15 research outputs found

    Outage performance analysis of cell-center/edge users under two policies of energy harvesting

    Get PDF
    In this paper, two energy harvesting policies deploying in cooperative non-orthogonal multiple access (NOMA) systems are considered. After period of wireless power transfer, the NOMA users including cell-edge and cell-center users simultaneously transmit the superposition coded symbols to the base station (BS). In the last time slot, the BS decodes to achieve its signal based on superposition coded symbol with corresponding power allocation factors. This paper provides exact expressions of outage probability in two schemes. Performance gap of two NOMA users can be raised by providing different power allocation factors. It is confirmed by numerical result. Distance and data rate are main factors affecting outage performance. Scheme I exhibit scenario where power beacon transmits energy signal to NOMA user while the BS feeds energy to NOMA user in Scheme II. It is shown that outage performance of Scheme I is better than that of Scheme II.Web of Science254807

    Enhancing PHY Security of MISO NOMA SWIPT Systems With a Practical Non-Linear EH Model

    Get PDF
    Non-orthogonal multiple-access (NOMA) and simultaneous wireless information and power transfer (SWIPT) are promising techniques to improve spectral efficiency and energy efficiency. However, the security of NOMA SWIPT systems has not received much attention in the literature. In this paper, an artificial noise-aided beamforming design problem is studied to enhance the security of a multiple-input single-output NOMA SWIPT system where a practical non-linear energy harvesting model is adopted. The problem is non-convex and challenging to solve. Two algorithms are proposed to tackle this problem based on semidefinite relaxation (SDR) and successive convex approximation. Simulation results show that a performance gain can be obtained by using NOMA compared to the conventional orthogonal multiple access. It is also shown that the performance of the algorithm using a cost function is better than the algorithm using SDR at the cost of a higher computation complexity.Comment: This paper has been accepted by ICC 2018 worksho

    Robust optimization with probabilistic constraints for power-efficient and secure SWIPT

    Get PDF
    In this paper, we propose beamforming schemes to simultaneously transmit data to multiple information receivers (IRs) while transfering power wirelessly to multiple energy harvesting receivers (ERs). Taking into account the imperfection of the instantaneous channel state information, we introduce a probabilistic-constrained optimization problem to minimize the total transmit power while guaranteeing data transmission reliability, secure data transmission, and power transfer reliability. As the proposed optimization problem is non-convex and has an infinite number of constraints, we propose two robust reformulations of the original problem adopting safe-convex-approximation techniques. The derived robust formulations are in semidefinite programming forms, hence, they can be effectively solved by standard convex optimization packages. Simulation results confirm the superiority of the proposed approaches to a baseline scheme in guaranteeing transmission security

    Secure Simultaneous Information and Power Transfer for Downlink Multi-user Massive MIMO

    Get PDF
    In this paper, downlink secure transmission in simultaneous information and power transfer (SWIPT) system enabled with massive multiple-input multiple-output (MIMO) is studied. A base station (BS) with a large number of antennas transmits energy and information signals to its intended users, but these signals are also received by an active eavesdropper. The users and eavesdropper employ a power splitting technique to simultaneously decode information and harvest energy. Massive MIMO helps the BS to focus energy to the users and prevent information leakage to the eavesdropper. The harvested energy by each user is employed for decoding information and transmitting uplink pilot signals for channel estimation. It is assumed that the active eavesdropper also harvests energy in the downlink and then contributes during the uplink training phase. Achievable secrecy rate is considered as the performance criterion and a closed-form lower bound for it is derived. To provide secure transmission, the achievable secrecy rate is then maximized through an optimization problem with constraints on the minimum harvested energy by the user and the maximum harvested energy by the eavesdropper. Numerical results show the effectiveness of using massive MIMO in providing physical layer security in SWIPT systems and also show that our closed-form expressions for the secrecy rate are accurate

    Secure Simultaneous Information and Power Transfer for Downlink Multi-User Massive MIMO

    Get PDF
    In this article, downlink secure transmission in simultaneous information and power transfer (SWIPT) system enabled with massive multiple-input multiple-output (MIMO) is studied. A base station (BS) with a large number of antennas transmits energy and information signals to its intended users, but these signals are also received by an active eavesdropper. The users and eavesdropper employ a power splitting technique to simultaneously decode information and harvest energy. Massive MIMO helps the BS to focus energy to the users and prevent information leakage to the eavesdropper. The harvested energy by each user is employed for decoding information and transmitting uplink pilot signals for channel estimation. It is assumed that the active eavesdropper also harvests energy in the downlink and then contributes during the uplink training phase. Achievable secrecy rate is considered as the performance criterion and a closed-form lower bound for it is derived. To provide secure transmission, the achievable secrecy rate is then maximized through an optimization problem with constraints on the minimum harvested energy by the user and the maximum harvested energy by the eavesdropper. Numerical results show the effectiveness of using massive MIMO in providing physical layer security in SWIPT systems and also show that our closed-form expressions for the secrecy rate are accurate
    corecore