DCA approaches for simultaneous wireless information power transfer in MISO secrecy channel

  • PDF / 1,818,282 Bytes
  • 25 Pages / 439.37 x 666.142 pts Page_size
  • 50 Downloads / 228 Views

DOWNLOAD

REPORT


DCA approaches for simultaneous wireless information power transfer in MISO secrecy channel Phuong Anh Nguyen1 · Hoai An Le Thi1 Received: 2 February 2020 / Revised: 3 October 2020 / Accepted: 6 October 2020 © Springer Science+Business Media, LLC, part of Springer Nature 2020

Abstract This paper addresses the emerging practical requirement that wireless information and power transfer are employed simultaneously in a multiple-input single-output (MISO) secrecy channel. Transmit beamforming without artificial noise and that with artificial noise are considered. In addition, perfect and imperfect channel state information of both the legitimate receivers and eavesdroppers are investigated. These four scenarios correspond to four optimization problems. The considered problems aim to maximize the secrecy rate with constraints on the transmit power and the harvested energy at each receiver. Since these optimization problems are nonconvex, we propose the efficient algorithms based on Difference of Convex (DC) functions programming and DC Algorithm (DCA )—an innovative approach in nonconvex optimization. Exploiting the special structure of these problems, we utilize the semidefinite relaxation technique and S-procedure to reformulate them as general DC programs. The efficient algorithms based on general DCA are developed to solve the corresponding general DC programs. Numerical results are presented which illustrate the effectiveness of our proposed algorithms, they outperform the existing approaches in terms of both quality and rapidity. Keywords  DC programming · DCA · Physical layer security · Artificial noise · Beamforming · SWIPT

1 Introduction As an effective solution to cope with the energy scarcity, simultaneous wireless information and power transfer (SWIPT) technology has attracted much research attention recently. The essence of SWIPT is exploiting the features of radio signals for carrying energy and information in the meantime (Lu et  al. 2015). To guarantee the performance of SWIPT systems, the transmitter needs to raise the * Phuong Anh Nguyen phuong‑anh.nguyen@univ‑lorraine.fr 1



Computer Science and Applications Department, University of Lorraine, Metz, France

13

Vol.:(0123456789)



P. A. Nguyen, H. A. Le Thi

information-bearing signal power which would lead to risk of information leakage (Chen et al. 2016). Besides, energy receivers are normally located near the transmitter to meet energy requirements (Liu et al. 2014). These may cause the secrecy rate to fall below zero since energy receiver can be potential eavesdroppers (Zou et al. 2013a, b). Hence, security in SWIPT systems is a critical issue and severer than conventional wireless networks. Physical layer security was proven to ensure secrecy for wireless information transmission (Wyner 1975). The secure SWIPT system was original studied by Ng and Schober (2013) and has become a trend recently. Some secure information transmission schemes in SWIPT systems were studied in Liu et  al. (2014), Ng and Schober (2013), Ng et  al. (2013), Zhao et