42 research outputs found

    Robust Secrecy Beamforming for MIMO SWIPT with Probabilistic Constraints

    Get PDF
    This paper considers simultaneous wireless information apower transfer (SWIPT) in a multiple-input multiple-output (MIMO) wiretapnd power transfer (SWIPT) in a multiple-input multiple-output (MIMO) wiretap channel with energy harvesting receivers. The main objective is to keep the probability of the legitimate user's achievable secrecy rate outage as well as the energy receivers' harvested energy outage as caused by CSI uncertainties below given thresholds. This probabilistic-constrained secrecy rate maximization problem presents a significant analytical and computational challenge since any closed-form for the probabilistic constraints with log-det functions is intractable. In this paper, we address this challenging issue using codeviation inequalitiesnvex restrictions. In particular, we derive decomposition-based large deviation inequalities to transform the probabilistic constraints into second-order cone (SOC) constraints which are easier to handle. Then we show that a robust safe solution can be obtained through solving two convex sub-problems in an alternating fashion

    Probabilistically Robust SWIPT for Secrecy MISOME Systems

    Get PDF
    This paper considers simultaneous wireless information and power transfer (SWIPT) in a multiple-input single-output (MISO) downlink system consisting of one multi-antenna transmitter, one single-antenna information receiver (IR), multiple multi-antenna eavesdroppers (Eves) and multiple single-antenna energy-harvesting receivers (ERs). The main objective is to keep the probability of the legitimate user's achievable secrecy rate outage as well as the ERs' harvested energy outage caused by channel state information (CSI) uncertainties below some prescribed thresholds. As is well known, the secrecy rate outage constraints present a significant analytical and computational challenge. Incorporating the energy harvesting (EH) outage constraints only intensifies that challenge. In this paper, we address this challenging issue using convex restriction approaches which are then proved to yield rank-one optimal beamforming solutions. Numerical results reveal the effectiveness of the proposed schemes.Comment: This is an open access article accepted for publication as a regular paper in the IEEE Transactions on Information Forensics & Security. Copyright (c) 2016 IEEE. Personal use of this material is permitted. However, permission to use this material for any other purposes must be obtained from the IEEE by sending a request to [email protected]

    Transmit optimization techniques for physical layer security

    Get PDF
    PhD ThesisOver the last several decades, reliable communication has received considerable attention in the area of dynamic network con gurations and distributed processing techniques. Traditional secure communications mainly considered transmission cryptography, which has been developed in the network layer. However, the nature of wireless transmission introduces various challenges of key distribution and management in establishing secure communication links. Physical layer security has been recently recognized as a promising new design paradigm to provide security in wireless networks in addition to existing conventional cryptographic methods, where the physical layer dynamics of fading channels are exploited to establish secure wireless links. On the other hand, with the ever-increasing demand of wireless access users, multi-antenna transmission has been considered as one of e ective approaches to improve the capacity of wireless networks. Multi-antenna transmission applied in physical layer security has extracted more and more attentions by exploiting additional degrees of freedom and diversity gains. In this thesis, di erent multi-antenna transmit optimization techniques are developed for physical layer secure transmission. The secrecy rate optimization problems (i.e., power minimization and secrecy rate maximization) are formulated to guarantee the optimal power allocation. First, transmit optimization for multiple-input single-output (MISO) secrecy channels are developed to design secure transmit beamformer that minimize the transmit power to achieve a target secrecy rate. Besides, the associated robust scheme with the secrecy rate outage probability constraint are presented with statistical channel uncertainty, where the outage probability constraint requires that the achieved secrecy rate exceeds certain thresholds with a speci c probability. Second, multiantenna cooperative jammer (CJ) is presented to provide jamming services that introduces extra interference to assist a multiple-input multipleoutput (MIMO) secure transmission. Transmit optimization for this CJaided MIMO secrecy channel is designed to achieve an optimal power allocation. Moreover, secure transmission is achieved when the CJ introduces charges for its jamming service based on the amount of the interference caused to the eavesdropper, where the Stackelberg game is proposed to handle, and the Stackelberg equilibrium is analytically derived. Finally, transmit optimization for MISO secure simultaneous wireless information and power transfer (SWIPT) is investigated, where secure transmit beamformer is designed with/without the help of arti - cial noise (AN) to maximize the achieved secrecy rate such that satisfy the transmit power budget and the energy harvesting (EH) constraint. The performance of all proposed schemes are validated by MATLAB simulation results

