Computer Science ›› 2020, Vol. 47 ›› Issue (6): 316-321.doi: 10.11896/jsjkx.190500115

• Information Security • Previous Articles    

Study on Secure Beamforming for Full-duplex Energy Harvesting Relaying System

CHEN Pei-pei1, LI Tao-shen1, FANG Xing2, WANG Zhe3   

  1. 1 School of Computer and Electronic Information,Guangxi University,Nanning 530004,China
    2 College of Electronic Engineering,Beijing University of Posts and Telecommunications,Beijing 100876,China
    3 College of Electrical Engineering,Guangxi University,Nanning 530004,China
  • Received:2019-05-21 Online:2020-06-15 Published:2020-06-10
  • About author:CHEN Pei-pei,born in 1993,postgra-duate.Her research interests include energy harvest wireless network and physical layer.
    LI Tao-shen,born in 1957,Ph.D,professor.His research interests include computer network,network computing and information security.
  • Supported by:
    This work was supported by the National Natural Science Foundation of China (61762010)

Abstract: The optimization of secrecy rate is studied in the full-duplex relay-eavesdropper channel in which the nodes harvest energy.For guaranteeing the secure communications,an artificial noise aided secure beamforming design is proposed under simultaneous wireless information and power transfer method.An optimization problem is considered aiming to maximize the secrecy rate (SRM) of the system by jointly optimizing the beamforming matrix,artificial noise covariance matrix and the power splitting ration at the relay subject to the transmission power and energy harvesting requirement for relay.Because this problem is a non-convex secrecy rate maximization problem,the objective problem is decoupled into two subproblems.First,this paper recasts this SRM as a two-level optimization problem to optimize the beamforming matrix and artificial noise covariance matrix.The outer optimization problem is solved by one-dimensional search,and the inner optimization problem is solved by semidefinite relaxation technique.Then,it fixes the value of beamforming matrix and artificial noise covariance matrix,and once again uses the one-dimensional search to solve the power splitting ration.Theoretical derivation proves that there always exists a rank-one optimal solution for the SDR problem,the relaxation technique adopted is tight.The simulation results show that the proposed method can effectively improve the security performance of the system by 2 to 3 times.

Key words: Artificial noise, Beamforming, Energy harvesting, Full-duplex, Physical layer security, Simultaneous wireless information and power transfer

CLC Number: 

