2 research outputs found

    Robust Secrecy Energy Efficient Beamforming in MISOME-SWIPT Systems With Proportional Fairness

    Full text link
    The joint design of beamforming vector and artificial noise covariance matrix is investigated for multiple-input-single-output-multiple-eavesdropper simultaneous wireless information and power transferring (MISOME-SWIPT) systems. A secrecy energy efficiency (SEE) maximization problem is formulated in the MISOME-SWIPT system with imperfect channel state information and proportional secrecy rate constraints. Since the formulated SEE maximization problem is non-convex, it is first recast into a series of convex problems in order to obtain the optimal solution with a reasonable computational complexity. Numerical results are used to verify the performance of the proposed algorithm and to reveal practical insights.Comment: This work was accepted in IEEE Globecom 201

    Robust Energy Efficient Beamforming in MISOME-SWIPT Systems With Proportional Secrecy Rate

    Full text link
    The joint design of beamforming vector and artificial noise covariance matrix is investigated for the multiple-input-single-output-multiple-eavesdropper simultaneous wireless information and power transferring \mbox{(MISOME-SWIPT)} systems. In the MISOME-SWIPT system, the base station delivers information signals to the legitimate user equipments and broadcasts jamming signals to the eavesdroppers. A secrecy energy efficiency (SEE) maximization problem is formulated for the considered \mbox{MISOME-SWIPT} system with imperfect channel state information, where the SEE is defined as the ratio of sum secrecy rate over total power consumption. Since the formulated SEE maximization problem is non-convex, it is first recast into a series of convex problems in order to obtain the optimal solution with a reasonable computational complexity. Two suboptimal solutions are also proposed based on the heuristic beamforming techniques that trade performance for computational complexity. In addition, the analysis of computational complexity is performed for the optimal and suboptimal solutions. Numerical results are used to verify the performance of proposed algorithms and to reveal practical insights.Comment: This work was accepted by IEEE JSAC. arXiv admin note: text overlap with arXiv:1808.0200
    corecore