Outage-Constrained Secrecy Energy Efficiency Optimization for CRNs With Non-Linear Energy Harvesting

被引:20
作者
Ni, Lei [1 ]
Da, Xinyu [2 ]
Hu, Hang [1 ]
Yuan, Yi [3 ]
Zhu, Zhengyu [4 ]
Pan, Yu [1 ]
机构
[1] Air Force Engn Univ, Grad Sch, Xian 710077, Peoples R China
[2] Yango Univ, Coll Artificial Intelligence, Fuzhou 350015, Peoples R China
[3] Univ Lancaster, Sch Comp & Commun, Lancaster LA1 4YW, England
[4] Zhengzhou Univ, Sch Informat Engn, Zhengzhou 450001, Peoples R China
基金
中国博士后科学基金; 中国国家自然科学基金;
关键词
Cognitive radio network (CRN); physical-layer security; secrecy energy efficiency; energy harvesting; COGNITIVE RADIO; TRANSMIT OPTIMIZATION; SWIPT SYSTEMS; MIMO SYSTEMS; DESIGN;
D O I
10.1109/ACCESS.2019.2957397
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we investigate a robust transmit design in underlay energy harvesting (EH) cognitive radio networks (CRNs), where the malicious energy receivers (ERs) can be treated as potential eavesdroppers (Eves) due to their ability of wiretapping the desired information. Considering a general case of statistical Eves' channel state information (CSI), to transmit signals in a secret and energy-efficient manner, an outage-constrained secrecy energy efficiency (OC-SEE) optimization problem is formulated to design transmit beamforming vectors. The original problem is non-convex and challenging to solve. To make it more tractable, we first rewrite this problem by semi-definite relaxation (SDR), and Bernstein-type inequality (BTI) approach is resorted to conservatively approximate the probabilistic constraints. Then, based on the fractional programming theory, an equivalent parametric reformulation is proposed to convert the original problem into a subtractive form. Furthermore, by introducing auxiliary variables, with the aid of Sphere Bounding method, the tractable solution of this OC-SEE maximization problem can be obtained through solving a two-stage optimization problem. Finally, numerical results are provided to validate the efficacy of the proposed design.
引用
收藏
页码:175213 / 175221
页数:9
相关论文
共 39 条
[1]   Exploiting Full-Duplex Receivers for Achieving Secret Communications in Multiuser MISO Networks [J].
Akgun, Berk ;
Koyluoglu, Onur Ozan ;
Krunz, Marwan .
IEEE Transactions on Communications, 2017, 65 (02) :956-968
[2]  
Bechar I., 2009, ARXIV09093595
[3]  
Ben-Tal A., 2001, Lectures on Modern Convex Optimiza- tion:Analysis, Algorithms, and Engineering Applications
[4]   Robust Resource Allocation for MIMO Wireless Powered Communication Networks Based on a Non-Linear EH Model [J].
Boshkovska, Elena ;
Ng, Derrick Wing Kwan ;
Zlatanov, Nikola ;
Koelpin, Alexander ;
Schober, Robert .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2017, 65 (05) :1984-1999
[5]  
Boyd Stephen P., 2014, Convex Optimization
[6]   Resource Allocation for a Massive MIMO Relay Aided Secure Communication [J].
Chen, Jian ;
Chen, Xiaoming ;
Gerstacker, Wolfgang H. ;
Ng, Derrick Wing Kwan .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (08) :1700-1711
[7]   Secrecy Rate Optimizations for a MISO Secrecy Channel with Multiple Multiantenna Eavesdroppers [J].
Chu, Zheng ;
Xing, Hong ;
Johnston, Martin ;
Le Goff, Stephane .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (01) :283-297
[8]   Robust Outage Secrecy Rate Optimizations for a MIMO Secrecy Channel [J].
Chu, Zheng ;
Cumanan, Kanapathippillai ;
Ding, Zhiguo ;
Johnston, Martin ;
Le Goff, Stephane .
IEEE WIRELESS COMMUNICATIONS LETTERS, 2015, 4 (01) :86-89
[9]   AN-Aided Transmission Design for Secure MIMO Cognitive Radio Network with SWIPT [J].
Da, Xinyu ;
Ni, Lei ;
Niu, Hehao ;
Hu, Hang ;
Yue, Shaohua ;
Zhang, Miao .
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2019, E102A (08) :946-952
[10]  
Dinkelbach W., 1967, MANAGE SCI, V13, P492, DOI [https://doi.org/10.1287/mnsc.13.7.492, 10.1287/mnsc.13.7.492]