Robust Secrecy Rate Beamforming for Multi-cell Networks with TS-based Information and Energy Harvesting

نویسندگان

  • Hoang Duong Tuan
  • Ali A. Nasir
  • Trung Quang Duong
چکیده

Next-generation communication networks are positively looking towards the energy-efficient transfer of information and energy over the same wireless channel. Thus, users would be able to receive information and harvest energy. However, under the requirement of smaller base station (BS)-to-users (UEs) distances and higher received power levels, the physical layer will become more vulnerable to cyber attacks by potential multi-antenna eavesdroppers. To realize secure wireless information and power transfer, we consider transmit time-switching (TS) mode, where energy and information signal are transmitted separately in time by the BS. Such protocol is not only quite easier to implement than the receive power splitting (PS) approach but also delivers the opportunity of multi-purpose beamforming, where energy beamformers during wireless power transfer are useful in jamming the eavesdropper. In the presence of imperfect channel estimation and multi-antenna eavesdroppers, the energy and information beamformers and the transmit TS ratio are jointly optimized to maximize the worst-case user secrecy rate subject to UEs’ harvested energy thresholds and BS transmit power budget. This secrecy rate optimization problem is very complicated due many computationally challenging constraints. A new robust path-following algorithm for its computational solution is proposed, which involves one simple convex quadratic program (QP) at A. A. Nasir is with the Department of Electrical Engineering, King Fahd University of Petroleum and Minerals (KFUPM), Dhahran, Saudi Arabia (Email: [email protected]). H. D. Tuan is with the Faculty of Engineering and Information Technology, University of Technology Sydney, Broadway, NSW 2007, Australia (email: [email protected]). T. Q. Duong is with Queen’s University Belfast, Belfast BT7 1NN, UK (email: [email protected]) H. V. Poor is with the Department of Electrical Engineering, Princeton University, Princeton, NJ 08544, USA (e-mail: [email protected]). ar X iv :1 61 1. 05 99 2v 2 [ cs .I T ] 1 4 D ec 2 01 6

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Beamforming and Antenna Grouping Design for the Multi-Antenna Relay with Energy Harvesting to Improve Secrecy Rate

Abstract: The physical security strategy in the wireless network with a single-antenna eavesdropper is studied. The information transmits from a single-antenna source to a single-antenna destination, and an energy-limited multi-antenna relay is employed to forward information. The antennas of the relay are divided into two groups. One group receives and forwards information, and the other conve...

متن کامل

Robust Max-Min Fairness Energy Harvesting in Secure MISO Cognitive Radio With SWIPT

A multiple-input single-output cognitive radio downlink network is studied with simultaneous wireless information and power transfer. In this network, a secondary user coexists with multiple primary users and multiple energy harvesting receivers. In order to guarantee secure communication and energy harvesting, the problem of robust secure artificial noiseaided beamforming and power splitting d...

متن کامل

Optimal Transmit Beamforming for Secure SWIPT in Heterogeneous Networks

This letter investigates the artificial noise aided beamforming design for secure simultaneous wireless information and power transfer (SWIPT) in a two-tier downlink heterogeneous network, where one femtocell is overlaid with one macrocell in co-channel deployment. Each energy receiver (ER) in femtocell can be considered as a potential eavesdropper for messages intended for information receiver...

متن کامل

Nonorthogonal Multiple Access for Beamforming in Energy-Harvesting Enabled Networks

Wireless power transfer via radio-frequency (RF) radiation is regarded as a potential solution to energize energy-constrained users, who are deployed close to the base stations (near-by users). However, energy transfer requires much more transmit power than normal information transfer, which makes it very challenging to provide the quality of service in terms of throughput for all near-by users...

متن کامل

Quality of Protection in Cloud-Assisted Cognitive Machine-to-Machine Communications for Industrial Systems

Cloud-assisted cognitive machine-to-machine communications (CM2M) is a new paradigm to improve the mobile services, which have drawn considerable attention in industry and academia. In this paper, we consider the quality of protection (QoP) of information transmission in cloud-assisted CM2M communications. In such an environment, the secondary M2M system intends to share the primary spectrum on...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1611.05992  شماره 

صفحات  -

تاریخ انتشار 2016