    Robust Transmit Beamforming for SWIPT-Enabled Cooperative NOMA with Channel Uncertainties

    Get PDF
    In this paper, we study the robust beamforming design for a simultaneous wireless information and power transfer (SWIPT) enabled system, with cooperative nonorthogonal multiple access (NOMA) protocol applied. A novel cooperative NOMA scheme is proposed, where the strong user with better channel conditions adopts power splitting (PS) scheme and acts as an energy-harvesting relay to transmit information to the weak user. The presence of channel uncertainties is considered and incorporated in our formulations to improve the design robustness and communication reliability. Specifically, only imperfect channel state information (CSI) is assumed to be available at the base station (BS), due to the reason that the BS is far away from both users and suffers serious feedback delay. To comprehensively address the channel uncertainties, two major design criteria are adopted, which are the outage-based constraint design and the worst-case based optimization. Then, our aim is to maximize the strong user’s data rate, by optimally designing the robust transmit beamforming and PS ratio, while guaranteeing the correct decoding of the weak user. With two different channel uncertainty models respectively incorporated, the proposed formulations yield to challenging nonconvex optimization problems. For the outage-based constrained optimization, we first conservatively approximate the probabilistic constraints with the Bernstein-type inequalities, which are then globally solved by two-dimensional exhaustive search. To further reduce the complexity, an efficient low-complexity algorithm is then proposed with the aid of successive convex approximation (SCA). For the worst-case based scenario, we firstly apply semidefinite relaxation (SDR) method to relax the quadratic terms and prove the rank-one optimality. Then the nonconvex max-min optimization problem is readily transformed into convex approximations based on S-procedure and SCA. Simulation results show that for both channel uncertainty models, the proposed algorithms can converge within a few iterations, and the proposed SWIPT-enabled robust cooperative NOMA system achieves better system performance than existing protocols

    Transmitter Optimization Techniques for Physical Layer Security

    Get PDF
    Information security is one of the most critical issues in wireless networks as the signals transmitted through wireless medium are more vulnerable for interception. Although the existing conventional security techniques are proven to be safe, the broadcast nature of wireless communications introduces different challenges in terms of key exchange and distributions. As a result, information theoretic physical layer security has been proposed to complement the conventional security techniques for enhancing security in wireless transmissions. On the other hand, the rapid growth of data rates introduces different challenges on power limited mobile devices in terms of energy requirements. Recently, research work on wireless power transfer claimed that it has been considered as a potential technique to extend the battery lifetime of wireless networks. However, the algorithms developed based on the conventional optimization approaches often require iterative techniques, which poses challenges for real-time processing. To meet the demanding requirements of future ultra-low latency and reliable networks, neural network (NN) based approach can be employed to determine the resource allocations in wireless communications. This thesis developed different transmission strategies for secure transmission in wireless communications. Firstly, transmitter designs are focused in a multiple-input single-output simultaneous wireless information and power transfer system with unknown eavesdroppers. To improve the performance of physical layer security and the harvested energy, artificial noise is incorporated into the network to mask the secret information between the legitimate terminals. Then, different secrecy energy efficiency designs are considered for a MISO underlay cognitive radio network, in the presence of an energy harvesting receiver. In particular, these designs are developed with different channel state information assumptions at the transmitter. Finally, two different power allocation designs are investigated for a cognitive radio network to maximize the secrecy rate of the secondary receiver: conventional convex optimization framework and NN based algorithm

    Physical Layer Service Integration in 5G: Potentials and Challenges

    Full text link
    High transmission rate and secure communication have been identified as the key targets that need to be effectively addressed by fifth generation (5G) wireless systems. In this context, the concept of physical-layer security becomes attractive, as it can establish perfect security using only the characteristics of wireless medium. Nonetheless, to further increase the spectral efficiency, an emerging concept, termed physical-layer service integration (PHY-SI), has been recognized as an effective means. Its basic idea is to combine multiple coexisting services, i.e., multicast/broadcast service and confidential service, into one integral service for one-time transmission at the transmitter side. This article first provides a tutorial on typical PHY-SI models. Furthermore, we propose some state-of-the-art solutions to improve the overall performance of PHY-SI in certain important communication scenarios. In particular, we highlight the extension of several concepts borrowed from conventional single-service communications, such as artificial noise (AN), eigenmode transmission etc., to the scenario of PHY-SI. These techniques are shown to be effective in the design of reliable and robust PHY-SI schemes. Finally, several potential research directions are identified for future work.Comment: 12 pages, 7 figure

