Beamforming Design for Physical Layer Security in a Two-Way Cognitive Radio IoT Network With SWIPT

被引:50
作者
Deng, Zhishan [1 ]
Li, Quanzhong [2 ]
Zhang, Qi [1 ]
Yang, Liang [3 ]
Qin, Jiayin [1 ,4 ]
机构
[1] Sun Yat Sen Univ, Sch Elect & Informat Technol, Guangzhou 510006, Guangdong, Peoples R China
[2] Sun Yat Sen Univ, Sch Data & Comp Sci, Guangzhou 510006, Guangdong, Peoples R China
[3] Hunan Univ, Coll Comp Sci & Elect Engn, Changsha 410082, Hunan, Peoples R China
[4] Sun Yat Sen Univ, Xinhua Coll, Guangzhou 510520, Guangdong, Peoples R China
基金
中国国家自然科学基金; 湖南省自然科学基金;
关键词
Internet of Things (IoT); optimization algorithms; physical layer security (PLS); secrecy sum rate (SSR); secure beamforming design; two-way cognitive radio (CR); SIMULTANEOUS WIRELESS INFORMATION; INTERNET; THINGS; TRANSMISSION; SECRECY;
D O I
10.1109/JIOT.2019.2941873
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this article, we study the secure beamforming design for a two-way cognitive radio (CR) Internet of Things (IoT) network aided with the simultaneous wireless information and power transfer (SWIPT). Located at the center of secondary network, the IoT controller helps to provide relay assistance and cooperative physical layer security (PLS) for two primary users (PUs) against an eavesdropper, while transmitting information and power to the other IoT devices (IoDs) with primary spectrum. To enhance the information security, we aim to maximize the secrecy sum rate (SSR) for PUs by jointly designing the beam-forming matrix and vectors at the central controller. To efficiently solve the nonconvex problem, we first propose the branch-reduce-and-bound (BRB)-based algorithm to obtain an upper bound for the SSR and offer a feasible solution by Gaussian randomization, which demands two-level iteration and thus has high complexity. To strike a balance between the complexity and the performance, we then propose iterative algorithm based on constrained-convex-concave programming (CCCP) and a zero forcing (ZF)-based noniterative algorithm, the latter of which with lowest complexity is suitable for the central controller with limited-power supply. The simulation results are provided to demonstrate the effectiveness of our proposed optimization algorithms in comparison to the traditional schemes.
引用
收藏
页码:10786 / 10798
页数:13
相关论文
共 48 条
[1]   New results on Hermitian matrix rank-one decomposition [J].
Ai, Wenbao ;
Huang, Yongwei ;
Zhang, Shuzhong .
MATHEMATICAL PROGRAMMING, 2011, 128 (1-2) :253-283
[2]   NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey [J].
Akyildiz, Ian F. ;
Lee, Won-Yeol ;
Vuran, Mehmet C. ;
Mohanty, Shantidev .
COMPUTER NETWORKS, 2006, 50 (13) :2127-2159
[3]   The Internet of Things: A survey [J].
Atzori, Luigi ;
Iera, Antonio ;
Morabito, Giacomo .
COMPUTER NETWORKS, 2010, 54 (15) :2787-2805
[4]   Robust Monotonic Optimization Framework for Multicell MISO Systems [J].
Bjornson, Emil ;
Zheng, Gan ;
Bengtsson, Mats ;
Ottersten, Bjoern .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2012, 60 (05) :2508-2523
[5]  
Boyd Stephen P., 2014, Convex Optimization
[6]   Toward Distributed Battery Switch Based Electro-Mobility Using Publish/Subscribe System [J].
Cao, Yue ;
Kaiwartya, Omprakash ;
Han, Chong ;
Wang, Kezhi ;
Song, Houbing ;
Aslam, Nauman .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (11) :10204-10217
[7]   Narrowband Internet of Things: Implementations and Applications [J].
Chen, Jiming ;
Hu, Kang ;
Wang, Qi ;
Sun, Yuyi ;
Shi, Zhiguo ;
He, Shibo .
IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (06) :2309-2314
[8]   Fog and IoT: An Overview of Research Opportunities [J].
Chiang, Mung ;
Zhang, Tao .
IEEE INTERNET OF THINGS JOURNAL, 2016, 3 (06) :854-864
[9]   Improving Wireless Physical Layer Security via Cooperating Relays [J].
Dong, Lun ;
Han, Zhu ;
Petropulu, Athina P. ;
Poor, H. Vincent .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2010, 58 (03) :1875-1888
[10]   Guaranteeing secrecy using artificial noise [J].
Goel, Satashu ;
Negi, Rohit .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2008, 7 (06) :2180-2189