Robust Secure Wireless Powered MISO Cognitive Mobile Edge Computing

Wireless power transfer (WPT) and cognitive radio (CR) are two promising techniques in designing mobile-edge computing (MEC) systems. In this paper, we study a robust secure wireless powered multiple-input single-output (MISO) cognitive MEC system, which integrates several techniques: physical-layer security, WPT, CR, underlay spectrum sharing and MEC. Three optimization problems are formulated to minimize the total transmission power (TTP) of the primary transmitter (PT) and the secondary base station (SBS) under perfect channel state information (CSI) model, bounded CSI error model and the probabilistic CSI error model, respectively. The formulated problems are nonconvex and hard to solve. Three two-phase iterative optimization algorithms combined with Lagrangian dual, semidefinite relaxation (SDR), S-Procedure and Bernstein-type inequalities are proposed to jointly optimize the beamforming vectors of the PT and the SBS, the central processing unit (CPU) frequency and the transmit power of the MD. Simulation results are provided to verify the effectiveness of the proposed algorithms.

[1]  Joseph Mitola,et al.  Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..

[2]  Kai-Kit Wong,et al.  Wireless Powered Cooperation-Assisted Mobile Edge Computing , 2018, IEEE Transactions on Wireless Communications.

[3]  Yuan Liu,et al.  Secure Beamforming for Untrusted MISO Cognitive Radio Networks , 2018, IEEE Transactions on Wireless Communications.

[4]  Rui Zhang,et al.  Placement Optimization of Energy and Information Access Points in Wireless Powered Communication Networks , 2015, IEEE Transactions on Wireless Communications.

[5]  Fuhui Zhou,et al.  Energy-Efficient Cooperation in Mobile Edge Computing-Enabled Cognitive Radio Networks , 2019, IEEE Access.

[6]  Shuguang Cui,et al.  Joint offloading and computing optimization in wireless powered mobile-edge computing systems , 2017, 2017 IEEE International Conference on Communications (ICC).

[7]  Ying Jun Zhang,et al.  Computation Rate Maximization for Wireless Powered Mobile-Edge Computing With Binary Computation Offloading , 2017, IEEE Transactions on Wireless Communications.

[8]  Hong Ji,et al.  Distributed Resource Allocation and Computation Offloading Scheme for Cognitive Mobile Edge Computing Networks with NOMA , 2018, 2018 IEEE/CIC International Conference on Communications in China (ICCC).

[9]  Dong Wang,et al.  Enhancing Information Security via Physical Layer Approaches in Heterogeneous IoT With Multiple Access Mobile Edge Computing in Smart City , 2019, IEEE Access.

[10]  Chong-Yung Chi,et al.  Outage Constrained Robust Transmit Optimization for Multiuser MISO Downlinks: Tractable Approximations by Conic Optimization , 2011, IEEE Transactions on Signal Processing.

[11]  Guangyue Lu,et al.  Wireless Powered Cognitive-Based Mobile Edge Computing With Imperfect Spectrum Sensing , 2019, IEEE Access.

[12]  Yuanming Shi,et al.  Computation offloading in cloud-RAN based mobile cloud computing system , 2016, 2016 IEEE International Conference on Communications (ICC).

[13]  Shuzhong Zhang,et al.  New results on Hermitian matrix rank-one decomposition , 2011, Math. Program..

[14]  Simon Haykin,et al.  Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.

[15]  Zhi-Quan Luo,et al.  Semidefinite Relaxation of Quadratic Optimization Problems , 2010, IEEE Signal Processing Magazine.

[16]  Shuai Ma,et al.  Chance Constrained Robust Beamforming in Cognitive Radio Networks , 2013, IEEE Communications Letters.

[17]  Dario Pompili,et al.  Joint Task Offloading and Resource Allocation for Multi-Server Mobile-Edge Computing Networks , 2017, IEEE Transactions on Vehicular Technology.

[18]  Rose Qingyang Hu,et al.  Computation Rate Maximization in UAV-Enabled Wireless-Powered Mobile-Edge Computing Systems , 2018, IEEE Journal on Selected Areas in Communications.

[19]  Mohsen Guizani,et al.  Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.

[20]  Yijie Zhong,et al.  Secure Computation Efficiency Maximization in NOMA-Enabled Mobile Edge Computing Networks , 2019, IEEE Access.

[21]  Boyang Liu,et al.  Secure MISO Cognitive-Based Mobile Edge Computing With Wireless Power Transfer , 2020, IEEE Access.

[22]  Fuhui Zhou,et al.  Robust AN-Aided Beamforming and Power Splitting Design for Secure MISO Cognitive Radio With SWIPT , 2016, IEEE Transactions on Wireless Communications.

[23]  Shuai Ma,et al.  Outage Constrained Robust Secure Transmission for MISO Wiretap Channels , 2013, IEEE Transactions on Wireless Communications.

[24]  Yanhua Zhang,et al.  Joint Resource Management in Cognitive Radio and Edge Computing Based Industrial Wireless Networks , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[25]  Richeng Jin,et al.  Physical-Layer Assisted Privacy-Preserving Offloading in Mobile-Edge Computing , 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).

[26]  Haijian Sun,et al.  Robust Beamforming Design in a NOMA Cognitive Radio Network Relying on SWIPT , 2018, IEEE Journal on Selected Areas in Communications.

[27]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[28]  Chong-Yung Chi,et al.  Probabilistic SINR constrained robust transmit beamforming: A Bernstein-type inequality based conservative approach , 2010, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[29]  Ying-Chang Liang,et al.  State of the Art, Taxonomy, and Open Issues on Cognitive Radio Networks with NOMA , 2018, IEEE Wireless Communications.