  • TP391
[1]ZOU Y L,ZHU J,WANG X B,et al.A survey on wireless security:Technical challenges,recent advances,and future trends [C]//Proceedings of IEEE.2016:1-39.
[2]KRIKIDIS I,THOMPSON J S,MCLAUGHLIN S.Relay selection for secure cooperative networks with jamming [J].IEEE Transactions on Wireless Communications,2009,8(10):5003-5011.
[3]LIU G,YU F R,JI H,et al.In-Band Full-Duplex Relaying:A Survey,Research Issues and Challenges[J].IEEE Communications Surveys & Tutorials,2017,17(2):500-524.
[4]ZHANG Z S,KEPING L,VASILAKOS A V,et al.Full-Duplex Wireless Communications:Challenges,Solutions,and Future Research Directions[C]//Proceedings of the IEEE.2016:1369-1409.
[5]RIIHONEN T,WERNER S,WICHMAN R.Mitigation of Loopback Self-Interference in Full-Duplex MIMO Relays [J].IEEE Transactions on Signal Processing,2011,59(12):5983-5993.
[6]LI Q,YANG Y,MA W K,et al.Robust Cooperative Beamforming and Artificial Noise Design for Physical-Layer Secrecy in AF Multi-Antenna Multi-Relay Networks [J].IEEE Transactions on Signal Processing,2015,63(1):206-220.
[7]SUN Y,NG D W K,ZHU J,et al.Multi-Objective Optimization for Robust Power Efficient and Secure Full-Duplex Wireless Communication Systems[J].IEEE Transactions on Wireless Communications,2016,15(8):5511-5526.
[8]LI Q,HAN D.Sum secrecy rate maximization for full-duplex two-way relay networks[C]//2016 IEEE International Confe-rence on Acoustics,Speech and Signal Processing (ICASSP).IEEE,2016,10(8):1359-1374.
[9]ULUKUS S,YENER A,ERKIP E.Energy Harvesting Wireless Communications:A Review of Recent Advances[J].IEEE Journal.on Selected Areas in Communications,2015,33(3):360-381.
[10]LU X,WANG P,NIYATO D,et al.Wireless Networks With RF Energy Harvesting:A Contemporary Survey [J].IEEE Communications Surveys & Tutorials,2015,17(2):757-789.
[11]ÖZLEM T D,TUNCER T E.Robust Optimum and Near-Optimum Beamformers for Decode-and-Forward Full-Duplex Multi-Antenna Relay With Self-Energy Recycling[J].IEEE Transactions on Wireless Communications,2019,18(3):1566-1580.
[12]LI Q,MA W K,SO M C.Robust artificial noise-aided transmit optimization for achieving secrecy and energy harvesting[C]//IEEE International Conference on Acoustics.IEEE,2014.
[13]ZHAO M,WANG X,FENG S.Joint Power Splitting and Secure Beamforming Design in the Multiple Non-regenerative Wireless-powered Relay Networks[J].IEEE Communications Letters,2015,19(9):1540-1543.
[14]LI B,FEI Z,CHEN H.Robust Artificial Noise-Aided Secure Beamforming in Wireless-Powered Non-Regenerative Relay Networks[J].IEEE Access,2016,4:7921-7928.
[15]JIANG L,TIAN H,QIN C,et al.Secure Beamforming in Wireless-Powered Cooperative Cognitive Radio Networks[J].IEEE Communications Letters,2016,20(3):522-525.
[16]ZENG Y,ZHANG R.Full-Duplex Wireless-Powered Relay With Self-Energy Recycling [J].IEEE Wireless Communications Letters,2015,4(2):201-204.
[17]FENG Y,YANG Z,ZHU W P,et al.Robust Cooperative Secure Beamforming for Simultaneous Wireless Information and Power Transfer in Amplify-and-Forward Relay Networks [J].IEEE Transactions on Vehicular Technology,2017,66(3):2354-2366.
[18]ZHANG L J,JIN L,LIU L,et al.Artificial noise aided secure beamforming for muli-antenna relay systems [J].Journal on Communications,2014,35(11):81-88.
[19]LUO Z Q,MA W K,SO M C,et al.Semidefinite Relaxation of Quadratic Optimization Problems [J].IEEE Signal Processing Magazine,2010,27(3):20-34.
[20]ROSTAMPOOR J,RAZAVIZADEH S M,LEE I.Energy Efficient Precoding Design for SWIPT in MIMO Two-Way Relay Networks[J].IEEE Transactions on Vehicular Technology,2017,66(9):7888-7896.
[21]GRANT M,BOYD S.Matlab software for disciplined convex programming,CVX,Austin,TX,USA[OL].http://cvxr.com/cvx.
[1] SHAN Yong-feng, JIANG Rui, XU You-yun, LI Da-peng. Power Consumption Scheme Oriented to Full-duplex Multi-relay Cooperative SWIPT Networks [J]. Computer Science, 2022, 49(7): 280-286.
[2] SHEN Jia-fang, QIAN Li-ping, YANG Chao. Non-orthogonal Multiple Access and Multi-dimension Resource Optimization in EH Relay NB-IoT Networks [J]. Computer Science, 2022, 49(5): 279-286.
[3] WANG Ying-kai, WANG Qing-shan. Reinforcement Learning Based Energy Allocation Strategy for Multi-access Wireless Communications with Energy Harvesting [J]. Computer Science, 2021, 48(7): 333-339.
[4] GUAN Zheng, LYU Wei, JIA Yao, YANG Zhi-jun. Research on Two-level Scheduled In-band Full-duplex Media Access Control Mechanism [J]. Computer Science, 2021, 48(11A): 464-470.
[5] DING Qing-feng, XI Tao, LIAN Yi-chong, WU Ze-xiang. Antenna Selection for Spatial Modulation Based on Physical Layer Security [J]. Computer Science, 2020, 47(7): 322-327.
[6] JIANG Rui, YIN Hui, XU You-yun. Millimeter Wave Based Adaptive Multi-beamforming Scheme for High-speed Railway Vehicle- ground Communications [J]. Computer Science, 2020, 47(6): 266-270.
[7] XI Chen-jing,GAO Yuan-yuan,SHA Nan. Performance Study on Constellation Obfuscation Design Method for Physical Layer Security [J]. Computer Science, 2020, 47(3): 304-311.
[8] TIAN Xian-zhong, YAO Chao, ZHAO Chen, DING Jun. 5G Network-oriented Mobile Edge Computation Offloading Strategy [J]. Computer Science, 2020, 47(11A): 286-290.
[9] LI Zheng-yang, TAO Yang, ZHOU Yuan-lin, YANG Liu. Energy-balanced Multi-hop Cluster Routing Protocol Based on Energy Harvesting [J]. Computer Science, 2020, 47(11A): 296-302.
[10] CHI Kai-kai, XU Xing-yuan, HU Ping. RF Energy Source Deployment Schemes Maximizing Total Energy Harvesting Power [J]. Computer Science, 2019, 46(9): 120-124.
[11] WANG Chen-yang, LIN Hui. Three-dimensional Geographic Opportunistic Routing Based on Energy Harvesting Wireless Sensor Networks [J]. Computer Science, 2019, 46(6A): 305-308.
[12] PENG Lei, ZANG Guo-zhen, GAO Yuan-yuan, SHA Nan, XI Chen-jing, JIANG Xuan-you. Research and Application of LMS Adaptive Interference Cancellation in Physical Layer SecurityCommunication System Based on Artifical Interference [J]. Computer Science, 2019, 46(6): 168-173.
[13] YAO Xin-wei, ZHANG Meng-na, WANG Wan-liang, YANG Shuang-hua. Optimal Energy Allocation Algorithm with Energy Harvesting and Hybrid Energy Storage for Microscale Wireless Networks [J]. Computer Science, 2018, 45(8): 75-79.
[14] CHI Kai-kai ,WEI Xin-chen, LIN Yi-min. High-throughput and Load-balanced Node Access Scheme for RF-energy Harvesting Wireless Sensor Networks [J]. Computer Science, 2018, 45(8): 119-124.
[15] CHI Kai-kai, XU Xin-chen, WEI Xin-chen. Minimal Base Stations Deployment Scheme Satisfying Node Throughput Requirement in Radio Frequency Energy Harvesting Wireless Sensor Networks [J]. Computer Science, 2018, 45(6A): 332-336.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!