Secure Beamforming in Full-Duplex MISO-SWIPT Systems With Multiple Eavesdroppers

被引:20
作者
Dong, Yanjie [1 ]
El Shafie, Ahmed [2 ]
Hossain, Md. Jahangir [3 ]
Cheng, Julian [3 ]
Al-Dhahir, Naofal [2 ]
Leung, Victor C. M. [1 ,4 ]
机构
[1] Univ British Columbia, Dept Elect & Comp Engn, Vancouver, BC V6T 1Z4, Canada
[2] Univ Texas Dallas, Dept Elect Engn, Dallas, TX 75080 USA
[3] Univ British Columbia, Sch Engn, Kelowna, BC V1V 1V7, Canada
[4] Zhejiang Gongshang Univ, Hangzhou 310018, Zhejiang, Peoples R China
基金
中国国家自然科学基金;
关键词
Beamforming; coordinated jamming; full-duplex communications; physical layer security; SWIPT; WAVE-FORM DESIGN; WIRELESS INFORMATION; POWER TRANSFER; SELF-INTERFERENCE; ACHIEVABLE RATES; SECRECY RATE; ALLOCATION; ACCESS;
D O I
10.1109/TWC.2018.2860960
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The joint design of beamforming and artificial noise vectors is proposed for the full-duplex simultaneous wireless information and power transferring (FD-SWIPT) systems when multiple eavesdroppers can wiretap information from FD base station (FD-BST) and FD user equipment (FD-UE). To guarantee high security and energy harvesting performance of the FD-SWIPT system, the proposed design is formulated as a suminformation-transmission-rate-maximization (SITRM) problem under information-leakage and energy constraints. Besides, we consider the fairness issue between uplink and downlink information-transmission rates by formulating a fairness-aware-SITRM (FA-SITRM) problem. Since the eavesdroppers can receive the information of FD-BST and FD-UE, the information-leakage region becomes non-convex and challenging to handle. Hence, we propose efficient algorithms to solve the SITRM and FA-SITRM problems optimally via semidefinite relaxation (SDR) and a 1-D search. In each search iteration, our proposed algorithms can recover the rank-one constraints when the application of SDR cannot obtain the optimal solutions. Moreover, we analyze the computational complexities and propose two suboptimal solutions to the formulated problems. For the SITRM problem, our numerical results show that the performance achieved by one of two suboptimal algorithms is close to the performance of optimal algorithm with increasing the maximum transmission power of FD-BST.
引用
收藏
页码:6559 / 6574
页数:16
相关论文
共 46 条
  • [41] Wireless Information and Power Transfer: Architecture Design and Rate-Energy Tradeoff
    Zhou, Xun
    Zhang, Rui
    Ho, Chin Keong
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 2013, 61 (11) : 4754 - 4767
  • [42] Application of Full-Duplex Wireless Technique into Secure MIMO Communication: Achievable Secrecy Rate based Optimization
    Zhou, Yongkai
    Xiang, Zheng Zheng
    Zhu, Yan
    Xue, Zhi
    [J]. IEEE SIGNAL PROCESSING LETTERS, 2014, 21 (07) : 804 - 808
  • [43] Physical-Layer Security for Full Duplex Communications With Self-Interference Mitigation
    Zhu, Fengchao
    Gao, Feifei
    Zhang, Tao
    Sun, Ke
    Yao, Minli
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (01) : 329 - 340
  • [44] Joint Information- and Jamming-Beamforming for Physical Layer Security With Full Duplex Base Station
    Zhu, Fengchao
    Gao, Feifei
    Yao, Minli
    Zou, Hongxing
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2014, 62 (24) : 6391 - 6401
  • [45] Linear Precoding of Data and Artificial Noise in Secure Massive MIMO Systems
    Zhu, Jun
    Schober, Robert
    Bhargava, Vijay K.
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (03) : 2245 - 2261
  • [46] ZIONTS S, 1968, NAV RES LOGIST Q, V15, P449