Minimum Secrecy Throughput Maximization in Wireless Powered Secure Communications

This paper investigates a wireless powered secure communication network (WPSCN), in which the legitimate users have no constant energy supply and need to be wireless powered for information transmitting. The harvest-then-transmit protocol is adopted in the WPSCN, i.e., the energy access point (EAP) first transfers energy to legitimate users through energy beamforming, and then, the legitimate users transmit their data to the information access point (IAP) by time-division multiple access. Since an eavesdropper intercepts users’ uplink information, the EAP creates artificial noise to cripple the interception capability of the eavesdropper. For providing a secrecy throughput balancing across different legitimate users, we aim to maximize the minimum secrecy throughput of all users via time allocation, energy beamforming, and artificial noise design. To this end, a low-complexity two-stage algorithm is proposed. In the first stage, without taking into account the eavesdropper's wiretapping, we design time allocation and energy beamforming by solving the problem of minimum throughput maximization, which is convex and can be easily solved. In the second stage, two easily implementable strategies are proposed for artificial noise design so as to strengthen the noise power at the eavesdropper and simultaneously reduce the noise power at the IAP. Simulation results show that the performance of the proposed approach is close to the upper bound and not sensitive to scenario settings, which confirms the effectiveness of the proposed method.

[1]  Kee Chaing Chua,et al.  Multi-Antenna Wireless Powered Communication With Energy Beamforming , 2013, IEEE Transactions on Communications.

[2]  Meng Zhang,et al.  Artificial Noise Aided Secrecy Information and Power Transfer in OFDMA Systems , 2016, IEEE Transactions on Wireless Communications.

[3]  Lei Huang,et al.  Convexity of Fairness-Aware Resource Allocation in Wireless Powered Communication Networks , 2016, IEEE Communications Letters.

[4]  Derrick Wing Kwan Ng,et al.  Energy-Efficient Resource Allocation for Wireless Powered Communication Networks , 2015, IEEE Transactions on Wireless Communications.

[5]  Yong Liang Guan,et al.  Throughput Optimization for Massive MIMO Systems Powered by Wireless Energy Transfer , 2014, IEEE Journal on Selected Areas in Communications.

[6]  Caijun Zhong,et al.  Robust Resource Allocation for Secrecy Wireless Powered Communication Networks , 2016, IEEE Communications Letters.

[7]  Meng Zhang,et al.  Energy Harvesting for Physical-Layer Security in OFDMA Networks , 2015, IEEE Transactions on Information Forensics and Security.

[8]  Hyungsik Ju,et al.  Throughput Maximization in Wireless Powered Communication Networks , 2013, IEEE Trans. Wirel. Commun..

[9]  Yongming Huang,et al.  Secure Beamforming Design for SWIPT in MISO Broadcast Channel With Confidential Messages and External Eavesdroppers , 2016, IEEE Transactions on Wireless Communications.

[10]  Kyoung-Jae Lee,et al.  Resource Allocation Techniques for Wireless Powered Communication Networks With Energy Storage Constraint , 2015, IEEE Transactions on Wireless Communications.

[11]  Kyoung-Jae Lee,et al.  Sum-Rate Maximization for Multiuser MIMO Wireless Powered Communication Networks , 2016, IEEE Transactions on Vehicular Technology.

[12]  Rui Zhang,et al.  Wireless powered communication: opportunities and challenges , 2014, IEEE Communications Magazine.

[13]  Hyungsik Ju,et al.  Optimal Resource Allocation in Full-Duplex Wireless-Powered Communication Network , 2014, IEEE Transactions on Communications.

[14]  Xiaohu You,et al.  Asymptotically Optimal Power Allocation for Massive MIMO Wireless Powered Communications , 2016, IEEE Wireless Communications Letters.

[15]  Hsiao-Hwa Chen,et al.  Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges , 2017, IEEE Communications Surveys & Tutorials.

[16]  Lei Huang,et al.  On Convexity of Fairness-Aware Energy-Efficient Power Allocation in Spectrum-Sharing Networks , 2016, IEEE Communications Letters.

[17]  Hsiao-Chun Wu,et al.  Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.

[18]  Zhi Chen,et al.  MIMO Secret Communications Against an Active Eavesdropper , 2016, IEEE Transactions on Information Forensics and Security.

[19]  Rui Zhang,et al.  Placement Optimization of Energy and Information Access Points in Wireless Powered Communication Networks , 2015, IEEE Transactions on Wireless Communications.

[20]  Xuan Li,et al.  Joint Beamforming Design and Time Allocation for Wireless Powered Communication Networks , 2014, IEEE Communications Letters.

[21]  Kee Chaing Chua,et al.  Secrecy wireless information and power transfer with MISO beamforming , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).

[22]  Wei-Ping Zhu,et al.  Robust Cooperative Secure Beamforming for Simultaneous Wireless Information and Power Transfer in Amplify-and-Forward Relay Networks , 2017, IEEE Transactions on Vehicular Technology.

[23]  Kostas Berberidis,et al.  Security-Aware Max–Min Resource Allocation in Multiuser OFDMA Downlink , 2015, IEEE Transactions on Information Forensics and Security.

[24]  Sumei Sun,et al.  Optimal time allocation for dynamic-TDMA-based wireless powered communication networks , 2014, 2014 IEEE Global Communications Conference.

[25]  Zhengyu Zhu,et al.  Robust Optimization for AN-Aided Transmission and Power Splitting for Secure MISO SWIPT System , 2016, IEEE Communications Letters.

[26]  A. Lee Swindlehurst,et al.  Robust Secure Transmission in MISO Channels Based on Worst-Case Optimization , 2011, IEEE Transactions on Signal Processing.

[27]  Lei Huang,et al.  Time Allocation and Load Balancing in Multi-Cell Wireless Powered Communication Networks , 2016, IEEE Access.