al.  Transporting information and energy simultaneously , 2008, 2008 IEEE International Symposium on Information Theory.

[79]  K. Cumanan,et al.  Limited Feedback Scheme for Device-to-Device Communications in 5G Cellular Networks with Reliability and Cellular Secrecy Outage Constraints , 2017, IEEE Transactions on Vehicular Technology.

[80]  Yiyang Pei,et al.  Secure communication over MISO cognitive radio channels , 2010, IEEE Transactions on Wireless Communications.

[81]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.