Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 3/2017

13.10.2016

Robust beamforming and artificial noise design in interference networks with wireless information and power transfer

verfasst von: Yuan Ren, Hui Gao, Tiejun Lv

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 3/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this paper, the robust beamforming and artificial noise design is investigated in two-user interference networks with wireless information and power transfer. Specifically, we focus on the secure communication of the two pairs in the presence of an energy receiver (ER) which acts as the potential eavesdropper and intends to wiretap the confidential message transmitted to one of the information receivers (IRs). With only imperfect eavesdropper’s channel state information (ECSI) at the transmitters, our goal is to minimize the total transmit power, while guaranteeing the worst-case secrecy rate requirement at the wiretapped IR, the signal-to-interference-plus-noise ratio requirement at the wiretap-free IR and the energy harvesting requirement at the ER. In particular, we first model the imperfect ECSI in the sense of ellipsoidal uncertainties. Then, our design goal can be further reformulated as a two-stage optimization problem. With the help of rank relaxation and one-dimensional line search, the considered two-stage problem can be solved efficiently. Simulation results verify the effectiveness of the proposed design in different scenarios.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
The potential applications of our studied system are, e.g., wirelessly powered sensor networks [32], and/or cellular networks with densely deployed base stations, which have the dual functions of information and energy transmissions [21].
 
