Secrecy Throughput Maximization for Massive MIMO Wireless Powered Communication Networks

被引:2
作者
Rezaei, Roohollah [1 ,2 ]
Sun, Sumei [1 ]
Kang, Xin [3 ]
Guan, Yong Liang [4 ]
Pakravan, Mohammad Reza [2 ]
机构
[1] ASTAR, Inst Infocomm Res, Singapore, Singapore
[2] Sharif Univ Technol, Dept Elect Engn, Tehran, Iran
[3] Univ Elect Sci & Technol China, Chengdu, Peoples R China
[4] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore, Singapore
来源
2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM) | 2019年
关键词
wireless powered communication network; physical layer security; energy beamforming; full-duplex; space division multiple access; Massive MIMO; INTERFERENCE; INFORMATION; ALLOCATION; EFFICIENT;
D O I
10.1109/globecom38437.2019.9013995
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we study the secrecy throughput in a massive Multiple-Input-Multiple-Output (MIMO) full-duplex wireless powered communication network (WPCN). The network consists of a massive MIMO base station (BS) and two groups of single-antenna sensor nodes which harvest energy from the BS. The first group, referred to as information transmitters (ITs), use the harvested energy to transmit information back to the BS; the second group, referred to as energy receivers (ERs), use the harvested energy for non-transmission related operations. We consider a two-slot protocol. In the first time slot, all nodes harvest energy from the BS. In the second slot, ITs transmit information to the BS, while BS use one set of its antennas to receive the signals and the other set of antennas to transmit artificial noise (AN) to the ERs. The AN serves two purposes: wireless power transfer to the ERs, and information security for the ITs with ERs, which are considered as potential eavesdroppers. We aim to maximize the total secrecy throughput of ITs subject to the ERs' received energy constraints. The problem is shown to be non-convex. To tackle the problem, we propose a two-stage suboptimal approach, referred to as Maximizing Received AN aided Secrecy Throughput Maximization (MRAN-STM). In the first stage, the transmitted AN is optimized to maximize the minimum received AN of all the ERs. Then, in the second stage, the power allocation and time slot duration are optimized to maximize the total secrecy throughput. Numerical results show the improvement of the proposed algorithm.
引用
收藏
页数:6
相关论文
共 19 条
  • [1] Accumulate Then Transmit: Toward Secure Wireless Powered Communication Networks
    Bi, Ying
    Jamalipour, Abbas
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (07) : 6301 - 6310
  • [2] Power-Efficient and Secure WPCNs With Hardware Impairments and Non-Linear EH Circuit
    Boshkovska, Elena
    Derrick Wing Kwan Ng
    Dai, Linglong
    Schober, Robert
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 2018, 66 (06) : 2642 - 2657
  • [3] Energy-Efficient and Secure Resource Allocation for Multiple-Antenna NOMA With Wireless Power Transfer
    Chang, Zheng
    Lei, Lei
    Zhang, Huaqing
    Ristaniemi, Tapani
    Chatzinotas, Symeon
    Ottersten, Bjorn
    Han, Zhu
    [J]. IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING, 2018, 2 (04): : 1059 - 1071
  • [4] Improving Secrecy Performance of a Wirelessly Powered Network
    Chen, Zhuo
    Hadley, Lucinda
    Ding, Zhiguo
    Dai, Xuchu
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 2017, 65 (11) : 4996 - 5008
  • [5] Minimum Secrecy Throughput Maximization in Wireless Powered Secure Communications
    Guo, Chongtao
    Liao, Bin
    Feng, Daquan
    He, Chunlong
    Ma, Xiao
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (03) : 2571 - 2581
  • [6] Power Beacon Assisted Wiretap Channels With Jamming
    Jiang, Xin
    Zhong, Caijun
    Zhang, Zhaoyang
    Karagiannidis, George K.
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (12) : 8353 - 8367
  • [7] Full-Duplex Wireless-Powered Communication Network With Energy Causality
    Kang, Xin
    Ho, Chin Keong
    Sun, Sumei
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2015, 14 (10) : 5539 - 5551
  • [8] Adaptive Wireless-Powered Relaying Schemes With Cooperative Jamming for Two-Hop Secure Communication
    Lee, Kisong
    Hong, Jun-Pyo
    Choi, Hyun-Ho
    Levorato, Marco
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (04): : 2793 - 2803
  • [9] Secure transmission for multi-antenna wireless powered communication with co-channel interference and self-energy recycling
    Li, Quanzhong
    Zhao, Sai
    [J]. COMPUTER NETWORKS, 2018, 134 : 202 - 214
  • [10] EXPLOITING INTERFERENCE FOR SECRECY WIRELESS INFORMATION AND POWER TRANSFER
    Liu, Yuan
    Xu, Jie
    Zhang, Rui
    [J]. IEEE WIRELESS COMMUNICATIONS, 2018, 25 (01) : 133 - 139