Joint Source and Relay Secure Beamforming for Nonregenerative MIMO Relay Systems With Wireless Information and Power Transfer

Simultaneous wireless information and power transfer (SWIPT) is able to prolong the lifetime of energy-constrained wireless networks. In this paper, we study the security issue of a nonregenerative multiple-input multiple-out (MIMO) relay system with SWIPT. When the full channel state information (CSI) of the eavesdropper is available, we aim to maximize the secrecy rate under the source and relay transmit power constraints and energy-harvesting (EH) constraints at the multiple EH receivers by jointly designing the source and relay beamforming matrices, which is a nonconvex optimization and is still an open problem. In order to enhance the secrecy rate effectively, we first transform the optimization into a difference of convex programming and propose a sequential parametric convex approximation-based iterative algorithm which is able to achieve a local optimum. To reduce the complexity, we also propose a singular value decomposition (SVD)-generalized SVD-based method to simplify the optimization into a joint source and relay power allocation problem. The alternating optimization is employed to find a suboptimal solution of the joint power allocation problem. When the CSI of the eavesdropper is unknown, we propose an artificial-noise (AN) aided joint source and relay beamforming scheme, which can maximize the AN power to jam the eavesdropper under the limited source and relay transmit power and satisfy the quality of service of the receiver. Simulation results have shown the effectiveness of our proposed schemes.

[1]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2007, IEEE Transactions on Information Theory.

[2]  Chengwen Xing,et al.  MIMO Beamforming Designs With Partial CSI Under Energy Harvesting Constraints , 2013, IEEE Signal Processing Letters.

[3]  J. Dunn Rates of convergence for conditional gradient algorithms near singular and nonsingular extremals , 1978 .

[4]  Lav R. Varshney,et al.  Transporting information and energy simultaneously , 2008, 2008 IEEE International Symposium on Information Theory.

[5]  J. Magnus,et al.  Matrix Differential Calculus with Applications in Statistics and Econometrics , 1991 .

[6]  Rui Zhang,et al.  MIMO Broadcasting for Simultaneous Wireless Information and Power Transfer , 2013 .

[7]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[8]  Meixia Tao,et al.  Robust Beamforming for Wireless Information and Power Transmission , 2012, IEEE Wireless Communications Letters.

[9]  Xiangfeng Wang,et al.  Joint Power Splitting and Secure Beamforming Design in the Multiple Non-Regenerative Wireless-Powered Relay Networks , 2015, IEEE Communications Letters.

[10]  Wing-Kin Ma,et al.  Optimum Performance Boundaries of OSTBC Based AF-MIMO Relay System With Energy Harvesting Receiver , 2013, IEEE Transactions on Signal Processing.

[11]  Kai-Kit Wong,et al.  To Harvest and Jam: A Paradigm of Self-Sustaining Friendly Jammers for Secure AF Relaying , 2015, IEEE Transactions on Signal Processing.

[12]  Qi Zhang,et al.  Beamforming in Non-Regenerative Two-Way Multi-Antenna Relay Networks for Simultaneous Wireless Information and Power Transfer , 2014, IEEE Transactions on Wireless Communications.

[13]  Derrick Wing Kwan Ng,et al.  Robust Beamforming for Secure Communication in Systems With Wireless Information and Power Transfer , 2013, IEEE Transactions on Wireless Communications.

[14]  Yue Rong,et al.  Joint Source and Relay Optimization for Two-Way Linear Non-Regenerative MIMO Relay Communications , 2012, IEEE Transactions on Signal Processing.

[15]  A. Lee Swindlehurst,et al.  Fixed SINR solutions for the MIMO wiretap channel , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.

[16]  R. Horst,et al.  DC Programming: Overview , 1999 .

[17]  Kee Chaing Chua,et al.  Secrecy wireless information and power transfer with MISO beamforming , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).

[18]  Olav Tirkkonen,et al.  Device-to-Device Communication Underlaying Cellular Communications Systems , 2009, Int. J. Commun. Netw. Syst. Sci..

[19]  Bin Zhu,et al.  Rank-Two Beamformed Secure Multicasting for Wireless Information and Power Transfer , 2014, IEEE Signal Processing Letters.

[20]  Charles R. Johnson,et al.  Matrix analysis , 1985, Statistical Inference for Engineers and Data Scientists.

[21]  Tamás Terlaky,et al.  Interior Point Methods for Nonlinear Optimization , 2010 .

[22]  Xiangyun Zhou,et al.  Pilot Contamination for Active Eavesdropping , 2012, IEEE Transactions on Wireless Communications.

[23]  Zhu Han,et al.  On the Resilience of Wireless Multiuser Networks to Passive and Active Eavesdroppers , 2013, IEEE Journal on Selected Areas in Communications.

[24]  Amir Beck,et al.  A sequential parametric convex approximation method with applications to nonconvex truss topology design problems , 2010, J. Glob. Optim..

[25]  Bayan S. Sharif,et al.  Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Multiple-Antenna Eavesdropper , 2014, IEEE Transactions on Vehicular Technology.

[26]  A. Lee Swindlehurst,et al.  Cooperative Jamming for Secure Communications in MIMO Relay Networks , 2011, IEEE Transactions on Signal Processing.

[27]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2007, ISIT.

[28]  Feng Liu,et al.  Joint Source-Relay Precoding and Power Allocation for Secure Amplify-and-Forward MIMO Relay Networks , 2014, IEEE Transactions on Information Forensics and Security.

[29]  Anant Sahai,et al.  Shannon meets Tesla: Wireless information and power transfer , 2010, 2010 IEEE International Symposium on Information Theory.

[30]  Xianda Zhang,et al.  Secure Relay Beamforming With Imperfect Channel Side Information , 2013, IEEE Transactions on Vehicular Technology.

[31]  Stéphane Y. Le Goff,et al.  Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Cooperative Jammer , 2015, IEEE Transactions on Vehicular Technology.

[32]  R. Stephenson A and V , 1962, The British journal of ophthalmology.

[33]  Yimin Zhang,et al.  Simultaneous transfer of energy and information for MIMO-OFDM relay system , 2012, 2012 1st IEEE International Conference on Communications in China (ICCC).

[34]  Yurii Nesterov,et al.  Interior-point polynomial algorithms in convex programming , 1994, Siam studies in applied mathematics.

[35]  Qi Zhang,et al.  Secure Relay Beamforming for SWIPT in Amplify-and-Forward Two-Way Relay Networks , 2016, IEEE Transactions on Vehicular Technology.

[36]  J. Dunn Convergence Rates for Conditional Gradient Sequences Generated by Implicit Step Length Rules , 1980 .

[37]  A. Lee Swindlehurst,et al.  Detecting passive eavesdroppers in the MIMO wiretap channel , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[38]  Eduard A. Jorswieck,et al.  Secrecy Outage in MISO Systems With Partial Channel Information , 2012, IEEE Transactions on Information Forensics and Security.

[39]  Wei Guan,et al.  Joint MMSE Transceiver Design in Non-Regenerative MIMO Relay Systems , 2008, IEEE Communications Letters.