15 research outputs found
Outage performance analysis of cell-center/edge users under two policies of energy harvesting
In this paper, two energy harvesting policies deploying in cooperative non-orthogonal multiple access (NOMA) systems are considered. After period of wireless power transfer, the NOMA users including cell-edge and cell-center users simultaneously transmit the superposition coded symbols to the base station (BS). In the last time slot, the BS decodes to achieve its signal based on superposition coded symbol with corresponding power allocation factors. This paper provides exact expressions of outage probability in two schemes. Performance gap of two NOMA users can be raised by providing different power allocation factors. It is confirmed by numerical result. Distance and data rate are main factors affecting outage performance. Scheme I exhibit scenario where power beacon transmits energy signal to NOMA user while the BS feeds energy to NOMA user in Scheme II. It is shown that outage performance of Scheme I is better than that of Scheme II.Web of Science254807
Enhancing PHY Security of MISO NOMA SWIPT Systems With a Practical Non-Linear EH Model
Non-orthogonal multiple-access (NOMA) and simultaneous wireless information
and power transfer (SWIPT) are promising techniques to improve spectral
efficiency and energy efficiency. However, the security of NOMA SWIPT systems
has not received much attention in the literature. In this paper, an artificial
noise-aided beamforming design problem is studied to enhance the security of a
multiple-input single-output NOMA SWIPT system where a practical non-linear
energy harvesting model is adopted. The problem is non-convex and challenging
to solve. Two algorithms are proposed to tackle this problem based on
semidefinite relaxation (SDR) and successive convex approximation. Simulation
results show that a performance gain can be obtained by using NOMA compared to
the conventional orthogonal multiple access. It is also shown that the
performance of the algorithm using a cost function is better than the algorithm
using SDR at the cost of a higher computation complexity.Comment: This paper has been accepted by ICC 2018 worksho
Robust optimization with probabilistic constraints for power-efficient and secure SWIPT
In this paper, we propose beamforming schemes to simultaneously transmit data to multiple information receivers (IRs) while transfering power wirelessly to multiple energy harvesting receivers (ERs). Taking into account the imperfection of the instantaneous channel state information, we introduce a probabilistic-constrained optimization problem to minimize the total transmit power while guaranteeing data transmission reliability, secure data transmission, and power transfer reliability. As the proposed optimization problem is non-convex and has an infinite number of constraints, we propose two robust reformulations of the original problem adopting safe-convex-approximation techniques. The derived robust formulations are in semidefinite programming forms, hence, they can be effectively solved by standard convex optimization packages. Simulation results confirm the superiority of the proposed approaches to a baseline scheme in guaranteeing transmission security
Secure Simultaneous Information and Power Transfer for Downlink Multi-user Massive MIMO
In this paper, downlink secure transmission in simultaneous information and
power transfer (SWIPT) system enabled with massive multiple-input
multiple-output (MIMO) is studied. A base station (BS) with a large number of
antennas transmits energy and information signals to its intended users, but
these signals are also received by an active eavesdropper. The users and
eavesdropper employ a power splitting technique to simultaneously decode
information and harvest energy. Massive MIMO helps the BS to focus energy to
the users and prevent information leakage to the eavesdropper. The harvested
energy by each user is employed for decoding information and transmitting
uplink pilot signals for channel estimation. It is assumed that the active
eavesdropper also harvests energy in the downlink and then contributes during
the uplink training phase. Achievable secrecy rate is considered as the
performance criterion and a closed-form lower bound for it is derived. To
provide secure transmission, the achievable secrecy rate is then maximized
through an optimization problem with constraints on the minimum harvested
energy by the user and the maximum harvested energy by the eavesdropper.
Numerical results show the effectiveness of using massive MIMO in providing
physical layer security in SWIPT systems and also show that our closed-form
expressions for the secrecy rate are accurate
Secure Simultaneous Information and Power Transfer for Downlink Multi-User Massive MIMO
In this article, downlink secure transmission in simultaneous information and power transfer (SWIPT) system enabled with massive multiple-input multiple-output (MIMO) is studied. A base station (BS) with a large number of antennas transmits energy and information signals to its intended users, but these signals are also received by an active eavesdropper. The users and eavesdropper employ a power splitting technique to simultaneously decode information and harvest energy. Massive MIMO helps the BS to focus energy to the users and prevent information leakage to the eavesdropper. The harvested energy by each user is employed for decoding information and transmitting uplink pilot signals for channel estimation. It is assumed that the active eavesdropper also harvests energy in the downlink and then contributes during the uplink training phase. Achievable secrecy rate is considered as the performance criterion and a closed-form lower bound for it is derived. To provide secure transmission, the achievable secrecy rate is then maximized through an optimization problem with constraints on the minimum harvested energy by the user and the maximum harvested energy by the eavesdropper. Numerical results show the effectiveness of using massive MIMO in providing physical layer security in SWIPT systems and also show that our closed-form expressions for the secrecy rate are accurate