Literatur
1.
Zurück zum Zitat Shiu Y.-S., Chang S.-Y., Wu H.-C., Huang S.-H., Chen H.-H. (2011) Physical layer security in wireless networks: a tutorial. IEEE Wireless Commun 18(2):66–74CrossRef Shiu Y.-S., Chang S.-Y., Wu H.-C., Huang S.-H., Chen H.-H. (2011) Physical layer security in wireless networks: a tutorial. IEEE Wireless Commun 18(2):66–74CrossRef
2.
Zurück zum Zitat Zhang H., Cheng P., Shi L., Chen J. (2016) Optimal DoS attack scheduling in wireless networked control system. IEEE Trans Control Syst Technol 24(3):843–852CrossRef Zhang H., Cheng P., Shi L., Chen J. (2016) Optimal DoS attack scheduling in wireless networked control system. IEEE Trans Control Syst Technol 24(3):843–852CrossRef
4.
Zurück zum Zitat Khisti A., Wornell G. W (2007) The MIMOME channel in. Proc Allerton Conf Commun Contr Computing Monticello IL:1–8 Khisti A., Wornell G. W (2007) The MIMOME channel in. Proc Allerton Conf Commun Contr Computing Monticello IL:1–8
5.
Zurück zum Zitat Khisti A., Wornell G. W (2010) Secure transmission with multiple antennas I: the MISOME wiretap channel. IEEE Trans Inf Theory 56(7):3088–3104MathSciNetCrossRef Khisti A., Wornell G. W (2010) Secure transmission with multiple antennas I: the MISOME wiretap channel. IEEE Trans Inf Theory 56(7):3088–3104MathSciNetCrossRef
6.
Zurück zum Zitat Zhang H., Cheng P., Shi L., Chen J. (2015) Optimal denial-of-service attack scheduling with energy constraint. IEEE Trans Autom Control 60(11):3023–3028MathSciNetCrossRef Zhang H., Cheng P., Shi L., Chen J. (2015) Optimal denial-of-service attack scheduling with energy constraint. IEEE Trans Autom Control 60(11):3023–3028MathSciNetCrossRef
7.
Zurück zum Zitat Yang N., Suraweera H., Collings I., Yuen C. (2013) Physical layer security of TAS/MRC with antenna correlation. IEEE Trans Inf Forens Security 8(1):254–259CrossRef Yang N., Suraweera H., Collings I., Yuen C. (2013) Physical layer security of TAS/MRC with antenna correlation. IEEE Trans Inf Forens Security 8(1):254–259CrossRef
8.
Zurück zum Zitat Zhang J., Yuen C., Wen C. K., Jin S., Gao X. (2014) Ergodic secrecy sum-rate for multiuser downlink transmission via regularized channel inversion: Large system analysis. IEEE Commun Lett Zhang J., Yuen C., Wen C. K., Jin S., Gao X. (2014) Ergodic secrecy sum-rate for multiuser downlink transmission via regularized channel inversion: Large system analysis. IEEE Commun Lett
9.
Zurück zum Zitat Chen X., Lei L., Zhang H., Yuen C (2014) On the secrecy outage capacity of physical layer security in large-scale MIMO relaying systems with imperfect CSI in. Proc. IEEE ICC, Sydney, NSW Australia:1–6 Chen X., Lei L., Zhang H., Yuen C (2014) On the secrecy outage capacity of physical layer security in large-scale MIMO relaying systems with imperfect CSI in. Proc. IEEE ICC, Sydney, NSW Australia:1–6
10.
Zurück zum Zitat Chen X., Yuen C., Zhang Z. (2014) Exploiting large-scale MIMO techniques for physical layer security with imperfect CSI. in Proc. IEEE Globcom Chen X., Yuen C., Zhang Z. (2014) Exploiting large-scale MIMO techniques for physical layer security with imperfect CSI. in Proc. IEEE Globcom
11.
Zurück zum Zitat Dong L., Han Z., Petropulu A. P., Poor H. V. (2010) Improving wireless physical layer security via cooperating relays. IEEE Trans Signal Process 58(3):1875–1888MathSciNetCrossRef Dong L., Han Z., Petropulu A. P., Poor H. V. (2010) Improving wireless physical layer security via cooperating relays. IEEE Trans Signal Process 58(3):1875–1888MathSciNetCrossRef
12.
Zurück zum Zitat Krikidis I., Thompson J. S., McLaughlin S. (2009) Relay selection for secure cooperative networks with jamming. IEEE Trans Wireless Commun 8(10):5003–5011CrossRef Krikidis I., Thompson J. S., McLaughlin S. (2009) Relay selection for secure cooperative networks with jamming. IEEE Trans Wireless Commun 8(10):5003–5011CrossRef
13.
Zurück zum Zitat Chen J., Xu W., He S., Sun Y., Thulasiraman P., Shen X. (2010) Utility-based asynchronous flow control algorithm for wireless sensor networks. IEEE J Sel Areas Commun 28(7):1116–1126CrossRef Chen J., Xu W., He S., Sun Y., Thulasiraman P., Shen X. (2010) Utility-based asynchronous flow control algorithm for wireless sensor networks. IEEE J Sel Areas Commun 28(7):1116–1126CrossRef
14.
15.
