Secrecy Wireless Information and Power Transfer in Fading Wiretap Channel

被引:143
作者
Xing, Hong [1 ]
Liu, Liang [2 ]
Zhang, Rui [2 ,3 ]
机构
[1] Kings Coll London, Ctr Telecommun Res, London WC2R 2LS, England
[2] Natl Univ Singapore, Dept Elect & Comp Engn, Singapore 117583, Singapore
[3] ASTAR, Inst Infocomm Res, Singapore 138632, Singapore
关键词
Alternating optimization; artificial noise (AN); energy harvesting; ergodic capacity; fading channel; outage probability; physical-layer security; power control; simultaneous wireless information and power transfer (SWIPT); ARTIFICIAL-NOISE; TRANSMISSION; OPTIMIZATION;
D O I
10.1109/TVT.2015.2395725
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Simultaneous wireless information and power transfer (SWIPT) has recently drawn significant interest for its dual use of radio signals to provide wireless data and energy access at the same time. However, a challenging secrecy communication issue arises as the messages sent to the information receivers (IRs) may be eavesdropped upon by energy receivers (ERs), which are presumed to harvest energy only from received signals. To tackle this problem, we propose in this paper an artificial-noise (AN)-aided transmission scheme to facilitate the secrecy information transmission to IRs and, yet, meet the energy harvesting requirement for ERs, under the assumption that the AN can be canceled at IRs but not at ERs. Specifically, the proposed scheme splits the transmit power into two parts: to send the confidential message to the IR and an AN to interfere with the ER, respectively. Under a simplified three-node wiretap channel setup, the transmit power allocations and power splitting ratios over fading channels are jointly optimized to minimize the outage probability for delay-limited secrecy information transmission or to maximize the average rate for no-delay-limited secrecy information transmission, subject to a combination of average and peak power constraints (APC and PPC) at the transmitter (Tx) and an average energy harvesting constraint at the ER. Both the secrecy outage probability minimization and average rate maximization problems are shown to be nonconvex, and for each, we propose the optimal solution based on the dual decomposition and the suboptimal solution based on the alternating optimization. Furthermore, two benchmark schemes are introduced for comparison where the AN is not used at the Tx and where the AN is used but cannot be canceled by the IR, respectively. Finally, the performances of proposed schemes are evaluated by simulations in terms of various tradeoffs for wireless (secrecy) information versus energy transmissions.
引用
收藏
页码:180 / 190
页数:11
相关论文
共 24 条
[1]  
[Anonymous], 1996, PRINCETON MATH SER
[2]   Secrecy capacity of wireless channels [J].
Barros, Joao ;
Rodrigues, Miguel R. D. .
2006 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1-6, PROCEEDINGS, 2006, :356-+
[3]   Wireless information-theoretic security [J].
Bloch, Matthieu ;
Barros, Joao ;
Rodrigues, Miguel R. D. ;
McLaughlin, Steven W. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) :2515-2534
[4]  
Boyd S, 2004, CONVEX OPTIMIZATION
[5]   Guaranteeing secrecy using artificial noise [J].
Goel, Satashu ;
Negi, Rohit .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2008, 7 (06) :2180-2189
[6]   On the secrecy capacity of fading channels [J].
Gopala, Praveen Kumar ;
Lai, Lifeng ;
El Gamal, Hesham .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (10) :4687-4698
[7]   Secrecy Outage Capacity of Fading Channels [J].
Gungor, Onur ;
Tan, Jian ;
Koksal, Can Emre ;
El-Gamal, Hesham ;
Shroff, Ness B. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2013, 59 (09) :5379-5397
[8]   Opportunistic Secrecy with a Strict Delay Constraint [J].
Khalil, Karim ;
Koyluoglu, O. Ozan ;
El Gamal, Hesham ;
Youssef, Moustafa .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2013, 61 (11) :4700-4709
[9]   Secure broadcasting over fading channels [J].
Khisti, Ashish ;
Tchamkerten, Aslan ;
Wornell, Gregory W. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) :2453-2469
[10]   Secure information transmission for mobile radio [J].
Koorapaty, H ;
Hassan, AA ;
Chennakeshu, S .
IEEE COMMUNICATIONS LETTERS, 2000, 4 (02) :52-55