    Resource allocation and secure communication design in simultaneous wireless information and power transfer systems

    Get PDF
    Radio frequency (RF) energy transfer techniques have been regarded as the key enabling solutions to supply continuous and stable energy for the energy-constrained wireless devices. Simultaneous wireless information and power transfer (SWIPT) has been developed as a more promising RF energy transfer technique since it enables wireless information and wireless energy to access users from a same transmitted signal. Therefore, SWIPT has received remarkable attention. This thesis provides an investigation on applications and security issues of this emerging technology in various wireless communication scenarios. First, this thesis examines the application of SWIPT to a multi-user cooperative network in which the amplify-and-forward (AF) relay protocol is employed at the multi-antenna relay. A power splitting (PS) receiver architecture is utilized at each destination node to implement energy harvesting (EH) and information decoding (ID) simultaneously. The aim of this chapter is to minimize the relay transmit power by jointly designing relay beamforming vectors and PS ratios based on channel uncertainty models. The non-convex problem is converted into a semidefinite programming (SDP) problem by using the semidefinite relaxation (SDR) approach. In addition, a rank-one proof presents that the solution generated by the relaxed problem is optimal to the original problem. Second, a security issue about the SWIPT system is investigated in a cooperative network in the presence of potential eavesdroppers. The AF relay protocol and a PS receiver architecture are adopted at the multi-antenna relay and the desired destination node, respectively. Based on the system setup and the assumption of perfect channel state information (CSI), a transmit power minimization problem combined with the secrecy rate and harvested energy constraints is proposed to jointly optimize the beamforming vector and the PS ratio. The proposed optimization problem is non-convex and hard to tackle due to the issues of the quadratic terms and the coupled variables. To deal with this non-convex problem, two algorithms are proposed. In the first algorithm case, the proposed problem can be globally solved by using a two-level optimization approach which involves the SDR method and the one-dimensional (1-D) line search method. In addition, a rank reduction theorem is introduced to guarantee the tightness of the relaxation of the proposed scheme. In the second algorithm case, the proposed problem can be locally solved by exploiting a low complexity iterative algorithm which is embedded in the sequential parametric convex approximation (SPCA) method. Furthermore, the proposed optimization problem is extended to the imperfect CSI case. Third, a secure communication case is studied in an underlay multiple-input multiple-output (MIMO) cognitive radio (CR) network where the secondary transmitter (ST) provides SWIPT to receivers. In this chapter, two uncertainty channel models are proposed. One is based on the assumption that the ST has the perfect channel knowledge of the secondary information receiver (SIR) and the imperfect channel knowledge of secondary energy receivers (SERs) and primary receivers (PUs). The other one assumes that the ST only has the imperfect channel knowledge of all receivers. In each uncertainty channel model, an outage-constrained secrecy rate maximization (OC-SRM) problem combined with probability constraints is proposed to jointly optimizing the transmit covariance matrix and the artificial noise (AN)- aided covariance matrix. The designed OC-SRM problem for both models is non-convex due to the unsolvable probabilistic constraints. To solve this non-convex problem, the log determinant functions are first approximated to the easy handle the functions that the channel error terms are included in the trace function. Then, the probability constraints are converted into the deterministic constraints by exploiting the Bernstein-type inequality (BTI) approach. Finally, the reformulated problem for both models is solvable by using the existing convex tools. Last, a novel security issue is investigated in a MIMO-SWIPT downlink network where nonlinear energy receivers (ERs) are considered as the potential eavesdroppers. In this chapter, two uncertainty channel models, namely partial channel uncertainty (PCU) and full channel uncertainty (FCU), are proposed. An OC-SRM problem of each model is proposed to design the transmit signal covariance matrix while satisfying probabilistic constraints of the secrecy rate and the harvested energy. To surmount the non-convexity of the proposed OC-SRM problem in each model, several transformations and approximations are utilized. In the PCU model, the OC-SRM problem is first converted into two subproblems by introducing auxiliary variables. Then, three conservative approaches are adopted to obtain the safe approximation expressions of the probabilistic constraints, which are deterministic constraints. Moreover, an alternating optimization (AO) algorithm is proposed to iteratively solve two convex conic subproblems. In the FCU model, log determinant functions are first approximated to the trace functions. Then, the three approaches aforementioned are employed to convert probabilistic constraints into deterministic ones. The bisection method is utilized to solve the reformulated problem. Finally, the computational complexity of the proposed three approaches based on the PCU and FCU model is analyzed
    corecore