3 research outputs found
A SIMPLE BEAMFORMING DESIGN FOR SECURE IN MIMO SWIPT SYSTEM
This paper investigates the beamforming design for secure transmission in multiple-input multiple-output (MIMO) communication systems with simultaneous wireless information and power transfer (SWIPT), where the energy harvesting (EH) receivers may eavesdrop the confidential information send to the information decode (ID) receiver. To solve the non-convex problem, we propose a simple solution, which is to chose a beamforming matrix part first, then find the rest of the beamforming matrix by solving the convex problem. Finally, numerical results are provided to validate our proposed algorithm
Secure Simultaneous Information and Power Transfer for Downlink Multi-user Massive MIMO
In this paper, downlink secure transmission in simultaneous information and
power transfer (SWIPT) system enabled with massive multiple-input
multiple-output (MIMO) is studied. A base station (BS) with a large number of
antennas transmits energy and information signals to its intended users, but
these signals are also received by an active eavesdropper. The users and
eavesdropper employ a power splitting technique to simultaneously decode
information and harvest energy. Massive MIMO helps the BS to focus energy to
the users and prevent information leakage to the eavesdropper. The harvested
energy by each user is employed for decoding information and transmitting
uplink pilot signals for channel estimation. It is assumed that the active
eavesdropper also harvests energy in the downlink and then contributes during
the uplink training phase. Achievable secrecy rate is considered as the
performance criterion and a closed-form lower bound for it is derived. To
provide secure transmission, the achievable secrecy rate is then maximized
through an optimization problem with constraints on the minimum harvested
energy by the user and the maximum harvested energy by the eavesdropper.
Numerical results show the effectiveness of using massive MIMO in providing
physical layer security in SWIPT systems and also show that our closed-form
expressions for the secrecy rate are accurate