92 research outputs found
Robust chance-constrained optimization for power-efficient and secure SWIPT systems
In this paper, we propose beamforming schemes to simultaneously transmit data securely to multiple information receivers (IRs) while transferring power wirelessly to multiple energy-harvesting receivers (ERs). Taking into account the imperfection of the instantaneous channel state information (CSI), we introduce a chance-constrained optimization problem to minimize the total transmit power while guaranteeing data transmission reliability, data transmission security, and power transfer reliability. As the proposed optimization problem is non-convex due to the chance constraints, we propose two robust reformulations of the original problem based on safe-convex-approximation techniques. Subsequently, applying semidefinite programming relaxation (SDR), the derived robust reformulations can be effectively solved by standard convex optimization packages. We show that the adopted SDR is tight and thus the globally optimal solutions of the reformulated problems can be recovered. Simulation results confirm the superiority of the proposed methods in guaranteeing transmission security compared to a baseline scheme. Furthermore, the performance of proposed methods can closely follow that of a benchmark scheme where perfect CSI is available for resource allocation
Robust chance-constrained optimization for power-efficient and secure SWIPT systems
In this paper, we propose beamforming schemes to simultaneously transmit data securely to multiple information receivers (IRs) while transferring power wirelessly to multiple energy-harvesting receivers (ERs). Taking into account the imperfection of the instantaneous channel state information (CSI), we introduce a chance-constrained optimization problem to minimize the total transmit power while guaranteeing data transmission reliability, data transmission security, and power transfer reliability. As the proposed optimization problem is non-convex due to the chance constraints, we propose two robust reformulations of the original problem based on safe-convex-approximation techniques. Subsequently, applying semidefinite programming relaxation (SDR), the derived robust reformulations can be effectively solved by standard convex optimization packages. We show that the adopted SDR is tight and thus the globally optimal solutions of the reformulated problems can be recovered. Simulation results confirm the superiority of the proposed methods in guaranteeing transmission security compared to a baseline scheme. Furthermore, the performance of proposed methods can closely follow that of a benchmark scheme where perfect CSI is available for resource allocation
Robust Secrecy Beamforming for MIMO SWIPT with Probabilistic Constraints
This paper considers simultaneous wireless information apower transfer (SWIPT) in a multiple-input multiple-output (MIMO) wiretapnd power transfer (SWIPT) in a multiple-input multiple-output (MIMO) wiretap channel with energy harvesting receivers. The main objective is to keep the probability of the legitimate user's achievable secrecy rate outage as well as the energy receivers' harvested energy outage as caused by CSI uncertainties below given thresholds. This probabilistic-constrained secrecy rate maximization problem presents a significant analytical and computational challenge since any closed-form for the probabilistic constraints with log-det functions is intractable. In this paper, we address this challenging issue using codeviation inequalitiesnvex restrictions. In particular, we derive decomposition-based large deviation inequalities to transform the probabilistic constraints into second-order cone (SOC) constraints which are easier to handle. Then we show that a robust safe solution can be obtained through solving two convex sub-problems in an alternating fashion
Probabilistically Robust SWIPT for Secrecy MISOME Systems
This paper considers simultaneous wireless information and power transfer
(SWIPT) in a multiple-input single-output (MISO) downlink system consisting of
one multi-antenna transmitter, one single-antenna information receiver (IR),
multiple multi-antenna eavesdroppers (Eves) and multiple single-antenna
energy-harvesting receivers (ERs). The main objective is to keep the
probability of the legitimate user's achievable secrecy rate outage as well as
the ERs' harvested energy outage caused by channel state information (CSI)
uncertainties below some prescribed thresholds. As is well known, the secrecy
rate outage constraints present a significant analytical and computational
challenge. Incorporating the energy harvesting (EH) outage constraints only
intensifies that challenge. In this paper, we address this challenging issue
using convex restriction approaches which are then proved to yield rank-one
optimal beamforming solutions. Numerical results reveal the effectiveness of
the proposed schemes.Comment: This is an open access article accepted for publication as a regular
paper in the IEEE Transactions on Information Forensics & Security. Copyright
(c) 2016 IEEE. Personal use of this material is permitted. However,
permission to use this material for any other purposes must be obtained from
the IEEE by sending a request to [email protected]
Physical Layer Service Integration in 5G: Potentials and Challenges
High transmission rate and secure communication have been identified as the
key targets that need to be effectively addressed by fifth generation (5G)
wireless systems. In this context, the concept of physical-layer security
becomes attractive, as it can establish perfect security using only the
characteristics of wireless medium. Nonetheless, to further increase the
spectral efficiency, an emerging concept, termed physical-layer service
integration (PHY-SI), has been recognized as an effective means. Its basic idea
is to combine multiple coexisting services, i.e., multicast/broadcast service
and confidential service, into one integral service for one-time transmission
at the transmitter side. This article first provides a tutorial on typical
PHY-SI models. Furthermore, we propose some state-of-the-art solutions to
improve the overall performance of PHY-SI in certain important communication
scenarios. In particular, we highlight the extension of several concepts
borrowed from conventional single-service communications, such as artificial
noise (AN), eigenmode transmission etc., to the scenario of PHY-SI. These
techniques are shown to be effective in the design of reliable and robust
PHY-SI schemes. Finally, several potential research directions are identified
for future work.Comment: 12 pages, 7 figure
Transmitter Optimization Techniques for Physical Layer Security
Information security is one of the most critical issues in wireless networks as the signals transmitted through wireless medium are more vulnerable for interception. Although the existing conventional security techniques are proven to be safe, the broadcast nature of wireless communications introduces different challenges in terms of key exchange and distributions. As a result, information theoretic physical layer security has been proposed to complement the conventional security techniques for enhancing security in wireless transmissions. On the other hand, the rapid growth of data rates introduces different challenges on power limited mobile devices in terms of energy requirements. Recently, research work on wireless power transfer claimed that it has been considered as a potential technique to extend the battery lifetime of wireless networks. However, the algorithms developed based on the conventional optimization approaches often require iterative techniques, which poses challenges for real-time processing. To meet the demanding requirements of future ultra-low latency and reliable networks, neural network (NN) based approach can be employed to determine the resource allocations in wireless communications.
This thesis developed different transmission strategies for secure transmission in wireless communications. Firstly, transmitter designs are focused in a multiple-input single-output simultaneous wireless information and power transfer system with unknown eavesdroppers. To improve the performance of physical layer security and the harvested energy, artificial noise is incorporated into the network to mask the secret information between the legitimate terminals. Then, different secrecy energy efficiency designs are considered for a MISO underlay cognitive radio network, in the presence of an energy harvesting receiver. In particular, these designs are developed with different channel state information assumptions at the transmitter. Finally, two different power allocation designs are investigated for a cognitive radio network to maximize the secrecy rate of the secondary receiver: conventional convex optimization framework and NN based algorithm
- …