Zurück zum Zitat Krikidis I., Timotheou S., Nikolaou S., Zheng G., Ng D. W. K., Schober R. (2014) Simultaneous wireless information and power transfer in modern communication systems,. IEEE Commun Mag 52(11):104–110CrossRef Krikidis I., Timotheou S., Nikolaou S., Zheng G., Ng D. W. K., Schober R. (2014) Simultaneous wireless information and power transfer in modern communication systems,. IEEE Commun Mag 52(11):104–110CrossRef
16.
Zurück zum Zitat Ding Z., Zhong C., Ng D. W. K., Peng M., Suraweera H. A., Schober R., Poor H. V. (2015) Application of smart antenna technologies in simultaneous wireless information and power transfer. IEEE Commun Mag 53(4):86–93CrossRef Ding Z., Zhong C., Ng D. W. K., Peng M., Suraweera H. A., Schober R., Poor H. V. (2015) Application of smart antenna technologies in simultaneous wireless information and power transfer. IEEE Commun Mag 53(4):86–93CrossRef
18.
Zurück zum Zitat Zhang R., Ho C. K. (2013) MIMO broadcasting for simultaneous wireless information and power transfer. IEEE Trans Wireless Commun 12:1989–2001CrossRef Zhang R., Ho C. K. (2013) MIMO broadcasting for simultaneous wireless information and power transfer. IEEE Trans Wireless Commun 12:1989–2001CrossRef
19.
Zurück zum Zitat Huang K., Larsson E. (2013) Simultaneous information and power transfer for broadband wireless systems. IEEE Trans Signal Process 61:5972–5986MathSciNetCrossRef Huang K., Larsson E. (2013) Simultaneous information and power transfer for broadband wireless systems. IEEE Trans Signal Process 61:5972–5986MathSciNetCrossRef
20.
Zurück zum Zitat Chen J., Yu Q., Cheng P., Sun Y., Fan Y., Shen X. (2011) Game theoretical approach for channel allocation in wireless sensor and actuator networks,. IEEE Trans Autom Control 56(10):2332–2344MathSciNetCrossRef Chen J., Yu Q., Cheng P., Sun Y., Fan Y., Shen X. (2011) Game theoretical approach for channel allocation in wireless sensor and actuator networks,. IEEE Trans Autom Control 56(10):2332–2344MathSciNetCrossRef
21.
Zurück zum Zitat Shi Q., Liu L., Xu W., Zhang R. (2014) Joint transmit beamforming and receive power splitting for MISO SWIPT systems. IEEE Trans Wireless Commun 13(6):3269–3280CrossRef Shi Q., Liu L., Xu W., Zhang R. (2014) Joint transmit beamforming and receive power splitting for MISO SWIPT systems. IEEE Trans Wireless Commun 13(6):3269–3280CrossRef
22.
Zurück zum Zitat Shi Q., Xu W., Chang T.-H., Wang Y., Song E. (2014) Joint beamforming and power splitting for MISO interference channel with SWIPT: an SOCP relaxation and decentralized algorithm. IEEE Trans Signal Process 62(23):6194–6208MathSciNetCrossRef Shi Q., Xu W., Chang T.-H., Wang Y., Song E. (2014) Joint beamforming and power splitting for MISO interference channel with SWIPT: an SOCP relaxation and decentralized algorithm. IEEE Trans Signal Process 62(23):6194–6208MathSciNetCrossRef
23.
Zurück zum Zitat Shi X., Anderson B. D. O., Mao G., Yang Z., Chen J., Lin Z. (2016) Robust localization using time difference of arrivals. IEEE Signal Process Lett. doi:10.1109/LSP.2016.2569666.. to be published Shi X., Anderson B. D. O., Mao G., Yang Z., Chen J., Lin Z. (2016) Robust localization using time difference of arrivals. IEEE Signal Process Lett. doi:10.​1109/​LSP.​2016.​2569666.​. to be published
24.
Zurück zum Zitat Leng S., Ng D. W. K., Schober R (2014) Power efficient and secure multiuser communication systems with wireless information and power transfer in Proc. IEEE ICC, Sydney, NSW. Australia:800–806 Leng S., Ng D. W. K., Schober R (2014) Power efficient and secure multiuser communication systems with wireless information and power transfer in Proc. IEEE ICC, Sydney, NSW. Australia:800–806
25.
Zurück zum Zitat Shi Q., Xu W., Wu J., Song E., Wang Y. (2015) Secure beamforming for MIMO broadcasting with wireless information and power transfer. IEEE Trans. Wireless Commun. 14(5):2841–2853CrossRef Shi Q., Xu W., Wu J., Song E., Wang Y. (2015) Secure beamforming for MIMO broadcasting with wireless information and power transfer. IEEE Trans. Wireless Commun. 14(5):2841–2853CrossRef
26.
Zurück zum Zitat Ng D. W. K., Lo E. S., Schober R. (2016) Multiobjective resource allocation for secure communication in cognitive radio networks with wireless information and power transfer. IEEE Trans Veh Technol 65(5):3166–3184CrossRef Ng D. W. K., Lo E. S., Schober R. (2016) Multiobjective resource allocation for secure communication in cognitive radio networks with wireless information and power transfer. IEEE Trans Veh Technol 65(5):3166–3184CrossRef
27.
Zurück zum Zitat Li Q., Zhang Q., Qin J. (2014) Secure relay beamforming for simultaneous wireless information and power transfer in nonregenerative relay networks. IEEE Trans Veh Technol 63 (5):2462–2467CrossRef Li Q., Zhang Q., Qin J. (2014) Secure relay beamforming for simultaneous wireless information and power transfer in nonregenerative relay networks. IEEE Trans Veh Technol 63 (5):2462–2467CrossRef
28.
Zurück zum Zitat Wu W., Wang B. (2015) Robust secrecy beamforming for wireless information and power transfer in multiuser MISO communication system,. Eurasip J Wireless Commun Networking 2015:161CrossRef Wu W., Wang B. (2015) Robust secrecy beamforming for wireless information and power transfer in multiuser MISO communication system,. Eurasip J Wireless Commun Networking 2015:161CrossRef
29.
Zurück zum Zitat Khandaker M. R. A., Wong K.-K. (2015) Masked beamforming in the presence of energy-harvesting eavesdroppers. IEEE Trans. Inf. Forensics Security 10(1):40–54CrossRef Khandaker M. R. A., Wong K.-K. (2015) Masked beamforming in the presence of energy-harvesting eavesdroppers. IEEE Trans. Inf. Forensics Security 10(1):40–54CrossRef
30.
Zurück zum Zitat Feng R., Li Q., Zhang Q., Qin J. (2015) Robust secure transmission in MISO simultaneous wireless information and power transfer system. IEEE Trans Veh Technol 64(1):400–405CrossRef Feng R., Li Q., Zhang Q., Qin J. (2015) Robust secure transmission in MISO simultaneous wireless information and power transfer system. IEEE Trans Veh Technol 64(1):400–405CrossRef
31.
Zurück zum Zitat Zhang J., Yuen C., Wen C.-K., Jin S., Wong K.-K., Zhu H. (2016) Large system secrecy rate analysis for SWIPT MIMO wiretap channels. IEEE Trans Inf Forensics Security 11(1):74–85CrossRef Zhang J., Yuen C., Wen C.-K., Jin S., Wong K.-K., Zhu H. (2016) Large system secrecy rate analysis for SWIPT MIMO wiretap channels. IEEE Trans Inf Forensics Security 11(1):74–85CrossRef
32.
Zurück zum Zitat Zhang Y., He S., Chen J. (2016) Data gathering optimization by dynamic sensing and routing in rechargeable sensor networks. IEEE/ACM Trans Netw 24(3):1632–1646CrossRef Zhang Y., He S., Chen J. (2016) Data gathering optimization by dynamic sensing and routing in rechargeable sensor networks. IEEE/ACM Trans Netw 24(3):1632–1646CrossRef
33.
34.
Zurück zum Zitat Boyd S., Vandenberghe L. (2004) Convex optimization. Cambridge. Cambridge University Press, U.K.CrossRefMATH Boyd S., Vandenberghe L. (2004) Convex optimization. Cambridge. Cambridge University Press, U.K.CrossRefMATH
35.
Zurück zum Zitat Grant M., Boyd S. (2010) CVX: Matlab software for disciplined convex programming, version 1.21 (2011),. Available: cvxr. com/cvx Grant M., Boyd S. (2010) CVX: Matlab software for disciplined convex programming, version 1.21 (2011),. Available: cvxr. com/cvx
36.
Zurück zum Zitat Horn R. A., Johnson C. R. (1990) Matrix Analysis. Cambridge. Cambridge University Press, U.K. Horn R. A., Johnson C. R. (1990) Matrix Analysis. Cambridge. Cambridge University Press, U.K.
37.
Zurück zum Zitat Luo Z., Ma W. K., So A. M.-C., Ye Y., Zhang S. (2010) Semidefinite relaxation of quadratic optimization problems. IEEE Signal Process Mag 27(3):20–34CrossRef Luo Z., Ma W. K., So A. M.-C., Ye Y., Zhang S. (2010) Semidefinite relaxation of quadratic optimization problems. IEEE Signal Process Mag 27(3):20–34CrossRef
38.
Zurück zum Zitat Ben-Tal A., Nemirovski A (2001) Lectures on Modern Convex Optimization: analysis, algorithms, and engineering applications. ser MPS-SIAM Series on Optimization Ben-Tal A., Nemirovski A (2001) Lectures on Modern Convex Optimization: analysis, algorithms, and engineering applications. ser MPS-SIAM Series on Optimization
39.
Zurück zum Zitat Timotheou S., Krikidis I., Zheng G., Ottersten B. (2014) Beamforming for MISO interference channels with QoS and RF energy transfer. IEEE Trans Wireless Commun 13(5):2646–2658CrossRef Timotheou S., Krikidis I., Zheng G., Ottersten B. (2014) Beamforming for MISO interference channels with QoS and RF energy transfer. IEEE Trans Wireless Commun 13(5):2646–2658CrossRef
Metadaten
Titel
Robust beamforming and artificial noise design in interference networks with wireless information and power transfer
verfasst von
Yuan Ren
Hui Gao
Tiejun Lv
Publikationsdatum
13.10.2016
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 3/2017
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-016-0509-5

Weitere Artikel der Ausgabe 3/2017

Peer-to-Peer Networking and Applications 3/2017 Zur Ausgabe